dblp.uni-trier.dewww.uni-trier.de

Jongin Lim

Jong In Lim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
96EEYong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee: An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349
95EESooyoung Chae, Hosub Lee, Jaeik Cho, Manhyun Jung, Jongin Lim, Jongsub Moon: A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. WISA 2008: 190-200
94EEEunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions 91-A(2): 642-649 (2008)
93EEDonghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun: Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Transactions 91-A(9): 2607-2614 (2008)
92EETaek-Young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, Jongin Lim: Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications. IEICE Transactions 91-D(5): 1481-1484 (2008)
91EETaek-Young Youn, Young-Ho Park, Changhan Kim, Jongin Lim: Weakness in a RSA-based password authenticated key exchange protocol. Inf. Process. Lett. 108(6): 339-342 (2008)
2007
90EEKitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157
89EEJong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang: Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316
88EEHwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim: Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673
87EESung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim: SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295
86EEYeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee, Jongin Lim: A Field Guide to Hidden Accounting Information Detection. FGCN (2) 2007: 146-150
85EESeokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim: Windows Pagefile Collection and Analysis for a Live Forensics Context. FGCN (2) 2007: 97-101
84EEEun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim: Efficient an Implementation Method Research of a Smart Card Atomic Operation. ICCSA (2) 2007: 113-121
83EEDong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim: Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253
82EEYoung-Gab Kim, Jongin Lim: Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. International Conference on Computational Science (3) 2007: 1040-1047
81EEKihong Kim, Jinkeun Hong, Jongin Lim: Approach of the Secure Communication Mechanism in Aero-wireless Environment. MUE 2007: 1070-1075
80EEHyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho: PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274
79EEYoung-Gab Kim, Jongin Lim: HMM-Based Approach for Evaluating Risk Propagation. PAISI 2007: 325-326
78EEYong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim: Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635
77EEHeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim: Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52
76EESun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim: A Secure Handover Protocol Design in Wireless Networks with Formal Verification. WWIC 2007: 67-78
75EEJin Wook Byun, Dong Hoon Lee, Jong In Lim: EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007)
2006
74EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836
73EETae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181
72EETae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim: Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. CARDIS 2006: 119-134
71EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee: HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59
70EEYoung-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik: Modeling and Simulation for Security Risk Propagation in Critical Information Systems. CIS 2006: 858-868
69EEKihong Kim, Jinkeun Hong, Jongin Lim: Analysis of the Power Consumption of Secure Communication in Wireless Networks. DEXA 2006: 894-903
68EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196
67EEDong-Guk Han, Tsuyoshi Takagi, Jongin Lim: Further Security Analysis of XTR. ISPEC 2006: 33-44
66EETaek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient ID-Based Delegation Network. OTM Workshops (1) 2006: 382-391
65EEYong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim: A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446
64EEEunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim: A Weak Key Class of XTEA for a Related-Key Rectangle Attack. VIETCRYPT 2006: 286-297
63EEDeukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi: Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptology 19(4): 441-462 (2006)
2005
62EESosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). CIS (2) 2005: 1-8
61EEJin Wook Byun, Dong Hoon Lee, Jongin Lim: Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148
60EEJung Yeon Hwang, Dong Hoon Lee, Jongin Lim: Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292
59EEKwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim: Applying LR Cube Analysis to JSteg Detection. Communications and Multimedia Security 2005: 275-276
58EEKihong Kim, Jinkeun Hong, Jongin Lim: A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. DAIS 2005: 157-168
57EEKihong Kim, Jinkeun Hong, Jongin Lim: Fast and Secure Communication Resume Protocol for Wireless Networks. Euro-Par 2005: 1120-1129
56EESu-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim: Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627
55EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390
54EEKwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim: Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. ICCSA (2) 2005: 537-546
53EEJaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim: Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576
52EEDong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim: Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. ICCSA (2) 2005: 647-656
51EEKihong Kim, Jinkeun Hong, Jongin Lim: Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter. IDEAL 2005: 141-148
50EENam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. ISC 2005: 288-299
49EEKwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim: New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. Information Hiding 2005: 312-326
48EEHak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459
47EESeokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim: Digital evidence collection process in integrity and memory information gathering. SADFE 2005: 236-247
46EETaek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Selected Areas in Cryptography 2005: 144-158
45EEKihong Kim, Jinkeun Hong, Jongin Lim: Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals. TSD 2005: 241-248
44EEJung Youp Lee, Seok Won Jung, Jongin Lim: Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. TestCom 2005: 275-288
43EEHyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Oblivious Conjunctive Keyword Search. WISA 2005: 318-327
42EEDong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Transactions 88-A(5): 1214-1223 (2005)
2004
41 Jong In Lim, Dong Hoon Lee: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers Springer 2004
40EEDong-Guk Han, Jongin Lim, Kouichi Sakurai: On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465
39EEDong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317
38EEHong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim: New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ICISC 2004: 21-32
37EEKisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim: On Security Notions for Steganalysis. ICISC 2004: 440-454
36EEJongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song: Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190
2003
35EEJung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335
34EESangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim: Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. FSE 2003: 247-260
33EEHyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim: Designated Verification of Non-invertible Watermark. ISC 2003: 338-351
32EETaeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim: Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835
31EEYoungdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim: Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003: 298-307
2002
30EESangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim: On the Security of Reduced Versions of 3-Pass HAVAL. ACISP 2002: 406-419
29EESangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim: On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. ASIACRYPT 2002: 176-191
28EEYoung-Ho Park, Sangtae Jeong, Jongin Lim: Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. EUROCRYPT 2002: 197-208
27EEKyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim: Saturation Attacks on Reduced Round Skipjack. FSE 2002: 100-111
26EEDukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. FSE 2002: 49-60
25EEChanghoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim: A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468
24EEIk Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim: Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34
23EEHak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432
22EEYoung-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung: An Improved Method of Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 310-322
21EEYoung-Ho Park, Sangtae Jeong, Chang Han Kim, Jongin Lim: An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 323-334
20EEDonghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim: Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174
19EEDong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim: Optimal Extension Fields for XTR. Selected Areas in Cryptography 2002: 369-384
18EEChang Han Kim, Sangho Oh, Jongin Lim: A New Hardware Architecture for Operations in GF(2m). IEEE Trans. Computers 51(1): 90-92 (2002)
17EESeokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Jongsu Kim: Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002)
2001
16EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221
15EEDeukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311
14EEJaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi: Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113
13EEHyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim: Off-Line Authentication Using Watermarks. ICISC 2001: 200-213
12EESeonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon: Truncated Differential Cryptanalysis of Camellia. ICISC 2001: 32-38
11EEIk Rae Jeong, Dong Hoon Lee, Jong In Lim: Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474
2000
10 Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung: A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. ACISP 2000: 41-48
9EEJaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park: Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288
8EESeokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283
7EEHyun-Jeong Kim, Jong In Lim, Dong Hoon Lee: Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161
6EEDong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee: New Block Cipher DONUT Using Pairwise Perfect Decorrelation. INDOCRYPT 2000: 262-270
5EESangho Oh, Chang Han Kim, Jongin Lim, Dong Hyeon Cheon: Efficient Normal Basis Multipliers in Composite Fields. IEEE Trans. Computers 49(10): 1133-1138 (2000)
1999
4 Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim: On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. ICISC 1999: 38-52
3EEChang-Hyi Le, Jong In Lim: A New Aspect of Dual Basis for Efficient Field Arithmetic. Public Key Cryptography 1999: 12-28
1998
2EEJung Je Son, Jong In Lim, Seongtaek Chee, Soo Hak Sung: Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions. Inf. Process. Lett. 65(3): 139-144 (1998)
1995
1 Changho Seo, Jongin Lim, Hichum Eun: On Comparison and Analysis of Algorithms for Multiplication in GF(2^m). J. Comput. Syst. Sci. 51(3): 456-459 (1995)

Coauthor Index

1Doo-Kwon Baik [70]
2Jewan Bang [86]
3Ki-Seok Bang [76]
4Feng Bao [37]
5Jin Wook Byun [43] [61] [68] [74] [75]
6Sooyoung Chae [95]
7Donghoon Chang [20] [64] [71] [93]
8Kisik Chang [37]
9Nam Su Chang [50] [62]
10Seongtaek Chee [2] [29] [30] [71]
11Dong Hyeon Cheon [5] [6] [8]
12Hong-Su Cho [38]
13Inho Cho [8]
14Jaeik Cho [95]
15Sang Hyun Cho [80]
16Jaemin Choi [53]
17Kyu Young Choi [96]
18Kilsoo Chun [48] [55] [93]
19Kyoil Chung [83] [87]
20Robert H. Deng (Robert Huijie Deng) [37]
21Hichum Eun [1]
22Dong-Guk Han [19] [39] [40] [42] [67] [72] [73] [77] [83] [87]
23Deukjo Hong [15] [16] [25] [31] [63] [64] [71] [94]
24In-Hwa Hong [89]
25Jinkeun Hong [45] [51] [57] [58] [69] [81]
26Seokhie Hong [8] [9] [10] [12] [16] [17] [31] [63] [64] [71] [90] [93] [94]
27Jung Yeon Hwang [35] [60]
28Kyungdeok Hwang [26] [27]
29Young Ju Hwang [56]
30Tetsuya Izu [39] [42]
31Dongwon Jeong [70]
32Hee Yun Jeong [24]
33Ik Rae Jeong [11] [24]
34Kitae Jeong [71] [90]
35Sangtae Jeong [21] [28]
36Hak Soo Ju [23] [48] [55]
37Eun A. Jun [84]
38Changho Jung [49] [54] [59]
39Manhyun Jung [95]
40Seok Won Jung [44] [84]
41Ju-Sung Kang [4]
42Chang Han Kim [5] [18] [19] [21] [46] [50] [52] [62] [66]
43Changhan Kim [91]
44Dae Youb Kim [48] [55]
45Guil Kim [36]
46HeeSeok Kim [77]
47Howon Kim (Ho Won Kim) [73] [77] [83] [87]
48Hyun Kim [71]
49Hyun-Jeong Kim [7] [23] [35]
50HyungJun Kim [37] [59]
51Hyunsang Kim [47]
52Jeom Goo Kim [84]
53Jongsu Kim [17]
54Jongsung Kim [36] [53] [71] [94]
55Kihong Kim [45] [51] [57] [58] [69] [81]
56Sosun Kim [62]
57Sung-Kyoung Kim [83] [87]
58Tae-Hyun Kim [72] [73] [77]
59Yeog Kim [86]
60Yong Ho Kim [65] [78] [88] [96]
61Yongtae Kim [52]
62Young-Gab Kim [70] [79] [82]
63Youngdai Ko [31]
64Bonseok Koo [71]
65Daesung Kwon [38]
66Soonhak Kwon [92]
67Taekyoung Kwon [92]
68Chang-Hyi Le [3]
69Changhoon Lee [25] [71] [90] [94]
70Dong Hoon Lee [7] [11] [23] [24] [32] [35] [41] [43] [48] [55] [56] [60] [61] [65] [68] [74] [75] [78] [80] [88] [89] [96]
71Eunjin Lee [64] [94]
72Gu Taek Lee [86]
73Hosub Lee [95]
74Hwaseong Lee [65] [88]
75Hyungwoo Lee [33]
76Jaesang Lee [71]
77Jesang Lee [93]
78Jung Youp Lee [44]
79Jung-Keun Lee [38]
80Kwangsoo Lee [13] [49] [54] [59]
81Sangjin Lee [4] [6] [8] [9] [10] [12] [13] [14] [15] [16] [17] [20] [22] [25] [26] [27] [31] [32] [33] [34] [36] [37] [47] [49] [53] [54] [59] [63] [71] [85] [86] [89]
82Seokhee Lee [47] [85]
83Seonhee Lee [12]
84Su-Mi Lee [56]
85Sung Jae Lee [6]
86Sungjae Lee [25] [27]
87Wonil Lee [14] [16] [26] [27] [63]
88Sun-Hee Lim [76]
89Dukjae Moon [26]
90Jongsub Moon [32] [95]
91Shiho Moriai [15]
92Mridul Nandi [93]
93Sangho Oh [5] [18] [22]
94Katsuyuki Okeya [72]
95Choonsik Park [4]
96Haeryong Park [93]
97Hyun-A Park [80]
98Jong Hwan Park [78]
99Jong Hyuk Park [89]
100Sangjoon Park [9]
101Sangwoo Park [29] [30] [34]
102Soo-Hyun Park [70]
103Young-Ho Park [19] [21] [22] [28] [46] [50] [52] [62] [66] [91] [92]
104Hyun Sook Rhee [24] [43]
105Jeong Choon Ryoo [77]
106Kouichi Sakurai [39] [40] [42]
107Antonio Savoldi [85]
108Changho Seo [1]
109Taeshik Shon [32]
110Jung Je Son [2]
111Jung Hwan Song [36] [38]
112Jaechul Sung [8] [9] [14] [15] [16] [17] [20] [53] [63] [71] [90] [93] [94]
113Maenghee Sung [10] [22]
114Soo Hak Sung [2] [20] [29] [30] [34] [38]
115Tsuyoshi Takagi [67] [73]
116Dong Jin Yang [52]
117Hyungjin Yang [25]
118Laurence Tianruo Yang [89]
119Okyeon Yi [10] [14] [16] [63] [76]
120Heajoung Yoo [10]
121Hyejoung Yoo [13] [33]
122E-Joong Yoon [29]
123Ki Soon Yoon [19]
124Seonhee Yoon [12]
125Taek-Young Youn [46] [66] [91] [92]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)