Suppression of scar formation in a murine burn wound model by the application of non-thermal plasma
D.H. Lee, J.-O. Lee, W. Jeon, I.-G. Choi, J.-S. Kim, J.H. Jeong, T.-C. Kang, and C.H. Seo | Applied Physics Letters 99 (2011)
Security pitfalls of the certificateless signature and multi-receiver signcryption schemes
Kyung-Ah Shim, Young-Ran Lee | Fundamenta Informaticae 112 (2011)
Optimal pairing computation over families of pairing-friendly Elliptic curves
Soo-Kyung Eom, Hyang-Sook Lee and Cheol-Min Park | Applicable Algebra in Engineering, Communication and Computing 22 (2011)
Security Analysis of Three Password Authentication Schemes
Kyung-Ah Shim | Journal of Universal Computer Science 17 (2011)
Short Designated Verifier Proxy Signatures
Kyung-Ah Shim | Computers & Electrical Engineering 37 (2011)
Pairing-Friendly Curves with Minimal Security Loss by Cheon's Algorithm
Cheol-Min Park ; HyangSook Lee | ETRI Journal 33 (2011)
Cryptanalysis of a quadratic compact knapsack public-key cryptosystem
Moon Sung Lee | Computers & Mathematics with Applications 62 (2011)
On the security of certificateless aggregate signature scheme
Kyung-Ah Sim | IEEE Communications Letters 15 (2011)
Security Improvement of an RFID security protocol of ISO/IEC WD 29167-6
B. Song, J. Y. Hwang and K. A. Shim | IEEE Communications Letters 15 (2011)