2005 | A mediated proxy signature scheme with fast revocation for electronic transactions | 이상호; 심경아 | Conference Paper |
2007 | Cryptanalysis of tripartite and multi-party authenticated key agreement protocols | 우성식; 심경아 | Article |
2008 | Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order | 심경아 | Article |
2007 | Further analysis of ID-based authenticated group key agreement protocol from bilinear maps | 심경아 | Conference Paper |
2006 | Impersonation attacks on key agreement protocols resistant to denial of service attacks | 심경아 | Conference Paper |
1999 | P-Adic heights | 심경아 | Doctoral Thesis |
2007 | Potential weaknesses of AuthA password-authenticated key agreement protocols | 심경아 | Article |
1994 | Riemann Existence Theorem | 심경아 | Master's Thesis |
2008 | Rogue-key attacks on the multi-designated verifiers signature scheme | 심경아 | Article |
2007 | Security analysis of authenticated key exchange protocol based on the q-th root problem | 심경아 | Conference Paper |
2005 | Security analysis of password-authenticated key agreement protocols | 심경아 | Conference Paper |
2006 | Security flaws of remote user access over insecure networks | 심경아 | Article |
2007 | Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions | 심경아 | Article |
1987 | 텔레비젼 유아교육 프로그램에 대한 어린이의 주의집중도와 이해도에 관한 연구 | 심경아 | Master's Thesis |