Kyung‐Ah Shim

1.9k total citations
59 papers, 1.3k citations indexed

About

Kyung‐Ah Shim is a scholar working on Artificial Intelligence, Computer Networks and Communications and Information Systems. According to data from OpenAlex, Kyung‐Ah Shim has authored 59 papers receiving a total of 1.3k indexed citations (citations by other indexed papers that have themselves been cited), including 46 papers in Artificial Intelligence, 33 papers in Computer Networks and Communications and 31 papers in Information Systems. Recurrent topics in Kyung‐Ah Shim's work include Cryptography and Data Security (39 papers), Advanced Authentication Protocols Security (29 papers) and Cryptography and Residue Arithmetic (16 papers). Kyung‐Ah Shim is often cited by papers focused on Cryptography and Data Security (39 papers), Advanced Authentication Protocols Security (29 papers) and Cryptography and Residue Arithmetic (16 papers). Kyung‐Ah Shim collaborates with scholars based in South Korea and Russia. Kyung‐Ah Shim's co-authors include Cheol‐Min Park, Young-Ran Lee, Hwajeong Seo, Dong‐Guk Han, Howon Kim and Boyeon Song and has published in prestigious journals such as SHILAP Revista de lepidopterología, IEEE Communications Surveys & Tutorials and IEEE Access.

In The Last Decade

Kyung‐Ah Shim

57 papers receiving 1.2k citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Kyung‐Ah Shim South Korea 18 859 807 526 406 147 59 1.3k
Arijit Karati Taiwan 11 421 0.5× 492 0.6× 482 0.9× 120 0.3× 63 0.4× 40 781
Alessandro Cilardo Italy 19 319 0.4× 288 0.4× 236 0.4× 370 0.9× 93 0.6× 83 891
Nils Gura United States 12 826 1.0× 494 0.6× 341 0.6× 188 0.5× 121 0.8× 32 1.2k
Odysseas Koufopavlou Greece 21 431 0.5× 881 1.1× 302 0.6× 452 1.1× 482 3.3× 158 1.6k
Daiyuan Peng China 17 624 0.7× 548 0.7× 214 0.4× 563 1.4× 34 0.2× 62 852
Mimi Ma China 11 350 0.4× 552 0.7× 421 0.8× 135 0.3× 134 0.9× 18 828
Shiang‐Feng Tzeng Taiwan 14 481 0.6× 599 0.7× 434 0.8× 499 1.2× 96 0.7× 28 910
He Fang China 15 336 0.4× 338 0.4× 171 0.3× 413 1.0× 98 0.7× 50 817
Stelios Sidiroglou United States 17 923 1.1× 591 0.7× 504 1.0× 435 1.1× 65 0.4× 33 1.7k

Countries citing papers authored by Kyung‐Ah Shim

Since Specialization
Citations

This map shows the geographic impact of Kyung‐Ah Shim's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Kyung‐Ah Shim with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Kyung‐Ah Shim more than expected).

Fields of papers citing papers by Kyung‐Ah Shim

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Kyung‐Ah Shim. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Kyung‐Ah Shim. The network helps show where Kyung‐Ah Shim may publish in the future.

Co-authorship network of co-authors of Kyung‐Ah Shim

This figure shows the co-authorship network connecting the top 25 collaborators of Kyung‐Ah Shim. A scholar is included among the top collaborators of Kyung‐Ah Shim based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Kyung‐Ah Shim. Kyung‐Ah Shim is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Shim, Kyung‐Ah. (2024). Cryptanalysis of Compact Certificateless Aggregate Signature Schemes for HWMSNs and VANETs. IEEE Access. 12. 137634–137641. 2 indexed citations
2.
Shim, Kyung‐Ah, et al.. (2024). Security Analysis of Reusing Vinegar Values in UOV Signature Scheme. IEEE Access. 12. 137412–137417.
3.
Shim, Kyung‐Ah. (2023). Security Analysis of Conditional Privacy-Preserving Authentication Schemes for VANETs. IEEE Access. 11. 33956–33963. 8 indexed citations
4.
Shim, Kyung‐Ah. (2021). A Survey on Post-Quantum Public-Key Signature Schemes for Secure Vehicular Communications. IEEE Transactions on Intelligent Transportation Systems. 23(9). 14025–14042. 36 indexed citations
5.
Shim, Kyung‐Ah. (2020). Cryptanalysis of Two Signature Schemes for IoT-Based Mobile Payments and Healthcare Wireless Medical Sensor Networks. IEEE Access. 8. 167203–167208. 9 indexed citations
6.
Shim, Kyung‐Ah. (2018). Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes. IEEE Access. 6. 68804–68812. 3 indexed citations
7.
Shim, Kyung‐Ah, et al.. (2018). Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations. SHILAP Revista de lepidopterología. 7 indexed citations
8.
Shim, Kyung‐Ah. (2017). Comments on "A Cross-Layer Approach to Privacy-Preserving Authentication in WAVE-Enabled VANETs" by Biswas and Mišić. IEEE Transactions on Vehicular Technology. 66(11). 10588–10589. 6 indexed citations
9.
Shim, Kyung‐Ah, et al.. (2017). Cryptanalysis of RGB, a mixed multivariate signature scheme. Finite Fields and Their Applications. 45. 406–421. 2 indexed citations
10.
Shim, Kyung‐Ah. (2015). A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks. IEEE Communications Surveys & Tutorials. 18(1). 577–601. 85 indexed citations
11.
Shim, Kyung‐Ah. (2014). S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks. Ad Hoc Networks. 19. 1–8. 42 indexed citations
12.
Shim, Kyung‐Ah. (2014). An efficient ring signature scheme from pairings. Information Sciences. 300. 63–69. 15 indexed citations
13.
Shim, Kyung‐Ah. (2014). On delegatability of designated verifier signature schemes. Information Sciences. 281. 365–372. 9 indexed citations
14.
Shim, Kyung‐Ah. (2012). Security Flaws in Three Password-Based Remote User Authentication Schemes with Smart Cards. Cryptologia. 36(1). 62–69. 13 indexed citations
15.
Shim, Kyung‐Ah. (2012). ${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks. IEEE Transactions on Vehicular Technology. 61(4). 1874–1883. 283 indexed citations
16.
Shim, Kyung‐Ah. (2012). Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols. IEEE Communications Letters. 16(4). 554–556. 9 indexed citations
17.
Shim, Kyung‐Ah. (2011). On the Security of a Certificateless Aggregate Signature Scheme. IEEE Communications Letters. 15(10). 1136–1138. 16 indexed citations
18.
Shim, Kyung‐Ah. (2010). An ID-based aggregate signature scheme with constant pairing computations. Journal of Systems and Software. 83(10). 1873–1880. 68 indexed citations
19.
Shim, Kyung‐Ah. (2005). Off-line password-guessing attacks on the generalized key agreement and password authentication protocol. Applied Mathematics and Computation. 169(1). 511–515. 1 indexed citations
20.
Shim, Kyung‐Ah & Young-Ran Lee. (2005). Security flaws in authentication and key establishment protocols for mobile communications. Applied Mathematics and Computation. 169(1). 62–74. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026