Skip to main content

and
  1. Article

    Open Access

    Clinical pitfalls and serological diagnostics of MuSK myasthenia gravis

    We aimed to evaluate the diagnostic accuracy of enzyme-linked immunosorbent assay (ELISA) for anti-muscle specific tyrosine kinase (MuSK) antibody (Ab) in a large cohort of anti-acetylcholine receptor (AChR) A...

    Young Nam Kwon, Mark Woodhall, Jung-Joon Sung, Kwang-Kuk Kim in Journal of Neurology (2023)

  2. No Access

    Article

    Integrated analysis of miRNA and mRNA reveals that acrolein modulates GPI anchor biosynthesis in human primary endothelial cells

    Acrolein (ACR) is a highly reactive α, β-unsaturated carbonyl compound that is related to several diabetic vascular complications. ACR, a ubiquitous aldehyde pollutant, is a product of incomplete combustion re...

    Hana Yang, Seung Eun Lee, Sanggon Lee, Jeong-Je Cho, Hyun-Jong Ahn in BioChip Journal (2013)

  3. No Access

    Chapter and Conference Paper

    Cryptanalytic Flaws in Oh et al.’s ID-Based Authenticated Key Agreement Protocol

    A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which is used to preserve confidentiality and data integrity over an open network. In 2007, Oh et al. proposed a...

    Meng-Hui Lim, Sanggon Lee, Hoonjae Lee in Computational Science and Its Applications… (2008)

  4. Chapter and Conference Paper

    A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves

    Key agreement protocol is of fundamental importance in providing data confidentiality and integrity between two or more parties over an insecure network. In 2004, Popescu [14] proposed an authenticated key agr...

    Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee in NETWORKING 2008 Ad Hoc and Sensor Networks… (2008)

  5. No Access

    Chapter and Conference Paper

    An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol

    A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...

    Meng-Hui Lim, Sanggon Lee, Youngho Park in Computational Science and Its Applications… (2007)

  6. No Access

    Chapter and Conference Paper

    An Enhanced ID-Based Deniable Authentication Protocol on Pairings

    Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken part in a particular protocol run. Lately, Chou et al. had proposed their ID-based ...

    Meng-Hui Lim, Sanggon Lee, Youngho Park in Computational Science and Its Applications… (2007)

  7. No Access

    Chapter and Conference Paper

    A Secure DRM Framework for User’s Domain and Key Management

    Digital rights management(DRM) systems are used to control the use and distribution of copyrighted content. OMA specification creates devices collection of domain, and the use of contents is free in this domai...

    **heung Lee, Sanggon Lee, Sanguk Shin in Autonomic and Trusted Computing (2007)

  8. No Access

    Chapter and Conference Paper

    Cryptanalysis of Tso et al.’s ID-Based Tripartite Authenticated Key Agreement Protocol

    A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to prese...

    Meng-Hui Lim, Sanggon Lee, Sangjae Moon in Information Systems Security (2007)

  9. Chapter and Conference Paper

    Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves

    Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...

    Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon in Selected Areas in Cryptography (2006)