Follow
Yongdae Kim
Yongdae Kim
Professor of Electrical Engineering, KAIST, Korea
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM conference on Computer and communications …, 2000
7392000
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7152004
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
4132013
Communication-efficient group key agreement
Y Kim, A Perrig, G Tsudik
Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on …, 2001
3402001
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
YK Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum ...
Usenix Security, 2015
289*2015
Revisiting random key pre-distribution schemes for wireless sensor networks
J Hwang, Y Kim
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
2862004
On the performance of group key agreement protocols
Y Amir, Y Kim, C Nita-Rotaru, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004
2582004
Group key agreement efficient in communication
Y Kim, A Perrig, G Tsudik
IEEE transactions on computers 53 (7), 905-921, 2004
2322004
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010
2292010
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
1902005
Securing distributed storage: Challenges, techniques, and systems
V Kher, Y Kim
Proceedings of the 2005 ACM workshop on Storage security and survivability, 9-25, 2005
1882005
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1872017
Secure group communication using robust contributory key agreement
Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004
1812004
Remote software-based attestation for wireless sensors
M Shaneck, K Mahadevan, V Kher, Y Kim
European Workshop on Security in Ad-hoc and Sensor Networks, 27-41, 2005
1802005
Batch verifications with ID-based signatures
HJ Yoon, JH Cheon, Y Kim
International Conference on Information Security and Cryptology, 233-248, 2004
1732004
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1502011
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
H Shin, D Kim, Y Kwon, Y Kim
International Conference on Cryptographic Hardware and Embedded Systems, 445-467, 2017
1372017
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
EYV Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune
18th Annual Network & Distributed System Security Symposium (NDSS), 2011
137*2011
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1322009
Admission control in peer groups
Y Kim, D Mazzocchi, G Tsudik
Second IEEE International Symposium on Network Computing and Applications …, 2003
1292003
The system can't perform the operation now. Try again later.
Articles 1–20