2009 |
11 | EE | Kyung-Ah Shim:
Breaking the short certificateless signature scheme.
Inf. Sci. 179(3): 303-306 (2009) |
2008 |
10 | EE | Kyung-Ah Shim:
Rogue-key attacks on the multi-designated verifiers signature scheme.
Inf. Process. Lett. 107(2): 83-86 (2008) |
2007 |
9 | EE | Kyung-Ah Shim:
Security Analysis of Authenticated Key Exchange Protocol Based on the q-th Root Problem.
IEICE Transactions 90-A(1): 231-233 (2007) |
8 | EE | Kyung-Ah Shim:
Further Analysis of ID-Based Authenticated Group Key Agreement Protocol from Bilinear Maps.
IEICE Transactions 90-A(1): 295-298 (2007) |
7 | EE | Kyung-Ah Shim,
Sung Sik Woo:
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols.
Inf. Sci. 177(4): 1143-1151 (2007) |
2006 |
6 | EE | Kyung-Ah Shim,
Seung-Hyun Seo:
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper).
ICICS 2006: 410-419 |
5 | EE | Kyung-Ah Shim:
An Identity-Based Proxy Signature Scheme from Pairings.
ICICS 2006: 60-71 |
4 | EE | Kyung-Ah Shim:
Security flaws of remote user access over insecure networks.
Computer Communications 30(1): 117-121 (2006) |
3 | EE | Kyung-Ah Shim:
Impersonation Attacks on Key Agreement Protocols Resistant to Denial of Service Attacks.
IEICE Transactions 89-D(7): 2306-2309 (2006) |
2005 |
2 | EE | Kyung-Ah Shim,
Seung-Hyun Seo:
Security Analysis of Password-Authenticated Key Agreement Protocols.
CANS 2005: 49-58 |
1 | EE | Seung-Hyun Seo,
Kyung-Ah Shim,
Sang-Ho Lee:
A Mediated Proxy Signature Scheme with Fast Revocation for Electronic Transactions.
TrustBus 2005: 216-225 |