2013-01 | A Remark on ``Efficient Revocable ID-Based Encryption with a Public Channel" | 서재홍 |
2018-07 | Remarks on the complete synchronization for the Kuramoto model with frustrations | 박진영 |
2014-07 | Revocable Hierarchical Identity Based Encryption | 서재홍 |
2016-02 | Revocable hierarchical identity-based encryption via history-free approach | 서재홍 |
2014-07 | Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions | 서재홍 |
2014-08 | Revocable Identity-Based Encryption with Rejoin Functionality | 서재홍 |
2017-10 | Rigged configuration descriptions of the crystals B(infinity) and B(lambda) for special linear Lie algebras | 이현미 |
2017-03 | A right parallelism relation for mappings to posets | 김희식 |
2014-12 | Risk of adenomas with high-risk characteristics based on two previous colonoscopy | 최정순 |
2015-01 | Robust estimation of support vector regression via residual bootstrap adoption | 차경준 |
2018-11 | Ropelength of superhelices and (2, n)-torus knots | 허영식 |
2015-10 | Rough fuzzy (fuzzy rough) strong H-ideals of hemirings | 김희식 |
2020-03 | Scattered classes of graphs | 권오정 |
2018-12 | 𝒥Script capital HScript capital R-Operator Pairs in C*-Algebra-Valued Modular Metric Spaces and Related Fixed Point Results with Application | 박춘길 |
2018-06 | SDMGRS: Soft Dominance Based Multi Granulation Rough Sets and Their Applications in Conflict Analysis Problems | 박춘길 |
2020-01 | Secure and differentially private logistic regression for horizontally distributed data | 김미란 |
2020-12 | A secure system for genomics clinical decision support | 김미란 |
2014-03 | The Security Weakness of Block Cipher Piccolo against Fault Analysis | 송정환 |
2017-06 | Selective groupoids and frameworks induced by fuzzy subsets | 김희식 |
2016-12 | Semi-Generic Construction of Public Key Encryption and Identity-Based Encryption with Equality Test | 서재홍 |