Showing results 2 to 10 of 10
Issue Date | Title | Author(s) | Type |
---|---|---|---|
2008 | Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order | 심경아 | Article |
2007 | Further analysis of ID-based authenticated group key agreement protocol from bilinear maps | 심경아 | Conference Paper |
2006 | Impersonation attacks on key agreement protocols resistant to denial of service attacks | 심경아 | Conference Paper |
2007 | Potential weaknesses of AuthA password-authenticated key agreement protocols | 심경아 | Article |
2008 | Rogue-key attacks on the multi-designated verifiers signature scheme | 심경아 | Article |
2007 | Security analysis of authenticated key exchange protocol based on the q-th root problem | 심경아 | Conference Paper |
2005 | Security analysis of password-authenticated key agreement protocols | 심경아 | Conference Paper |
2006 | Security flaws of remote user access over insecure networks | 심경아 | Article |
2007 | Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions | 심경아 | Article |