Showing results 5 to 14 of 14
Issue Date | Title | Author(s) | Type |
---|---|---|---|
2006 | Impersonation attacks on key agreement protocols resistant to denial of service attacks | 심경아 | Conference Paper |
1999 | P-Adic heights | 심경아 | Doctoral Thesis |
2007 | Potential weaknesses of AuthA password-authenticated key agreement protocols | 심경아 | Article |
1994 | Riemann Existence Theorem | 심경아 | Master's Thesis |
2008 | Rogue-key attacks on the multi-designated verifiers signature scheme | 심경아 | Article |
2007 | Security analysis of authenticated key exchange protocol based on the q-th root problem | 심경아 | Conference Paper |
2005 | Security analysis of password-authenticated key agreement protocols | 심경아 | Conference Paper |
2006 | Security flaws of remote user access over insecure networks | 심경아 | Article |
2007 | Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions | 심경아 | Article |
1987 | 텔레비젼 유아교육 프로그램에 대한 어린이의 주의집중도와 이해도에 관한 연구 | 심경아 | Master's Thesis |