http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
염흥열,윤호선,김상필,이강석 순천향대학교 부설 산업기술연구소 1997 순천향 산업기술연구소논문집 Vol.3 No.2
본 논문에서는 무선 근거리 통신망에서의 프로토콜 구조를 분석한 후, 이를 바탕으로 무선 근거리 통신망에 적용 가능한 정보보호 규격을 제시하고, 기존의 보안 알고리듬의 문제점을 제시하며 그에 대한 해결 방안을 제시하여 정보보호 서비스를 실현하기 위한 정보보호 메카니듬을 도출한다.
염흥열,윤호선,김상필 순천향대학교 부설 산업기술연구소 1997 순천향 산업기술연구소논문집 Vol.3 No.2
In this paper, we present the access control technique which is one of the essential functions for VOD. As the BISDN widely spreads, need for VOD services will rapidly be increased. Access control technique is needed to allow VOD system to prevent the unauthorized persons from using the unauthorized service. We have implemented the authentication scheme with C language on UNIX. We have used 768-bit RSA signature scheme and MD5 hash function for implementing the authentication scheme.
공개키 방식을 이용한 IMT-2000 키 분배 및 인증 시스템
염흥열,김락현,백종현 순천향대학교 부설 산업기술연구소 1997 순천향 산업기술연구소논문집 Vol.3 No.2
본 논문에서는 FPLMTS(Future Public Land Mobile Telecommunications System)의 구조를 분석하고, 이의 보안 측면의 특성을 분석하며, 기존의 이동통신시스템에서의 GSM과 USDC 방식의 여러 문제점을 분석한 후, 공개키 암호 방식을 적용한 FPLMTS에서의 효율적인 인증과 키 분배 방식을 제시한다.
CDMA 이동통신에 적용 가능한 복조기 구조 및 길쌈부호의 성능
염흥열,박동규,서정욱 순천향대학교 1994 논문집 Vol.17 No.3
Spread spectrum system has been widely used in military communication sectors, but recently its application will be extended to commercial communication sectors, especially to digital mobile system. Demodulation algorithm and decoding algorithm influence the performance of CDMA system critically. In forward channel, Viterbi decoding algorithm with powerful and robust (2,1,8) convolutional codes is used for error correction. In this paper. We presented the basic structure of QPSK demoulator for CDMA, and solved symbol error probability of QPSK demodulator and system capability of CDMA system. And we presented after-decoding error probability of convolutional code. The result of this paper can be widely used for demodulator of digital mobile system.
5중 오류정정 (31,21) RS 부호의 효율적인 복호 알고리듬
염흥열,강경식 순천향대학교 부설 산업기술연구소 1998 순천향 산업기술연구소논문집 Vol.3 No.3
RS 부호의 복호 기법은 전체 통신 시스템의 성능 및 복잡도에 큰 영향을 미친다. 지금까지 RS 의 복호 기법은 다양한 방법에 있으나 Euclid 알고리듬과 변환복호기법을 이용한 복호 기법은 오류정정능력이 큰 복호 기법으로 널리 적용되고 있다. 본 논문에서는 오류정정능력이 5이상인 RS 부호의 복호 알고리듬에 적용될 수 있는 효율적인 복호 알고리듬을 제시하고, 이를 이용하여 5중 오류 정정 (31,21) RS 부호기 및 복호기를 설계한다. Efficient decoding algorithm which is applicable to the error correcting coding circuit for wireless mobile communication system is presented. By using the proposed decoding algorithm, the pair of encoder and decoder are designed for (31,21) RS codes with 5-error-correcting capability.
노한샘,염홍열 순천향대학교 부설 산업기술연구소 2001 순천향 산업기술연구소논문집 Vol.7 No.2
Key recovery system provide an efficient method to access the plaintext of the normal encrypted communication channel. The key recovery is also called "key escrow". Key recovery becomes a very important tool for the electronic commerce applications, considering that number of clients requiring the key recovery function will increase rapidly. We have presented the three-type of key recovery methods which are known as Key Escrow scheme, Key Encapsulation, and Trusted Third Party scheme. And we have compared these three schemes. Finally we have analyzed the existing key recovery products which have been developed for electronic commerce and electronic government. We propose the key recovery policy for the e-commerce and e-government system. The result of this study can be used to design the key recovery products and to install this key recovery products.
IDEA 알고리듬의 소프트웨어 구현과 하드웨어에 적용 가능한 VHDL 설계
김락현,염흥렬,윤호선 순천향대학교 부설 산업기술연구소 1998 순천향 산업기술연구소논문집 Vol.4 No.2
IDEA is a well-known block cipher algorithm with 64-bits input-length and 128-bits output-length, which is used in PGP of Internet. In this paper, we have presented the C++ Language software program and VHDL design for hard ware implementation. The structure of software has been designed in order to minimize the memory size and operate with high-speed by using C++ language. As a result, we have obtained the optimized software structure, and hardware structure for VHDL implementation, which allows a high-speed operation and a minimized chip size The result of this paper can be used for cryptographic devices using IDEA.
집합의 갯수가 서로 다른 Direct-Mapped 캐시 메모리의 효율적인 Trace-Driven 시뮬레이션 알고리즘
박동규,염흥열 순천향대학교 1994 논문집 Vol.17 No.3
In this paper, we propose a new trace driven simulation algorithm to evaluate the bus traffic and the miss ratio of the various direct-mapped cache memories, which have different number of sets, with a single pass through an address trace. Trace-driven simulation is usually used as a method for performance evaluation of cache memories, but it spends a lot of simulation time for simulating the various cache configurations with a long address trace. The proposed algorithm shortens the simulation time by evaluating the performance of the various direct-mapped cache configurations, which have different number of sets, with a single pass through an address trace. Our simulation results show that the run time of the proposed simulation algorithm can be considerably reduced than that of existing simulation algorithm, when the address traces obtained from the various sample programs are used as a input of trace-driven simulation.
이강석,염흥열 순천향대학교 부설 산업기술연구소 1998 순천향 산업기술연구소논문집 Vol.4 No.1
As the business of electronic commerce(EC) through Internet spreads widely and rapidly, both the government and the enterprise are faced with new problem, which is the privacy protection in Internet. They make efforts to solve this problem. In electronic commercial transactions one party can't trust the other party of transaction, because he can't see them directly. Generally, EC is based on the trust to the other party. But, the trust infrastructure of EC have not yet established. Furthermore, there are so many problems to be solved, which restrict the governments and international transaction. And, these problems are how to deal with the intellectual property rights, how to provide the information privacy, and which cryptographic algorithms to be used. The unique solution to these problems is to introduce the cryptographic technologies to EC, to establish the Public Key Infrastructure(PKI), and then to apply it for the creation of new security service. That is, we need the interoperable PKI policies and the establishment of international standards for EC. In this paper, we present the basic structure of PKI, requirements for PKI, and the components in PKI, and new PKI applications. Also, we present the security algorithms and components for establishing the PKI.
박동규,이경석,염훙열,황유동 순천향대학교 부설 산업기술연구소 2000 순천향 산업기술연구소논문집 Vol.6 No.1
In this paper, we propose a secure electronic transaction and management protocol to provide user authentication, data integrity, confidentiality and access control for secure medical management system based on internet. We prove the validation of the proposed protocol by implementing it and testing it's fuctions.