이상희, 지창우, 전태수 | Journal of Environmental Toxicology 2009/24 (2009)
Sang-Hee Lee, N. -Y. Su, and M. Lee | Journal of Asia pacific entomology 12/3 (2009)
Strongly Secure Authenticated Key Exchange without NAXOS’ Approach
Minkyu KimAtsushi FujiokaBerkant Ustao?lu | IWSEC 2009 2009 (2009)
Breaking Two k-Resilient Traitor Tracing Schems with Sublinear Ciphertext Size
MoonShik LeeDaegun MaMinJae Seo | ACNS 2009 2009 (2009)
Application of Hecke Operator to Generalized Dedkind Eta Functions
Mehmet Acikgoza, Ismail Naci Cangulb, Daeyeoul Kimc, and Yilmaz Simsekd | AIP Conference Proceedings 1168/1 (2009)
Security Analysis of Two Certificateless Signature Schemes
심경아, 이주희, 이향숙 | Journal of the Korea Institute of Information Security & Cryptology (정보보호학회논문지) 19/6 (2009)
Decomposition theorem on G-space
Taeyoung Choi and J.Kim | Osaka Journal of Mathematics 46-1 (2009)
Yeol Je Cho; Xiaolong Qin; Jung Im Kang | Nonlinear Analysis: Theory, Methods & Applications 71-9 (2009)
Strong convergence theorems for an infinite family of nonexpansive mapping in Banach spaces
X. Qin, Y. J. Cho, J. I. Kang, S. M. Kang, | Journal of Computational and Applied Mathematics 230-1 (2009)
Ghost matrices and a characterization of symmetric Sobolev bilinear forms
K. H. Kwon, L. L. Littlejohn, and Gang Joon. Yoon | Linear Algebra and its Applications 431-1~2 (2009)