Search results for: Kyung-Ah Shim
IEEE Transactions on Vehicular Technology > 2017 > 66 > 11 > 10588 - 10589
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 7 > 1545 - 1554
Finite Fields and Their Applications > 2017 > 45 > C > 406-421
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 410-419
Lecture Notes in Computer Science > Trust, Privacy, and Security in Digital Business > Digital Signature > 216-225
Lecture Notes in Computer Science > Information and Communications Security > Applied Crytography > 60-71
IEEE Communications Surveys & Tutorials > 2016 > 18 > 1 > 577 - 601
IEEE Transactions on Parallel and Distributed Systems > 2015 > 26 > 8 > 2128 - 2139
Information Sciences > 2015 > 300 > Complete > 63-69
Information Sciences > 2015 > 296 > Complete > 315-321
Information Sciences > 2014 > 281 > Complete > 365-372
Ad Hoc Networks > 2014 > 19 > Complete > 1-8
Annals of Telecommunications > 2014 > 69 > 11-12 > 585-591
IEEE Transactions on Wireless Communications > 2013 > 12 > 11 > 5386 - 5393
Ad Hoc Networks > 2013 > 11 > 1 > 182-189
Information Sciences > 2012 > 186 > 1 > 239-248
IEEE Communications Letters > 2012 > 16 > 4 > 554 - 556
IEEE Transactions on Vehicular Technology > 2012 > 61 > 4 > 1874 - 1883
Computers and Electrical Engineering > 2011 > 37 > 2 > 180-186