Kyungah Shim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

6EEKyungah Shim, Sungsik Woo: Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings. Applied Mathematics and Computation 166(3): 523-530 (2005)
5EEKyungah Shim: Off-line password-guessing attacks on the generalized key agreement and password authentication protocol. Applied Mathematics and Computation 169(1): 511-515 (2005)
4EEKyungah Shim, Young-Ran Lee: Security flaws in authentication and key establishment protocols for mobile communications. Applied Mathematics and Computation 169(1): 62-74 (2005)
3EEKyungah Shim: The Risks of Compromising Secret Information. ICICS 2002: 122-133
2EEJun-Bum Shin, Kwangsu Lee, Kyungah Shim: New DSA-Verifiable Signcryption Schemes. ICISC 2002: 35-47
1EEKyungah Shim: Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. ACISP 2001: 514-520

Coauthor Index

1Kwangsu Lee [2]
2Young-Ran Lee [4]
3Jun-Bum Shin [2]
4Sungsik Woo [6]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)