2009 | ||
---|---|---|
36 | EE | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim: Towards complete node enumeration in a peer-to-peer botnet. ASIACCS 2009: 23-34 |
2008 | ||
35 | Yongdae Kim, William Yurcik: Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008 ACM 2008 | |
34 | EE | Yongdae Kim, Byounguk Sohn, Woosub Youm, Jongkyu Jung, Jonghyun Lee, Kyihwan Park: Voice coil motor nano stage with an eddy current damper. ICARCV 2008: 1714-1717 |
33 | EE | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov: Provably Secure Timed-Release Public Key Encryption. ACM Trans. Inf. Syst. Secur. 11(2): (2008) |
32 | EE | Joengmin Hwang, Tian He, Yongdae Kim: Secure localization with phantom node detection. Ad Hoc Networks 6(7): 1031-1050 (2008) |
2007 | ||
31 | EE | Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim: Combating Double-Spending Using Cooperative P2P Systems. ICDCS 2007: 41 |
30 | EE | Joengmin Hwang, Tian He, Yongdae Kim: Detecting Phantom Nodes in Wireless Sensor Networks. INFOCOM 2007: 2391-2395 |
29 | EE | Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim: Realistic Sensing Area Modeling. INFOCOM 2007: 2421-2425 |
28 | EE | Vishal Kher, Yongdae Kim: Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. SRDS 2007: 55-64 |
27 | EE | Joengmin Hwang, Tian He, Yongdae Kim: Exploring in-situ sensing irregularity in wireless sensor networks. SenSys 2007: 289-303 |
2006 | ||
26 | EE | Jason Kealey, Yongdae Kim, Daniel Amyot, Gunter Mussbacher: Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System. CCECE 2006: 2432-2435 |
25 | EE | Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov: Timed-Release and Key-Insulated Public Key Encryption. Financial Cryptography 2006: 191-205 |
24 | EE | Mark Shaneck, Yongdae Kim, Vipin Kumar: Privacy Preserving Nearest Neighbor Search. ICDM Workshops 2006: 541-545 |
23 | EE | Joengmin Hwang, Tian He, Yongdae Kim: Achieving realistic sensing area modeling. SenSys 2006: 415-416 |
22 | EE | Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee: Privacy Protection in PKIs: A Separation-of-Authority Approach. WISA 2006: 297-311 |
2005 | ||
21 | EE | Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon: Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. ACNS 2005: 17-32 |
20 | EE | Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim: Remote Software-Based Attestation for Wireless Sensors. ESAS 2005: 27-41 |
19 | EE | Vishal Kher, Yongdae Kim: Securing distributed storage: challenges, techniques, and systems. StorageSS 2005: 9-25 |
2004 | ||
18 | EE | HyoJin Yoon, Jung Hee Cheon, Yongdae Kim: Batch Verifications with ID-Based Signatures. ICISC 2004: 233-248 |
17 | EE | Joengmin Hwang, Yongdae Kim: Revisiting random key pre-distribution schemes for wireless sensor networks. SASN 2004: 43-52 |
16 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) |
15 | EE | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) |
14 | EE | Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini: Design and implementation of a secure multi-agent marketplace. Electronic Commerce Research and Applications 3(4): 355-368 (2004) |
13 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) |
12 | EE | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik: Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distrib. Syst. 15(5): 468-480 (2004) |
2003 | ||
11 | EE | Sangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu: An Efficient Tree-Based Group Key Agreement Using Bilinear Map. ACNS 2003: 357-371 |
10 | EE | Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini: Security model for a multi-agent marketplace. ICEC 2003: 119-124 |
9 | EE | Vishal Kher, Yongdae Kim: Decentralized Authentication Mechanisms for Object-based Storage Devices. IEEE Security in Storage Workshop 2003: 1-10 |
8 | EE | Yongdae Kim, Daniele Mazzocchi, Gene Tsudik: Admission Control in Peer Groups. NCA 2003: 131-139 |
2002 | ||
7 | EE | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 |
6 | EE | Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik: Secure Group Services for Storage Area Networks. IEEE Security in Storage Workshop 2002: 80-93 |
2001 | ||
5 | EE | Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik: Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 |
4 | Yongdae Kim, Adrian Perrig, Gene Tsudik: Communication-Efficient Group Key Agreement. SEC 2001: 229-244 | |
2000 | ||
3 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. ACM Conference on Computer and Communications Security 2000: 235-244 |
2 | EE | Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik: Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343 |
1996 | ||
1 | Yongdae Kim, Sangjin Lee, Choonsik Park: On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. CARDIS 1996 |