http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이택희 湖南大學校 情報通信硏究所 1999 정보통신연구 Vol.9 No.-
All the current virus protection techniques are rely on anti-virus program. In this paper, some basic techniques are proposed to protect computer virus. They are based on PKI(Public Key Infrastructure). First, file integrity is offered by producer's signature, so modified program can be detected easily. Second, virus programming can be protected by authenticated relationship between file and producer. It uses certificate offered by CA(Certification Authority) of PKI. The last technique is to define 'file action type'. By this method, all program can be monitored by operating system. Here for the proposed structure, its procedure and performance is analyzed.
이택희 호남대학교 산업기술연구소 1997 산업기술연구논문집 Vol.5 No.-
디지틀 이동통신망은 비인가자의 불법적인 망 접근과 이동국 및 이동통신망 자원의 불법적 사용을 방지하기 위하여 보안 및 인증 기능을 제공한다. 오늘날, 이러한 이동통신망의 인증기능은 대부분 비밀키 암호체계를 근간으로 설계되어 있다. 본 논문은 차세대 이동통신망인 IMT-2000(International Mobile Telecommunication-2000)망을 위하여 공개키 방식에 근거한 인증세센터를 설계한 것이다. 따라서 설계한 인증기능은 공개키 방식을 도입함으로써 비밀키방식의 문제점인 키분배의 어려움을 해결할 수 있으며, 전자상거래에 필수요소인 부인봉쇄 기능을 제공한다. Digital mobile communication networks offer securities and authentication services to protect the unauthorized or illegal use of a cellular telephone or cellular network resources. Today, authentication of these mobile networks is based on the secret key cryptographic technologies. This paper prepose a design of the AC(Authentication Center) for IMT-2000, and it is based on puboic key crypto-system for the maximum flexibility.
이택희 호남대학교 정보통신연구소 1998 정보통신연구 Vol.8 No.-
Digital mobile communication networks offer securities and services to protect the unauthorized or illegal use of a cellular telephone or cellular network resources. Authentication is the process by which information is exchanged between a mobile station(subscriber)and base station(mobile network)for the purpose of confirming the identity of the mobile station. All secure functions arebased on cryptographic algorithm. So secure management for the secure keys is very important. In this paper, secure key management system and key distribution procedure are analyzed. The IMT-2000 services and security functions are based on ITU recommendation.
이택희 호남대학교 1999 호남대학교 학술논문집 Vol.20 No.2
In this paper, some basic techniques are proposed to protect computer virus. They are based on PKI(Public Key Infrastructure). First, file integrity is offered by producer's signature, so modified program can be detected easily. Second, virus programming can be protected by authenticated relationship between file and producer. it is possible by certificate offered by CA(Certification Authority) of PKI. The last technique is to define 'file action type'. By this method, all program can be monitored by operating system. Basically all these techniques are based on PKI and change of conventional OS.
인증을 위한 IMT - 2000 서비스 및 보안체계 분석
이택희 호남대학교 정보통신연구소 1997 정보통신연구 Vol.6 No.-
이동통신서비스는 차후 전세계적인 호환성을 보장하는 IMT-2000 망으로 진화할 것으로 예측된다. 한편 이동통신서비스는 무선통신망의 특성에 기인한 불법적인 사용이나 도청 또는 추적을 통한 불법적 행위와 각종 통신 범죄 행위등에 대한 대책이 필요하며, 이를 위하여 망은 인증기능을 제공해야 한다. 본 논문은 차세대 이동통신망으로 약속되는 ITM-2000 망에서 인증기능을 제공하기 위하여, 현재 표준화가 진행중에 있는 IMT-2000 서비스와 보안세계를 분석한 것이다. Digital mobile communication networks offer securities and authentication services to protect the unauthorized or illegal use of a cellular telephone or cellular network resources. And IMT-2000 system will provide an access to the wide range of advanced voice and non-voice communication services and guarantee global terminal mobility and unified common air interface. This paper analyses the IMT-2000 services and security functions for authentication. and all analysis are based on ITU recommendation. More works on cryptographic system and related protocol analysis will be continued to design a security management system for IMT-2000.
SM25C의 마찰용접에서 용접면에 가공된 홀의 영향에 관한 연구
윤병수,홍일표,민택기,김진건 忠南大學校 産業技術硏究所 1999 산업기술연구논문집 Vol.14 No.1
This study deals with friction welding of SM25C. One of test material has a hole in the center, but the other is not. Then,same friction welding condition is applied. Friction welding is conducted with varying hole diameter at one material. The results obtained are as follows. 1. When the diamether of machined hole is 4mm, the highest bending strength of friction wleld was 1569MPa which was about 120% of base metal strength. 2. When the diameter of machined hole is 6mm, the highst shear strength of friction weld was 512MPa which was about 115% of base metal strength. 3. The machined hole at one material can be increased in the bending and shear strength.