RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 음성지원유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • 브로드캐스트 암호화를 이용한 콘텐츠 제공에 관한 연구

        이덕규,이임영 순천향대학교 부설 산업기술연구소 2004 순천향 산업기술연구소논문집 Vol.10 No.2

        The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriver. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.

      • Detection of Potato virus Y (PVY) from a Single Aphid by One-Step Rt-Pcr Using Boiling Extraction Method

        Deok Jea Cha,Ju Il Kim,Min Kwon,Yong Gyu Lee 한국응용곤충학회 2014 한국응용곤충학회 학술대회논문집 Vol.2014 No.10

        PVY (Potyviridae: potyvirus) is one of the most important potato virus affecting seed potato production and also it is transmitted non-persistently via aphids. For healthy seed potato production, a virus detection system is highly important in addition to aphid monitoring and control. To achieve this detection method, it need to fast and easy to use. About two decades ago RT-PCR based PVY detection method was developed. However that was very time consuming and has low sensitivity. Here, we developed an advanced PVY detection method which a uses the boiling extraction of the viral RNA from aphid stylet and amplification by specific primers located in the viral capsid protein gene. Therefore, it could directly synthesize cDNA of PVY viral capsid gene from extracted RNA of PVY using one-step RT-PCR method in very short time compared to previous methods due to the omission of RNA extraction step. We confirmed this PVY detection method using the two aphid species (Macrosiphum euphorbiae and Aphis gossypii) that known as PVY vectors. The efficiency of this PVY detection method was 60% to 80% from two the aphid species. Hence, this method could be potentially applied to virus free seed potato production programs.

      • KCI등재

        A Controlled Transcription-Driven Light-Up Aptamer Amplification for Nucleoside Triphosphate Detection

        Lee Deok-Gyu,Lim Hye-Jin,Lee Ha-Yeong,김동명,Lee Kyung-Ho,Byun Ju-Young,Shin Yong-Beom 한국바이오칩학회 2023 BioChip Journal Vol.17 No.4

        In this study, we introduced a simple method for detecting nucleoside triphosphates (NTPs) using controlled transcription- driven light-up aptamer amplifi cation. Based on the concentration of target NTP, the light-up aptamer was amplifi ed using a DNA template encoding the Broccoli aptamer sequence through an incomplete transcription mixture (without each NTP). The Broccoli aptamer associated with DFHBI-1T produced signifi cantly enhanced fl uorescence signals that could sensitively detect NTPs in a label-free manner. In addition, the proposed assay was useful for quantitatively detecting NTPs in serum. Thus, we expect that this method has great potential for NTP analysis in bioassays and biological researches.

      • A DRM Model for Copyrights Protection based on Hiding Information

        Deok Gyu Lee,Jianhua Ma 보안공학연구지원센터 2006 International Journal of Multimedia and Ubiquitous Vol.1 No.4

        There have been researches into digital watermarking technology or Fingerprinting vigorously to safeguard 'Protective rights for knowledge and poverty' for digital contents. DRM, Digital Rights Management, is not only 'Protective rights for knowledge and poverty', but also management and systems that are necessary to put out, circulate and use for contents. This technology, DRM, encrypts contents to protect digital contents and they are sold users on. Sellers transmit contents with 'Usage Right' and a license including a key of encryption. The key of encryption decodes encoded files. The right of usage restricts users' application of contents. Even if digital contents that are applied the DRM are coped illegally and circulated, contents will be protected from that because a player of DRM checks existence of licenses and allows contents to be restored. However, this method might cause users to feel inconvenient since the users can only restore contents through the licenses offered by a player or a Smartcard. If radio as well as cable is used popularly in the future, there will be a lot of limits to use those kinds of players. In the method of that, the method using players need different players in order to work successfully in wired and wireless environment. In the case of using Smartcards, there might be a dangerous situation when the Smartcards disappeared. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

      • Software Engineering for Security : Towards Secure Software Architecture

        Deok Gyu Lee,Rosslin John Robles,Dong-Ju Kang,Jong Wook Han 한국멀티미디어학회 2008 한국멀티미디어학회 학술발표논문집 Vol.2008 No.1

        Most software systems today are related to distributed systems. And because of it, security has been an issue of immense concern. As practiced before, security is incorporated in a software system after all functional requirements have been finished. This paper discusses the need of incorporating security concerns in the software development life cycle. We survey different research areas that are concerned in the merging of software engineering and security. The paper focuses on the use of software architecture to solve problems regarding engineering of secure systems.

      • 항공관제에서 관제석 상태 및 흐름 관리에 관한 연구

        이덕규 ( Deok Gyu Lee ),한종욱 ( Jong-wook Han ) 한국정보처리학회 2013 한국정보처리학회 학술대회논문집 Vol.20 No.1

        본 논문은 비행자료의 상태 및 흐름을 관리하여 내부 혹은 외부의 바이러스의 피해 및 비행자료 변조 및 수정 등의 해킹 발생에서 비행자료 시스템의 가용성, 신뢰성 및 무결성을 강화시켜 비행자료시스템 운영 시 관제 서비스를 마비시키는 다양한 사이버 테레에 대응하여 실시간으로 자동으로 재해를 복구하는 시스템 및 그 방법에 대한 것이다. 관제사가 비행자료 상태 및 흐름 관리함에 있어 비행자료를 일방향으로 상태를 변경하거나, 진행하는 방식이 아닌, 일정 시간동안 비행자료의 시간차를 두어 상태를 관리함으로써 비행자료를 보호하여 시스템을 안전하게 운용할 수 있는 장점을 갖는다.

      • KCI등재

        블록체인과 딥러닝을 이용한 악성코드 탐지에 관한 연구

        이덕규 ( Deok Gyu Lee ) 한국정보처리학회 2021 정보처리학회논문지. 컴퓨터 및 통신시스템 Vol.10 No.2

        최근 맬웨어에 의한 피해가 증가하고 있다. 기존의 시그니처 기반 안티 바이러스 솔루션은 제로 데이 공격 및 랜섬웨어와 같은 새로운 위협에 취약하다. 그럼에도 많은 기업은 문제점을 인식하고, 다중 엔드 포인트 보안 전략의 일부로 서명 기반 안티 바이러스 솔루션을 유지하고 있다. 본 논문에서는 차세대 안티 바이러스 솔루션으로 블록 체인과 딥 러닝 기술을 이용한 솔루션을 제안한다. 기존 DB 서버를 통해 업데이트되는 바이러스 백신 소프트웨어를 사용하여 탐지 유닛을 보완하고, 다양한 샘플과 형태를 사용하여 딥 러닝 용 DB 대신 블록 체인을 구성하여 신규 악성 코드 및 위조 악성 코드 탐지율을 높이는 방법을 제안한다. Damages by malware have recently been increasing. Conventional signature-based antivirus solutions are helplessly vulnerable to unprecedented new threats such as Zero-day attack and ransomware. Despite that, many enterprises have retained signature-based antivirus solutions as part of the multiple endpoints security strategy. They do recognize the problem. This paper proposes a solution using the blockchain and deep learning technologies as the next-generation antivirus solution. It uses the antivirus software that updates through an existing DB server to supplement the detection unit and organizes the blockchain instead of the DB for deep learning using various samples and forms to increase the detection rate of new malware and falsified malware.

      • KCI등재

        유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일 / 멀티 도메인 인증

        이덕규(Deok-Gyu Lee),박희운(Hee-Un Park),이임영(Im-Yeong Lee) 한국정보과학회 2005 정보과학회논문지 : 정보통신 Vol.32 No.3

        유비쿼터스 컴퓨터 환경은 사용자가 언제 어디서나 컴퓨터를 이용할 수 있도록 네트워크를 통해 상호 연결된 보이지 않는 수많은 컴퓨터(Invisible Computer)가 편재되고 사용자가 원하는 대로 쉽게 이용할 수 있는 컴퓨팅 환경을 지향하고 더 나아가서는 사용자가 원하는 컴퓨팅을 컴퓨터 스스로 알아서 상황인식 Context Awareness) 제공하는 스마트 환경이다. 이러한 유비쿼터스 컴퓨팅은 보안에 있어 특히 취약한 면을 많이 내포하고 있다. 그 중에서도 분산된 다양한 컴퓨팅 기기들이 도처에 존재함으로 인해 사용자 주변에 있는 기기 중에서 사용자 혹은 서버에 인증된 기기로의 위장공격 등이 가능해진다. 이에 본 논문에서는 다음과 같은 특징을 가지는 방식을 제안한다. 디바이스의 이동을 통한 인증 모델을 제시한다. 이는 개인의 작은 디바이스가 다른 사용자의 공간(MD: Multi Domain)로 이동하였을 경우 디바이스를 통한 인증을 실현하는 방식과 사용자 자신의 공간(SD: Single Domain)으로 이동하였을 경우 디바이스를 통한 인증을 실현하는 두 가지 방식을 제안한다. The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼