• Title/Summary/Keyword: S/KEY

Search Result 10,080, Processing Time 0.038 seconds

Chinoketides A and B, Two New Antimicrobial Polyketides from the Endophytes of Distylium chinense with the "Black-Box" Co-culture Method

  • Lv, Meng-Meng;Tan, Ming-Hui;Lu, Li-Wen;Zhang, Rong-Hua;Guo, Zhi-Yong;Liu, Cheng-Xiong;Yang, Jin;Zou, Kun;Proksch, Peter
    • Natural Product Sciences
    • /
    • v.24 no.3
    • /
    • pp.159-163
    • /
    • 2018
  • Two new polyketides, chinoketides A and B (1 - 2) with a known compound xylarphthalide A (3), were isolated from the solid medium of the endophytes from the leaves of the relic plant Distylium chinense with the "black-box" co-culture method, and the structures of two new compounds were elucidated by NMR, MS and CD spectra. And the absolute configurations of chinoketides A (1) and B (2) were determined as 2R,3R,8S and 5R,6S by calculating their ECD spectra to compare with the experimental CD spectra. Finally, the antimicrobial activities were evaluated to Erwinia carotovora sub sp. Carotovora (Jones) Bersey et al, and the results showed that compounds 1 - 3 displayed the antimicrobial activities with MIC value at 20.5, 30.4 and $10.2{\mu}g/mL$.

Proteomic Analysis of Shigella Virulence Effectors Secreted under Different Conditions

  • Liu, Xingming;Lu, Lilan;Liu, Xinrui;Liu, Xiankai;Pan, Chao;Feng, Erling;Wang, Dongshu;Niu, Chang;Zhu, Li;Wang, Hengliang
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.1
    • /
    • pp.171-178
    • /
    • 2017
  • A series of novel effector molecules secreted by the type three secretion system (T3SS) of Shigella spp. have been reported in recent years. In this study, a proteomic approach was applied to study T3SS effectors systematically. First, proteins secreted by the S. flexneri wild-type strain after Congo Red induction were separated and identified using two-dimensional electrophoresis to display the relative abundance of all kinds of early effectors for the first time. Then, a gene deletion mutant of known virulence repressor (OspD1) and a gene overexpressed mutant of two known virulence activators (MxiE and IpgC) were constructed and analyzed to discover potential late effectors. Furthermore, the supernatant proteins of gene deletion mutants of two known translocators (IpaB and IpaD), which would constantly secrete effectors, were also analyzed. Among all of the secreted proteins identified in our study, IpaH1.4, IpaH_5, and IpaH_7 have not been reported before. These proteomics data of the secreted effectors will be valuable to understand the pathogenesis of S. flexneri.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

Accountable Authority Revocable Identity-Based Encryption (사용자 폐기를 지원하는 책임 기관 ID 기반 암호)

  • Choi, Suri;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1281-1293
    • /
    • 2017
  • In 2001, Boneh and Franklin proposed Identity-Based Encryption(IBE) that does not require a certificate like Public Key Infrastructure(PKI) by using user's Identity as a public key. However, IBE has a key escrow problem because the Private Key Generator(PKG), who is a trusted authority, generates a secret key of every user. Also, it does not support efficient revocation when the user's secret key is exposed or the system needs to revoke the user. Therefore, in order to use IBE as PKI that currently used, it is necessary to solve the key escrow problem and the revocation problem. In this paper, to solve those two problems, we suggest Accountable Authority Revocable IBE(A-RIBE) based on Accountable Authority IBE that mitigates the key escrow problem and Revocable IBE that solves the revocation problem. Also, we define the security model suitable foe A-RIBE, and analyze the principle of designing A-RIBE according to based A-IBE and RIBE and their advantage and disadvantage.

Public Key Encryption with Equality Test with Designated Tester (고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템)

  • Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.3-13
    • /
    • 2011
  • In 2004, Boneh et.al. proposed a public key encryption with keyword search (PEKS) scheme which enables a server to test whether a keyword used in generating a ciphertext by a sender is identical to a keyword used in generating a query by a receiver or not. Yang et. al. proposed a probabilistic public key encryption with equality test (PEET) scheme which enables to test whether one message of ciphertext generated by one public key is identical to the other message generated by the other public key or not. If the message is replaced to a keyword, PEET is not secure against keyword guessing attacks and does not satisfy IND-CP A security which is generally considered in searchable encryption schemes. In this paper, we propose a public key encryption with equality test with designated tester (dPEET) which is secure against keyword guessing attacks and achieves IND-CPA security.

A Service Protection Scheme based on non-CAS for Mobile IPTV Service (Mobile IPTV 서비스 환경을 위한 non-CAS 기반의 서비스 보호 기법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.27-35
    • /
    • 2011
  • Due to the advancement of IPTV technologies, Mobile IPTV service is needed to be supported for service and content protection. CAS is generally used in the IPTV service to protect service and content. However, the CAS is not efficient in the Mobile IPTV. The CAS needs too much bandwidth for Service Key update to the each subscriber. Moreover, the CAS is increasing computation burden for the service key refreshment in the key management server when the subscriber frequently changes of the IPTV service group. To solve the problems, we used hierarchical key structure based on pre-shared key that is securely stored into smart card or USIM and do not use the EMM for Service Key update. As a result, the proposed scheme decreases computation burden at the key management server and wireless bandwidth burden in the Mobile IPTV service.

Design of HUST-PTF beamline control system for fast energy changing

  • Li, Peilun;Li, Dong;Qin, Bin;Zhou, Chong;Han, Wenjie;Liao, Yicheng;Chen, Aote
    • Nuclear Engineering and Technology
    • /
    • v.54 no.8
    • /
    • pp.2852-2858
    • /
    • 2022
  • A proton therapy facility is under development at Huazhong University of Science and Technology (HUST). To meet the need for fast energy changes during treatments, a beamline control system (BCS) has been designed and implemented. The BCS coordinates and controls various beamline devices by adopting a distributed architecture divided into three layers: the client, server, and device layers. Among these, the design of the server layer is the key to realize fast energy changes. The server layer adopts the submodule programming paradigm and optimizes the data interface among modules, allowing the main workflow to be separated from the device workflow and data. Furthermore, this layer uses asynchronous, multithreaded, and thread-locking methods to improve the system's ability to operation efficiently and securely. Notably, to evaluate the changing energy status over time, a dynamic node update method is adopted, which can dynamically adjust the update frequency of variable nodes. This method not only meets the demand for fast updates on energy changes but also reduces the server's communication load in the steady state. This method is tested on a virtual platform, and the results are as expected.

A Efficient Key Generation and Renewal for Broadcast Encryption (브로드캐스트 암호화에서의 효율적인 키 생성과 갱신 방법)

  • Lee, Deok-Gyu;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.11C no.2
    • /
    • pp.149-156
    • /
    • 2004
  • Broadcast encryption schemes are applied to transmit digital informations of multimedia, software, Pay-TV etc. in public network. Important thing is that only user who is permitted before only must be able to get digital information in broadcast encryption schemes. If broadcast message transfers, users who authority is get digital information to use private key given in the advance by oneself. Thus, user acquires message or session key to use key that broadcaster transmits, broadcaster need process that generation and distribution key in these process. Also, user secession new when join efficient key renewal need. In this paper, introduce about efficient key generation and distribution, key renewal method. Take advantage of two technique of proposal system. One is method that server creates key forecasting user without user's agreement, and another is method that server and user agree each other and create key Advantage of two proposal system because uses a secret key broadcast message decryption do can and renewal is available effectively using one information whatever key renewal later.

Bacterial Fruit Rot of Apricot Caused by Burkholderia cepacia in China

  • Fang, Yuan;Li, Bin;Wang, Fang;Liu, Baoping;Wu, Zhiyi;Su, Ting;Qiu, Wen;Xie, Guanlin
    • The Plant Pathology Journal
    • /
    • v.25 no.4
    • /
    • pp.429-432
    • /
    • 2009
  • An unreported disease of apricot was observed in orchards in Zhejiang province, China. Symptoms started as water soaked lesions on the fruit surface. Later, water-soaked areas developed and spread to the entire fruit, resulting in soft rot of the whole fruit. The causal organism isolated from symptomatic fruits was identified as Burkholderia cepacia based on its biochemical and physiological characteristics and confirmed by the cellular fatty acid composition and Biolog data as well as 16S rRNA gene sequence analysis. The bacterial isolates caused similar symptoms when inoculated onto fruits of apricot. In addition, European plum, Japanese plum, nectarine and kiwifruit were susceptible to the B. cepacia pathogen. However, the B. cepacia pathogen failed to cause any visible symptoms when it was inoculated onto 16 other fruits. This is the first report of a bacterial disease of apricot caused by B. cepacia in China.

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF