|
Search the dblp DataBase
Kyung-Ah Shim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kyung-Ah Shim, Seung-Hyun Seo
Security Analysis of Password-Authenticated Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:49-58 [Conf]
- Kyung-Ah Shim
An Identity-Based Proxy Signature Scheme from Pairings. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:60-71 [Conf]
- Kyung-Ah Shim, Seung-Hyun Seo
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:410-419 [Conf]
- Seung-Hyun Seo, Kyung-Ah Shim, Sang-Ho Lee
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions. [Citation Graph (0, 0)][DBLP] TrustBus, 2005, pp:216-225 [Conf]
- Kyung-Ah Shim, Sung Sik Woo
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:4, pp:1143-1151 [Journal]
- Kyung-Ah Shim
Security flaws of remote user access over insecure networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:30, n:1, pp:117-121 [Journal]
Search in 0.001secs, Finished in 0.001secs
|