Yongdae Kim
Yongdae Kim
Professor of Electrical Engineering, KAIST, Korea
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα kaist.ac.kr - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM conference on Computer and communications …, 2000
7152000
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
6992004
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
3612013
Communication-efficient group key agreement
Y Kim, A Perrig, G Tsudik
Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on …, 2001
3312001
Revisiting random key pre-distribution schemes for wireless sensor networks
J Hwang, Y Kim
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
2822004
On the performance of group key agreement protocols
Y Amir, Y Kim, C Nita-Rotaru, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004
2592004
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
YK Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum ...
Usenix Security, 2015
225*2015
Group key agreement efficient in communication
Y Kim, A Perrig, G Tsudik
IEEE transactions on computers 53 (7), 905-921, 2004
2202004
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010
2122010
Secure group communication using robust contributory key agreement
Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004
1812004
Securing distributed storage: Challenges, techniques, and systems
V Kher, Y Kim
Proceedings of the 2005 ACM workshop on Storage security and survivability, 9-25, 2005
1732005
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
1722005
Batch verifications with ID-based signatures
HJ Yoon, JH Cheon, Y Kim
International Conference on Information Security and Cryptology, 233-248, 2004
1702004
Remote software-based attestation for wireless sensors
M Shaneck, K Mahadevan, V Kher, Y Kim
European Workshop on Security in Ad-hoc and Sensor Networks, 27-41, 2005
1692005
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1362011
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1342017
Admission control in peer groups
Y Kim, D Mazzocchi, G Tsudik
Second IEEE International Symposium on Network Computing and Applications …, 2003
1272003
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1222009
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
EYV Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune
18th Annual Network & Distributed System Security Symposium (NDSS), 2011
121*2011
Privacy preserving nearest neighbor search
M Shaneck, Y Kim, V Kumar
Machine Learning in Cyber Trust, 247-276, 2009
1202009
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20