Seguir
Yongdae Kim
Yongdae Kim
Professor of Electrical Engineering, KAIST, Korea
Dirección de correo verificada de kaist.ac.kr - Página principal
Título
Citado por
Citado por
Año
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7622004
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM conference on Computer and communications …, 2000
7472000
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
5122013
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
YK Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum ...
Usenix Security, 2015
430*2015
Communication-efficient group key agreement
Y Kim, A Perrig, G Tsudik
Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on …, 2001
3462001
Revisiting random key pre-distribution schemes for wireless sensor networks
J Hwang, Y Kim
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
2922004
On the performance of group key agreement protocols
Y Amir, Y Kim, C Nita-Rotaru, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004
2622004
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2592017
Group key agreement efficient in communication
Y Kim, A Perrig, G Tsudik
IEEE transactions on computers 53 (7), 905-921, 2004
2532004
Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications
H Shin, D Kim, Y Kwon, Y Kim
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
2422017
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010
2392010
Securing distributed storage: Challenges, techniques, and systems
V Kher, Y Kim
Proceedings of the 2005 ACM workshop on Storage security and survivability, 9-25, 2005
2182005
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
2122005
Remote software-based attestation for wireless sensors
M Shaneck, K Mahadevan, V Kher, Y Kim
European Workshop on Security in Ad-hoc and Sensor Networks, 27-41, 2005
1832005
Secure group communication using robust contributory key agreement
Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004
1802004
Batch verifications with ID-based signatures
HJ Yoon, JH Cheon, Y Kim
International Conference on Information Security and Cryptology, 233-248, 2004
1782004
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1542011
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
EYV Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune
18th Annual Network & Distributed System Security Symposium (NDSS), 2011
147*2011
Touching the untouchables: Dynamic security analysis of the lte control plane
H Kim, J Lee, E Lee, Y Kim
2019 IEEE Symposium on Security and Privacy (SP), 1153-1168, 2019
1452019
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1422009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20