http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
일방향 해쉬 함수에 기반한 효율적인 온라인 비밀분산 방식
김승주 ( Seung Joo Kim ),원동호 ( Dong Ho Won ),오수현 ( Soo Hyun Oh ) 한국정보처리학회 2000 정보처리학회논문지 Vol.7 No.10
Secret sharing scheme is a cryptographic protocol in which a dealer distributes shares of a secret among a set of participants such that only authorized set of participants can recover the secret at a later. Secret sharing is an important cryptographic primitive in management of secret information, secure multiparty protocol and group-oriented cryptography, etc. In this paper, we propose an efficient, on-line secret sharing scheme based on one-way hash function. This scheme provides the property to share multiple secrets and allows participants to be added/deleted dynamically, without having to redistribute new shares. Proposed scheme has advantage to detect cheating and identify of all cheater, regardless of then number. Furthermore, it is more efficient than previous schemes.
김승주(Kim, Seung-Joo) 한국형사소송법학회 2017 형사소송 이론과 실무 Vol.9 No.1
Since Criminal Procedure Act and Supreme Court declared the introduction of Exclusionary Rule in 2007, Supreme Court of Korea has accumulated several precedents about this rule in last 10 years. These precedents has shown 3 features ; ① If an investigative s act in the process of acquiring evidence is ruled illegal, this evidence is presumed to be excluded from the pools of evidence irrelevant to the degree of illegality, in principle. ② Exceptionally, some evidences can be admitted through the fair comparison of interests, between the request to keep Due Process and the needs to find Substantial Truth. ③ Due process should be taken seriously for the realization of constitutional civil rights. According to ① or ③ features, Supreme Court has held tight grip about the relevance between the fact of suspicion written on search warrant and the evidence acquired according to this warrant. Including this theme, This article settles the flow of precedents in last 10 years shown at the various, individual cases. Otherwise, precedents related to ② features has been formed especially on the admissibility of secondary evidence, which has been judged with priority given to dilution or disconnection of causality. These precedents show the influence of 「fruit of a poisonous tree」 doctrine or the other exception theories of the United States, as well as the effects of Japanese or German precedents.
매입형 영구자석 동기전동기의 인덕턴스 측정법 비교 분석
김승주(Seung-Joo Kim),김철진(Cherl-Jin Kim),이주(Ju Lee) 대한전기학회 2009 전기학회논문지 Vol.58 No.5
The performance analysis and robust control of the interior permanent magnet synchronous motor (IPMSM) greatly depend on accurate value of its parameters. To achieve the high performance of torque control, it is necessary to consider exact inductance values because the inductances are nonlinear parameters of operating the IPMSM. Therefore many different methods have been performed for analysis of the methodology for the exact measurement of synchronous inductances. None of them is considered standard, and accuracy levels of all these methods are also not consistent. Among these experimental methods, the DC current decay test and the vector current control test are ideal for a laboratory environment. In this paper, these two test methods are compared by applying inductances to the IPMSM. The paper analyzes the measured inductances of the two methods and their differences with inductances obtained from the finite element method(FEM).
디지틀 서명방식 표준 ( 안 ) 에 기반을 둔 통합서명 시스템에 관한 연구
김승주(Kim Seung Joo),김경신(Kim Kyung Shin),원동호(Won Dong Ho) 한국정보처리학회 1998 정보처리학회논문지 Vol.5 No.4
In the information society, all the information is transferred through the network so it becomes an issue to protect the data on network. One of the fundamental cryptographic tools to protect the data on network, is digital signature, and in many countries, cryptographers have been trying to make their own digital signature standard. Also, at Crypto'89 meeting, D.Chaum suggested an undeniable signature scheme. Undeniable signatures are verified via a protocol between the signer and the verifier, so the cooperation of the signer is necessary. So far, there have been several variants of undeniable signatures to obtain a signature scheme, which can control the abuse of ordinary digital signatures.