Browsing "수학전공" byIssue Date

Jump to a point in the index:
Or type in a year:
  • Sort by:
  • In order:
  • Results/Page
  • Authors/Record:

Showing results 461 to 480 of 615

Issue DateTitleAuthor(s)Type
2008Absolute zeta functionsShinya KoyamaArticle
2008Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order심경아Article
2008Rogue-key attacks on the multi-designated verifiers signature scheme심경아Article
2008Some remarks on Eisenstein's criterion우성식Article
2008Hurwitz number of triple Ramified covers조용승Article
2008Singularities in geodesic surface congruence조용승; 홍순태Article
2008Algorithm 883: SparsePOP - A sparse semidefinite programming relaxation of polynomial optimization problems김선영Article
2008Correlative sparsity in primal-dual interior-point methods for LP, SDP, and SOCP김선영Article
2008Sparse second order cone programming formulations for convex optimization problems김선영Article
2008On rank-one perturbations of normal operators, II고응일Article
2008Some connections between an operator and its Helton class고응일; 이지은Article
2008Determining the locations and discontinuities in the derivatives of functions윤정호Article
2008Eta pairing computation on general divisors over hyperelliptic curves y2 = xp - x + d이향숙; 이윤진Article
2008Construction of self-dual codes over finite rings Zpm이혜숙; 이윤진Article
2008Tate pairing computation on the divisors of hyperelliptic curves of genus 2이윤진Article
2008Reflection theorem for divisor class groups of relative quadratic function fields이윤진Article
2008New MDS or Near-MDS self-dual codes이윤진Article
2007Further analysis of ID-based authenticated group key agreement protocol from bilinear maps심경아Conference Paper
2007Security analysis of authenticated key exchange protocol based on the q-th root problem심경아Conference Paper
2007Potential weaknesses of AuthA password-authenticated key agreement protocols심경아Article

BROWSE