http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Kim, Soongohn,Kim, Seoksoo,Lee, Geuk Elsevier 2009 Future generations computer systems Vol.25 No.3
<P><B>Abstract</B></P><P>In this paper, we have discussed the issues concerning the basic concept and classification of OT (Oblivious Transfer). We have proposed secure verifiable non-interactive oblivious transfer protocols for the exchange of secrets on distributed environments. One is a new secure verifiable non-interactive oblivious transfer protocol using RSA, the other is that with bit commitment using one-way functions. The structure of the protocols is similar to that of the original protocols proposed by Bellare and Micali. Their protocols are based on the difficulty of the discrete logarithm problem. Our protocols are also based on the difficulty of the discrete logarithm problem. The secret in their protocol could be chosen as a random number. The security in our protocols also can be chosen as a random number. These methods have the additional functions that enable us to authenticate the sender and to protect one’s denial of what he/she has sent the messages to the other. The traffic amount of transfer of the proposed methods is less than or equal to that of the conventional interactive method.</P>
Structure design and test of enterprise security management system with advanced internal security
Kim, Seoksoo,Kim, Soongohn,Lee, Geuk Elsevier 2009 Future generations computer systems Vol.25 No.3
<P><B>Abstract</B></P><P>A security system for a company network is progressing as a ESM (Enterprise Security Management) in an existing security solution foundation. The establishment of the security policy is occupying a very important area in ESM of the security system. We tried to analyze the existing ESM system for this and designed a security solution structure for enhancing the internal security. We applied implementing directly IDS system and tested it. This study examined the structure of security solutions in order to build an enterprise security management system. For this purpose, we analyzed existing enterprise security management systems and, based on the results, proposed a enterprise security management system with reinforced internal security and tested the system. For the test, we used a firewall through log analysis and designed an intra-network using virtual IP system.</P>
Design of Smart Grid Security Quantification System Prevent APT Attack
Donghyun Kim,E-Jung Choi,Seoksoo Kim 중소기업융합학회 2015 중소기업융합학회 국제학술대회논문집 Vol.2 No.1
Recently, not only technological engineering techniques as well as social engineering have been applied to target attacks such as APT. The security system to prevent cyber-attack against smart grid must consider the smart grid environment and also apply cognition and behavior pattern of the attacker from both technical and social engineering perspective, and quantified prediction of flexible and strategic cyber-attacks should precede it. Therefore, in this paper, a model was designed to quantify APT attack on smart grid in advance.
Design of Quantification for Prevent of Cryptolocker based on Social Engineering
Donghyun Kim,Wooyoung Soh,Seoksoo Kim 중소기업융합학회 2015 중소기업융합학회 국제학술대회논문집 Vol.2 No.1
The growth of ICT (Information and Communication Technology) within the society has become increasingly digitized, thus, the overall activity has amounted to various researches for protecting any data from malicious threats. Recently, ransomware has been a rapidly propagated subject for social engineering techniques especially the ransomware cryptolocker. Users can delete a cryptolocker code using an antivirus software code. However, the encrypted data would be impossible to recover. Therefore, cryptolocker must be prevented and must have early detection before it infects any data. In this paper, we are proposing a quantification model to prevent and detect any cryptographic operations in the local drive.
Design of Mobile-based Security Agent for Contents Networking in Mixed Reality
Donghyun Kim,Jaehyun Lim,Seoksoo Kim 중소기업융합학회 2019 융합정보논문지 Vol.9 No.3
ICT 기술의 발전으로 인하여 융합현실 콘텐츠는 단순한 3차원 콘텐츠만을 보여주는 서비스 플랫폼에서 센서 정보, 공유 정보등 다양한 정보 등을 가시화하여 제공함으로서 다양한 산업분야에서 서비스 제공을 위한 기술 로서 활용되어지고 있다. 제공되는 정보와 콘텐츠가 증가함에 따라 증강되는 오브젝트의 리소스를 네트워크로 전송 하여 어플리케이션을 경량화하는 연구들이 진행되고 있다. 네트워크를 통해 리소스를 제공하기 위해서는 패턴 정보, 콘텐츠 정보, 센서 정보 등 다양한 정보들을 처리하기 위한 서버들이 클라우드 환경에서 구축되어야 한다. 그러나 클라우드 환경에서 실시간으로 송수신되는 데이터를 인증하기 위해서는 그 처리과정이 길기 때문에 랜더링 과정에 서 딜레이 현상이 발생하여 QoS가 떨어지는 문제가 있다. 따라서 본 연구에서는 센서 정보, 3차원 모델 등 다양한 콘텐츠를 제공해주는 융합현실 서비스의 증강 콘텐츠를 제공해주는 클라우드 서버를 분산하고 분산된 서버간 중계 를 통하여 신뢰된 데이터를 처리하는 시간을 단축하기 위한 시스템을 설계하였다. Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.