Seguir
Yongdae Kim
Yongdae Kim
Professor of Electrical Engineering, KAIST, Korea
Dirección de correo verificada de kaist.ac.kr - Página principal
Título
Citado por
Citado por
Año
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7662004
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM conference on Computer and communications …, 2000
7462000
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
5272013
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
YK Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum ...
Usenix Security, 2015
444*2015
Communication-efficient group key agreement
Y Kim, A Perrig, G Tsudik
Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on …, 2001
3442001
Revisiting random key pre-distribution schemes for wireless sensor networks
J Hwang, Y Kim
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
2962004
On the performance of group key agreement protocols
Y Amir, Y Kim, C Nita-Rotaru, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004
2652004
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2642017
Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications
H Shin, D Kim, Y Kwon, Y Kim
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
2602017
Group key agreement efficient in communication
Y Kim, A Perrig, G Tsudik
IEEE transactions on computers 53 (7), 905-921, 2004
2552004
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010
2402010
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
2192005
Securing distributed storage: Challenges, techniques, and systems
V Kher, Y Kim
Proceedings of the 2005 ACM workshop on Storage security and survivability, 9-25, 2005
2182005
Remote software-based attestation for wireless sensors
M Shaneck, K Mahadevan, V Kher, Y Kim
European Workshop on Security in Ad-hoc and Sensor Networks, 27-41, 2005
1892005
Batch verifications with ID-based signatures
HJ Yoon, JH Cheon, Y Kim
International Conference on Information Security and Cryptology, 233-248, 2004
1802004
Secure group communication using robust contributory key agreement
Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004
1782004
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1552011
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
EYV Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune
18th Annual Network & Distributed System Security Symposium (NDSS), 2011
151*2011
Touching the untouchables: Dynamic security analysis of the lte control plane
H Kim, J Lee, E Lee, Y Kim
2019 IEEE Symposium on Security and Privacy (SP), 1153-1168, 2019
1492019
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1432009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20