http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Automatic Configuration Method for the IKE Protocol based on X.509
( Zhen Zhao ),( Kwang Sun Ko ),( Young Ik Eom ) 한국정보처리학회 2008 한국정보처리학회 학술대회논문집 Vol.15 No.1
The Internet Key Exchange (IKE) protocol is most widely used as a security key exchange protocol on the Internet. Security policies used by the IKE protocol must be configured in advance, however the complex options and manual settings cause inconvenience. This paper proposes an automatic configuration method for the IKE protocol based on X.509 certificate. Security policies are embedded in the certificate, read, and added into the IKE configuration file by a negotiation assistant module in order to achieve automatic IKE configuration. Our proposed method reduces the complexity of configuration process and improves the adaptability of the IKE protocol.
An Efficient Revocable Group Signature Scheme in Vehicular Ad Hoc Networks
( Zhen Zhao ),( Jie Chen ),( Yueyu Zhang ),( Lanjun Dang ) 한국인터넷정보학회 2015 KSII Transactions on Internet and Information Syst Vol.9 No.10
Although many revocable group signature schemes has been proposed in vehicular ad hoc networks (VANETs), the existing schemes suffer from long computation delay on revocation that they cannot adapt to the dynamic VANETs. Based on Chinese remainder theorem and Schnorr signature algorithm, this paper proposes an efficient revocable group signature scheme in VANETs. In the proposed scheme, it only need to update the corresponding group public key when a member quits the group, and in the meanwhile the key pairs of unchanged group members are not influenced. Furthermore, this scheme can achieve privacy protection by making use of blind certificates. Before joining to the VANETs, users register at local trusted agencies (LTAs) with their ID cards to obtain blind certificates. The blind certificate will be submitted to road-side units (RSUs) to verify the legality of users. Thus, the real identities of users can be protected. In addition, if there is a dispute, users can combine to submit open applications to RSUs against a disputed member. And LTAs can determine the real identity of the disputed member. Moreover, since the key pairs employed by a user are different in different groups, attackers are not able to track the movement of users with the obtained public keys in a group. Furthermore, performance analysis shows that proposed scheme has less computation cost than existing schemes.
Analysis of the Threats abusing IPv6 Fragment Header
( Zhen Zhao ),( Gyehyeon Gyeong ),( Kwang Sun Ko ),( Young Ik Eom ) 한국정보처리학회 2007 한국정보처리학회 학술대회논문집 Vol.14 No.1
The security issues related to IPv6 protocol have been focused on by many researchers and engineers. Especially, extension headers of IPv6 protocol provide various functionalities such as IP security, mobile IP, and in principle, it is said to give much more effective network services than the previous protocol, IPv4. In this paper, the cases are surveyed in which fragment header, that is one of many extension headers in IPv6 protocol, is abusedand made to be the sources of threats. Prevention mechanisms are also surveyed to countermeasure the threats.
VLBI NETWORK SIMULATOR: AN INTEGRATED SIMULATION TOOL FOR RADIO ASTRONOMERS
ZHEN ZHAO,Tao An,BAOQIANG LAO 한국천문학회 2019 Journal of The Korean Astronomical Society Vol.52 No.5
In this paper we introduce a software package, the Very long baseline interferometry Network SIMulator (VNSIM), which provides an integrated platform assisting radio astronomers to design Very Long Baseline Interferometry (VLBI) experiments and evaluate the network performance, with a user-friendly interface. Though VNSIM is primarily motivated by the East Asia VLBI Network, it can also be used for other VLBI networks and generic interferometers. The software package not only integrates the functionality of plotting (u; v) coverage, scheduling the observation, and displaying the dirty and CLEAN images, but also adds new features including sensitivity calculations for a given VLBI network. VNSIM provides flexible interactions on both command line and graphical user interface and offers friendly support for log reports and database management. Multi-processing acceleration is also supported, enabling users to handle large survey data. To facilitate future developments and updates, all simulation functions are encapsulated in separate Python modules, allowing independent invoking and testing. In order to verify the performance of VNSIM, we performed simulations and compared the results with other simulation tools, showing good agreement.
Zhen Qing Zhao,Ping Wu Liu,Guang Sheng Yang 한국유전학회 2008 Genes & Genomics Vol.30 No.3
Polima (Pol) system of cytoplasmic male sterility (CMS) has been widely used for hybrid breeding in Brassica napus L in China. Molecular markers tightly linked to the restorer gene would be not only a valuable tool for breeding new restorer lines but also important landmarks for cloning the gene based on the linkage map. In order to identify DNA markers linked to its restorer gene ( Rfp), a near-isogenic line (NIL) population segregating for male sterility ( rfprfp) /fertility ( Rfprfp) was subjected to amplified fragment length polymorphism (AFLP) analysis using the bulked segregant analysis (BSA) method. From the survey of 2,560 primer combinations, nine AFLP markers tightly linked to the target gene were identified. The distance between the two closest markers (ZQA and ZQH) and the target locus were both 0.4 cM, but they located at the same side of the Rfp locus. To exploit fast, cheap and reliable PCR-based markers for large-scale application in marker-assisted selection (MAS), polymorphic fragments of these two AFLP markers were sequenced and successfully converted into sequence characterized amplified region (SCAR) markers. This suite of markers could be valuable in developing new elite restorers in rapeseed.
Metastasis associated genomic aberrations in stage II rectal cancer
Hong Zhao,Zhi-Zhou Shi,Rui Jiang,Dong-Bing Zhao,Hai-Tao Zhou,Jian-Wei Liang,Xin-Yu Bi,Jian-Jun Zhao,Zhi-Yu Li,Jian-Guo Zhou,Zhen Huang,Ye-Fan Zhang,Jian Wang,Xin Xu,Yan Cai,Ming-Rong Wang,Yu Zhang 한국유전학회 2016 Genes & Genomics Vol.38 No.11
Genomic aberrations of rectal carcinoma, especially DNA copy number changes associated with metastasis were largely unclear. We aim to identify the metastasis associated biomarkers in stage II rectal cancer. Formalin-fixed, paraffin-embedded primary tumor tissues of stage II rectal carcinoma were analyzed by array-based comparative genomic hybridization, and genomic aberrations were identified by Genomic Workbench and SAM software. Copy number changes and mRNA expressions were validated by Real-time PCR in an independent rectal cancer samples. The results showed that the most frequent gains in stage II rectal cancer were at 1q21.2-q23.1, 3p21.31, 11q12.2-q23.3, 12q24.11-q24.31, 12q13.11-q14.1 and losses in 18q11.2-q23, 17q21.33-q22, 13q31.1-q31.3, 21q21.1-q21.3, 8p23.3-p23.1 and 4q22.1-q23. Twenty-two amplifications and five homozygous deletions were also identified. We further found that S100A1 (1q21.3-q23.1), MCM7 (7q22.1) and JUND (19p13.11) were amplified and overexpressed in stage II rectal cancer. Interestingly, the genomic aberrations affected 14 signaling pathways including VEGF signaling pathway and fatty acid metabolism. Most importantly, loss of 13q31.1-q34 and gain of 1q44 were associated with distant metastasis. Our results indicated that these metastasis associated genomic changes may be useful to reveal the pathogenesis of rectal cancer metastasis and identify candidate biomarkers.