41 research outputs found

    Improved Original Entry Point Detection Method Based on PinDemonium

    No full text
    ๋งŽ์€ ์•…์„ฑํ”„๋กœ๊ทธ๋žจ์€ ์—ญ๊ณตํ•™์„ ๋ง‰๊ธฐ ์œ„ํ•ด ๋‹ค์–‘ํ•œ ์ƒ์šฉ ํŒจ์ปค๋ฅผ ์‚ฌ์šฉํ•ด ์••์ถ• ํ˜น์€ ์•”ํ˜ธํ™”๋ฅผ ํ–ˆ๊ธฐ ๋•Œ๋ฌธ์— ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„๊ฐ€๋Š” ์••์ถ•ํ•ด์ œ ํ˜น์€ ๋ณต ํ˜ธํ™”๋ฅผ ๋จผ์ € ์ˆ˜ํ–‰ํ•ด์•ผ ํ•œ๋‹ค. OEP(Original Entry Point)๋Š” ์•”ํ˜ธํ™”๋˜๊ฑฐ๋‚˜ ์••์ถ•๋˜์–ด ์žˆ๋Š” ์‹คํ–‰ํŒŒ์ผ์„ ๋‹ค์‹œ ์›๋ณธ ๋ฐ”์ด๋„ˆ๋ฆฌ ์ƒํƒœ๋กœ ๋˜๋Œ๋ฆฐ ํ›„ ์‹คํ–‰๋œ ์ฒซ ๋ฒˆ์งธ ๋ช…๋ น์–ด์˜ ์ฃผ์†Œ์ด๋‹ค. ์—ฌ๋Ÿฌ ์–ธํŒจ์ปค๋Š” OEP๊ฐ€ ๋‚˜ํƒ€๋‚˜๊ธฐ ์ „๊นŒ์ง€ ํŒจํ‚น๋œ ํŒŒ์ผ์„ ์‹คํ–‰ํ•˜๋ฉฐ ์ฃผ์†Œ๋ฅผ ๊ธฐ๋กํ•œ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ๊ธฐ๋ก๋œ ์ฃผ์†Œ๋“ค ์ค‘์— OEP๋ฅผ ์ฐพ๋Š”๋‹ค. ๊ทธ๋Ÿฌ๋‚˜ ์ผ๋ถ€ ์–ธํŒจ์ปค์—์„œ ์ œ๊ณตํ•˜๋Š” OEP ํ›„๋ณด๋“ค์€ ๋น„๊ต์  ํฐ OEP ํ›„๋ณด ์ง‘ํ•ฉ์„ ์ œ๊ณตํ•˜๊ฑฐ๋‚˜ ํ›„๋ณด๋“ค ์ค‘์— OEP๊ฐ€ ์—†๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋‹ค. ์ด์— ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„๊ฐ€๋“ค์€ ๋” ์ ์€ OEP ํ›„๋ณด ์ง‘ํ•ฉ์„ ์ œ๊ณตํ•˜๋Š” ๋„๊ตฌ๊ฐ€ ํ•„์š”ํ•œ ์‹ค์ •์ด๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” PinDemonium์ด๋ผ ๋ถˆ๋ฆฌ๋Š” ์–ธํŒจ์ปค์— ๋‘ ๊ฐ€์ง€ OEP ํƒ์ง€๋ฐฉ๋ฒ•์„ ์ถ”๊ฐ€ํ•˜์—ฌ ๋” ์ ์€ OEP ํ›„๋ณด ์ง‘ํ•ฉ์„ ์ œ๊ณตํ•˜๋Š” ๋„๊ตฌ๋ฅผ ๋งŒ๋“ค์—ˆ๋‹ค. ์ฒซ ๋ฒˆ์งธ ๋ฐฉ๋ฒ•์€ ํŒจํ‚น๋œ ํ”„๋กœ๊ทธ๋žจ์ด ์™„์ „ํžˆ ์›๋ณธ ๋ฐ”์ด๋„ˆ๋ฆฌ์ƒํƒœ๋กœ ๋˜๋Œ์•„ ๊ฐ„ ํ›„์—๋Š” ์›ํ”„๋กœ๊ทธ๋žจ ํ•จ์ˆ˜ ํ˜ธ์ถœ๊ณผ ๋™์ผํ•˜๋‹ค๋Š” ๊ฒƒ์„ ํ™œ์šฉํ•œ OEP ํƒ์ง€๋ฐฉ๋ฒ•์ด๋‹ค. C/C++ ์–ธ์–ด๋กœ ์ž‘์„ฑ๋œ ํ”„๋กœ๊ทธ๋žจ์€ ๋ฐ”์ด๋„ˆ๋ฆฌ ์ฝ”๋“œ๋กœ ์–ธ์–ด๋ฅผ ๋ณ€ํ™˜ํ•˜๋Š” ์ปดํŒŒ์ผ ๊ณผ์ •์„ ๊ฑฐ์นœ๋‹ค. ์ปดํŒŒ์ผ ๊ณผ์ •์„ ๊ฑฐ์นœ ํ”„๋กœ๊ทธ๋žจ์—๋Š” ํŠน์ • ์‹œ์Šคํ…œ ํ•จ์ˆ˜๋“ค์ด ์ถ”๊ฐ€๋œ๋‹ค. ์ด ์‹œ์Šคํ…œ ํ•จ์ˆ˜๋“ค์€ ์ปดํŒŒ์ผ๋Ÿฌ ๋ณ„๋กœ ๋‹ค๋ฅด๋‹ค. ์ปดํŒŒ์ผ๋Ÿฌ ๋ณ„๋กœ ์‚ฌ์šฉ๋˜๋Š” ์‹œ์Šคํ…œ ํ•จ์ˆ˜๋ฅผ ์กฐ์‚ฌํ•œ ํ›„, ํŒจํ‚น๋œ ํ”„๋กœ๊ทธ๋žจ์—์„œ ํ˜ธ์ถœ๋˜๋Š” ์‹œ์Šคํ…œ ํ•จ์ˆ˜์™€ ํŒจํ„ด๋งค์นญํ•˜์—ฌ ์–ธํŒจํ‚น ์ž‘์—…์ด ๋๋‚ฌ๋Š”์ง€ ํƒ์ง€ํ•˜๋Š” ๋ฐฉ๋ฒ•์ด๋‹ค. ๋‘ ๋ฒˆ์งธ ๋ฐฉ๋ฒ•์€ ํŒจํ‚น๋œ ํ”„๋กœ๊ทธ๋žจ์ด ์™„์ „ํžˆ ์›๋ณธ ๋ฐ”์ด๋„ˆ๋ฆฌ ์ƒํƒœ๋กœ ๋Œ์•„๊ฐ„ ํ›„ ์‹œ์Šคํ…œํ•จ์ˆ˜์—์„œ ์‚ฌ์šฉ๋˜๋Š” ๋งค๊ฐœ๋ณ€์ˆ˜๊ฐ€ ์›ํ”„๋กœ๊ทธ๋žจ๊ณผ ๋™์ผํ•˜๋‹ค๋Š” ๊ฒƒ์„ ํ™œ์šฉํ•œ OEP ํƒ์ง€๋ฐฉ๋ฒ•์ด๋‹ค. ์‹œ์Šคํ…œํ•จ์ˆ˜์—์„œ ์‚ฌ์šฉ๋˜๋Š” ๋งค๊ฐœ๋ณ€์ˆ˜์˜ ๊ฐ’์„ ์ด์šฉํ•ด OEP๋ฅผ ์ฐพ๋Š” ๋ฐฉ๋ฒ•์ด๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” 16์ข…์˜ ์ƒ์šฉ ํŒจ์ปค๋กœ ์••์ถ•๋œ ์ƒ˜ํ”Œ ํ”„๋กœ๊ทธ๋žจ์„ ๋Œ€์ƒ์œผ๋กœ OEP ํƒ์ง€ ์‹คํ—˜์„ ํ–ˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„  ์•ˆํ‹ฐ ๋””๋ฒ„๊น… ๊ธฐ๋ฒ•์œผ๋กœ ํ”„๋กœ๊ทธ๋žจ์„ ์‹คํ–‰ํ•˜์ง€ ๋ชปํ•˜๋Š” ๊ฒฝ์šฐ์ธ 2์ข…์„ ์ œ์™ธํ•˜๊ณ  PinDemonium ๋Œ€๋น„ ํ‰๊ท  40% ์ด์ƒ OEPํ›„๋ณด๋ฅผ ์ค„์ผ ์ˆ˜ ์žˆ์—ˆ๋‹ค.Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.์ด ๋…ผ๋ฌธ์€ 2017๋…„๋„ ์ •๋ถ€(๊ต์œก๋ถ€)์˜ ์žฌ์›์œผ๋กœ ํ•œ๊ตญ์—ฐ๊ตฌ์žฌ๋‹จ์˜ ์ง€์›์„ ๋ฐ›์•„ ์ˆ˜ํ–‰๋œ ๊ธฐ์ดˆ์—ฐ๊ตฌ์‚ฌ์—…์ž„(No.2017R1D1A1B03029550)

    Tyrosinase inhibition activity of some chromones

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์•ฝํ•™๊ณผ ์•ฝํ’ˆ๋ถ„์„ํ•™์ „๊ณต,2002.Docto

    ไบบๅทฅ์ƒˆ์ง‘์„ ๏ง็”จํ•œ ๋ฐ•์ƒˆ้กž์˜ ๏งด็›ธๅˆฅ ็นๆฎ–็”Ÿๆ…‹์— ้—œํ•œ ็ก็ฉถ

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์‚ฐ๋ฆผ์ž์›ํ•™๊ณผ,2003.Maste

    A study on the immunogenetic characteristics of the Korean patients with insulin-dependent diabetes mellitus : Measurement of anti-glutamic acid decarboxylase antibody and HLA GenePolymorphism

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์˜ํ•™๊ณผ ๋‚ด๊ณผํ•™์ „๊ณต,1996.Docto

    The Imperial Presidency by Evasion of the Political Laws in Korea

    No full text
    ์ด ๊ธ€์˜ ๋ชฉ์ ์€ ํ•œ๊ตญ์˜ ์ œ์™•์  ๋Œ€ํ†ต๋ น์„ ํ•œ๊ตญ์˜ ์ •์น˜์ œ๋„์˜ ํŠน์„ฑ์ด ์•„๋‹ˆ๋ผ ๋ฒ•๋ฅ ์ด๋‚˜ ์ œ๋„์˜ ํŽธ๋ฒ•์  ํ™œ์šฉ์„ ํ†ตํ•ด ์„ค๋ช…ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ์ด ๊ธ€์€ ํ•œ๊ตญ ์ •์น˜์ œ๋„๋ฅผ ํ†ตํ•ด ๋Œ€ํ†ต๋ น์˜ ๊ฒฌ์ œ๋ฐ›์ง€ ์•Š๋Š” ๊ถŒ๋ ฅ์œผ๋กœ์„œ ์ œ์™•์  ๋Œ€ํ†ต๋ น์„ ์„ค๋ช…ํ•˜๊ธฐ ํž˜๋“ค๋‹ค๊ณ  ๋ณธ๋‹ค. ๊ทธ ์ด์œ ๋Š” ๋ฏธ๊ตญ ๋Œ€ํ†ต๋ น์˜ ํ–‰์ •๋ช…๋ น์ด๋‚˜ ๋ธŒ๋ผ์งˆ ๋Œ€ํ†ต๋ น์˜ ํฌ๊ณ ๋ น๊ณผ ๊ฐ™์ด ๊ตญํšŒ์˜ ๊ต์ฐฉ์ƒํƒœ๋ฅผ ๋ŒํŒŒํ•  ์ˆ˜ ์žˆ๋Š” ์ˆ˜๋‹จ์ด ํ•œ๊ตญ ๋Œ€ํ†ต๋ น์—๊ฒŒ ์—†๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค. ๋‹จ์ˆœ ๋‹ค์ˆ˜๋Œ€ํ‘œ์ œ ๋˜ํ•œ ๋Œ€ํ†ต๋ น์— ๋Œ€ํ•œ ๊ฑฐ๋ถ€๊ถŒ ํ–‰์‚ฌ์ž ์ˆ˜๋ฅผ ์ถ•์†Œ์‹œ์ผœ ๋Œ€ํ†ต๋ น์— ๋Œ€ํ•œ ๊ฒฌ์ œ๋ฅผ ์ œ์•ฝํ•˜๋Š” ์ œ๋„๋กœ ๊ฑฐ๋ก ๋˜์ง€๋งŒ, ๊ฑฐ๋ถ€๊ถŒ ํ–‰์‚ฌ์ž๋„ ์ง‘์ค‘์‹œ์ผœ ๊ทธ ํšจ๊ณผ๋ฅผ ์ƒ์‡„ํ•˜๋Š” ์ธก๋ฉด๋„ ๊ณ ๋ คํ•  ํ•„์š”๊ฐ€ ์žˆ๋‹ค. ํ•œ๊ตญ ๋Œ€ํ†ต๋ น์€ ์ด๋Ÿฌํ•œ ๊ณต์‹ ์ œ๋„์  ๊ถŒํ•œํ–‰์‚ฌ๋ณด๋‹ค ํŽธ๋ฒ•์  ์ œ๋„ํ™œ์šฉ์„ ํ†ตํ•ด ๊ฒฌ์ œ๋ฐ›์ง€ ์•Š๋Š” ๊ถŒ๋ ฅ์„ ํ–‰์‚ฌํ•  ์ˆ˜ ์žˆ๋‹ค. ๋‹ค์‹œ ๋งํ•ด ํ•œ๊ตญ์—์„œ ์ œ์™•์  ๋Œ€ํ†ต๋ น ํ˜„์ƒ์€ ๋Œ€ํ†ต๋ น์ด๋‚˜ ํ–‰์ •๋ถ€์˜ ํ–‰์ •์ž…๋ฒ•์ธ ์‹œํ–‰๋ น์— ๋Œ€ํ•œ ์žฌ๋Ÿ‰๊ถŒ ํ–‰์‚ฌ์— ์ž…๋ฒ•ํ†ต์ œ๋‚˜ ์‚ฌ๋ฒ•ํ†ต์ œ๊ฐ€ ์–ด๋ ต๊ณ , ๊ฒ€์ฐฐ์ด๋‚˜ ๊ตญ์ •์›๊ณผ ๊ฐ™์€ ๊ถŒ๋ ฅ๊ธฐ๊ด€์˜ ์„ ๋ณ„์  ๋™์›์— ๋Œ€ํ•œ ๊ฒฌ์ œ๊ฐ€ ์–ด๋ ค์šธ ๋•Œ ๊ฐ€๋Šฅํ•˜๋‹ค. ์ด๊ฒƒ์€ ๊ณต์‹์ ์ธ ์ •์น˜์ œ๋„ ๋น„๊ต๋งŒ์œผ๋กœ ํŒŒ์•…ํ•˜๊ธฐ ํž˜๋“  ๋น„๊ณต์‹์ ์ธ ์ œ๋„ ์šด์˜๋ฐฉ์‹์— ํ•ด๋‹น๋˜๋ฉฐ, ์ง‘๊ถŒ์„ธ๋ ฅ์—๊ฒŒ ์œ ๋ฆฌํ•œ ์„ธ๋ ฅ๊ท ํ˜•๊ณผ ์—ญ์‚ฌ๊ตฌ์กฐ์  ์กฐ๊ฑด์ด ๋’ท๋ฐ›์นจ๋  ๋•Œ ๋‚˜ํƒ€๋‚œ๋‹ค.The purpose of this paper is to explain the imperial presidency in Korea with the evasion of the political laws or institutions. The existing explanations of the imperial presidency in Korea was based on the characters of the political institutions such as the elements of parliamentary system and majority system with single member districts. The elements of parliamentary system make the presidents legislative power stronger. The majority system reduce the number of veto players. But these may not make the legislative power of Korean president stronger than U.S. or Brazilian presidents. U.S. president can issue the executive orders at the level of law and Brazilian president can issue decrees as the potential law or priority bill. The majority system reduces the number of veto players, but makes them bigger and stronger. And We could not find the evidences which proved that parliamentary system and majority system could explain the character of imperial presidency in Korea. But Korean president can exercise the unchecked discretion with the aversion of the implementing ordinances which are discrepant to the upper laws and selectively mobilizing coersive agencies such as the prosecution to the political arena. The aversions of the political laws or institutions by presidents are the measures of the imperial presidency in Korea

    New flash memory acquisition methods based on firmware update protocols for LG Android smartphones

    No full text
    Since criminals are committing offenses using smartphones in many cases, smartphone forensic techniques are being considered important by criminal investigators. In this paper, we present a new methodology to analyze firmware update protocols using fuzz testing. This approach has enabled us to find five new methods to acquire data evidence from LG Android smartphones, released from 2011 to 2016. We conducted extensive experiments to obtain data evidence for 48 LG smartphone models (100 devices in total). Furthermore, we deal with diverse digital forensic issues such as integrity of evidence or decompression/decryption of data using our methods.This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2017R1D1A1B03029550)

    Activity-dependent potentiation of large dense-core vesicle (LDCV) exocytosis

    No full text
    Docto

    A Critique on the Inflexible Responses of Kim Young Sam Administration to North Korean Nuclear Crisis

    No full text
    ๊น€์˜์‚ผ์ •๋ถ€๋Š” ์ œ1์ฐจ ๋ถํ•ต์œ„๊ธฐ์™€ ์ด์— ๋Œ€ํ•œ ๋ฏธ๋ถํ•ฉ์˜๋กœ ์ธํ•ด ํ•œ๊ตญ์ „์Ÿ ์ด๋ž˜๋กœ ๋ถํ•œ๋ฌธ์ œ์— ๋Œ€ํ•œ ๊ฐ€์žฅ ํฐ ์œ„ํ—˜๊ณผ ๊ธฐํšŒ๋ฅผ ๋งž์ดํ–ˆ๋‹ค. ๊ทธ๋Ÿฐ๋ฐ ๊น€์˜์‚ผ์ •๋ถ€๋Š” ๊ทธ ๊ธฐํšŒ๋ฅผ ์ถฉ๋ถ„ํžˆ ์‚ด๋ฆฌ์ง€ ๋ชปํ–ˆ๊ณ , ์œ„ํ—˜ํšŒํ”ผ์—๋„ ๊ธฐ์—ฌํ•˜์ง€ ๋ชปํ–ˆ๋‹ค๋Š” ํ‰๊ฐ€๊ฐ€ ์ง€๋ฐฐ์ ์ด๋‹ค. ๊ธฐ์กด ์—ฐ๊ตฌ์—์„œ๋Š” ๊ด€๋ฃŒ์ •์น˜์™€ ์–ธ๋ก ์˜ ์˜ํ–ฅ๋ ฅ ๊ฐ•ํ™” ๊ทธ๋ฆฌ๊ณ  ๊น€์˜์‚ผ ๋Œ€ํ†ต๋ น์˜ ๋Œ์ถœ์ ์ธ ํ–‰ํƒœ ๋“ฑ์œผ๋กœ ์ธํ•œ ๊น€์˜์‚ผ์ •๋ถ€์˜ ์ผ๊ด€์„ฑ ๋ถ€์กฑ ๊ทธ๋ฆฌ๊ณ  ๋ถํ•ต์œ„๊ธฐ ๋Œ€์‘๊ณผ์ •์—์„œ ํ•œ๊ตญ์˜ ์ฃผ๋„์„ฑ ๋ฏธํก ๋“ฑ์ด ๊ทธ ๊ธฐ๋ณธ์ ์ธ ์ด์œ ๋กœ ์ง€์ ๋˜์—ˆ๋‹ค. ์ด์™€ ๋‹ฌ๋ฆฌ ์ด ์—ฐ๊ตฌ๋Š” ๊น€์˜์‚ผ์ •๋ถ€๊ฐ€ ์ผ์ • ๋ฒ”์œ„์—์„œ ์ผ๊ด€์„ฑ์„ ์œ ์ง€ํ–ˆ๊ณ , ๋ฏธ๊ตญ๊ณผ์˜ ์กฐ์œจ์„ ํ†ตํ•œ ๊น€์˜์‚ผ์ •๋ถ€์˜ ์˜ํ–ฅ๋ ฅ์€ ๋†’์€ ์ˆ˜์ค€์ด์—ˆ์Œ์„ ๋ฐํžˆ๊ณ ์žํ–ˆ๋‹ค. ๋‚˜์•„๊ฐ€ ์ด ๊ธ€์€ ๊น€์˜์‚ผ์ •๋ถ€ ๋ถํ•ต์œ„๊ธฐ ๋Œ€์‘์˜ ํ•œ๊ณ„๋ฅผ ๊น€์˜์‚ผ ๋Œ€ํ†ต๋ น์ด ์ผ์ • ๋ฒ”์œ„์˜ ์ผ๊ด€์„ฑ๊ณผ ์ฃผ๋„์„ฑ์„ ์ถ”๊ตฌํ•˜๋ฉด์„œ ๋“œ๋Ÿฌ๋ƒˆ๋˜ ๊ฒฝ์ง์„ฑ์—์„œ ์ฐพ๊ณ ์ž ํ•œ๋‹ค. The Kim Young Sam administration faced not only the peak of crisis but also the biggest opportunity for settlement of the North Korean problem after the Korean War. On the one hand there was the first official US-DPRK agreement, on the other hand the Nuclear Crisis arose just before the military crash in the Korean Peninsula. In these circumstances the Korean Government kept its inflexible conservative position, which was not lack of consistency as many studies argued as a main reason of the failure of the Kim Young Sam administration's foreign policy. The purpose of Kim's inflexible conservative responses were to secure its autonomy to the US and initiative about the North Korean nuclear problem. It seems that the Kim Young Sam administration took more autonomy and initiative, but made the ROK-US or ROK-DPRK relations uneasier.์ด ์—ฐ๊ตฌ๋Š” ํ•œ๊ตญ์—ฐ๊ตฌ์žฌ๋‹จ ์ค‘์ ์‚ฌ์—…(KRF-2008-411-J01603)์˜ ์ง€์›์„ ๋ฐ›์•„ ์ˆ˜ํ–‰๋˜์—ˆ

    Taxonomy based on morphological characteristics and mitochondrial DNA maker and habitat use of the Siberian roe deer (Capreolus pygargus) in South Korea

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ) --์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์‚ฐ๋ฆผ๊ณผํ•™๋ถ€(์‚ฐ๋ฆผํ™˜๊ฒฝํ•™์ „๊ณต), 2009.8.Docto

    Efficient chaining schemes and signature scheme for stream authentication

    No full text
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€,2003.Docto
    corecore