2009 |
36 | EE | Brent ByungHoon Kang,
Eric Chan-Tin,
Christopher P. Lee,
James Tyra,
Hun Jeong Kang,
Chris Nunnery,
Zachariah Wadler,
Greg Sinclair,
Nicholas Hopper,
David Dagon,
Yongdae Kim:
Towards complete node enumeration in a peer-to-peer botnet.
ASIACCS 2009: 23-34 |
2008 |
35 | | Yongdae Kim,
William Yurcik:
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, StorageSS 2008, Alexandria, VA, USA, October 31, 2008
ACM 2008 |
34 | EE | Yongdae Kim,
Byounguk Sohn,
Woosub Youm,
Jongkyu Jung,
Jonghyun Lee,
Kyihwan Park:
Voice coil motor nano stage with an eddy current damper.
ICARCV 2008: 1714-1717 |
33 | EE | Jung Hee Cheon,
Nicholas Hopper,
Yongdae Kim,
Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption.
ACM Trans. Inf. Syst. Secur. 11(2): (2008) |
32 | EE | Joengmin Hwang,
Tian He,
Yongdae Kim:
Secure localization with phantom node detection.
Ad Hoc Networks 6(7): 1031-1050 (2008) |
2007 |
31 | EE | Ivan Osipkov,
Eugene Y. Vasserman,
Nicholas Hopper,
Yongdae Kim:
Combating Double-Spending Using Cooperative P2P Systems.
ICDCS 2007: 41 |
30 | EE | Joengmin Hwang,
Tian He,
Yongdae Kim:
Detecting Phantom Nodes in Wireless Sensor Networks.
INFOCOM 2007: 2391-2395 |
29 | EE | Joengmin Hwang,
Yu Gu,
Tian He,
Yongdae Kim:
Realistic Sensing Area Modeling.
INFOCOM 2007: 2421-2425 |
28 | EE | Vishal Kher,
Yongdae Kim:
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage.
SRDS 2007: 55-64 |
27 | EE | Joengmin Hwang,
Tian He,
Yongdae Kim:
Exploring in-situ sensing irregularity in wireless sensor networks.
SenSys 2007: 289-303 |
2006 |
26 | EE | Jason Kealey,
Yongdae Kim,
Daniel Amyot,
Gunter Mussbacher:
Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System.
CCECE 2006: 2432-2435 |
25 | EE | Jung Hee Cheon,
Nicholas Hopper,
Yongdae Kim,
Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption.
Financial Cryptography 2006: 191-205 |
24 | EE | Mark Shaneck,
Yongdae Kim,
Vipin Kumar:
Privacy Preserving Nearest Neighbor Search.
ICDM Workshops 2006: 541-545 |
23 | EE | Joengmin Hwang,
Tian He,
Yongdae Kim:
Achieving realistic sensing area modeling.
SenSys 2006: 415-416 |
22 | EE | Taekyoung Kwon,
Jung Hee Cheon,
Yongdae Kim,
Jaeil Lee:
Privacy Protection in PKIs: A Separation-of-Authority Approach.
WISA 2006: 297-311 |
2005 |
21 | EE | Peng Wang,
Yongdae Kim,
Vishal Kher,
Taekyoung Kwon:
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks.
ACNS 2005: 17-32 |
20 | EE | Mark Shaneck,
Karthikeyan Mahadevan,
Vishal Kher,
Yongdae Kim:
Remote Software-Based Attestation for Wireless Sensors.
ESAS 2005: 27-41 |
19 | EE | Vishal Kher,
Yongdae Kim:
Securing distributed storage: challenges, techniques, and systems.
StorageSS 2005: 9-25 |
2004 |
18 | EE | HyoJin Yoon,
Jung Hee Cheon,
Yongdae Kim:
Batch Verifications with ID-Based Signatures.
ICISC 2004: 233-248 |
17 | EE | Joengmin Hwang,
Yongdae Kim:
Revisiting random key pre-distribution schemes for wireless sensor networks.
SASN 2004: 43-52 |
16 | EE | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Tree-based group key agreement.
ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) |
15 | EE | Yair Amir,
Yongdae Kim,
Cristina Nita-Rotaru,
Gene Tsudik:
On the performance of group key agreement protocols.
ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) |
14 | EE | Ashutosh Jaiswal,
Yongdae Kim,
Maria L. Gini:
Design and implementation of a secure multi-agent marketplace.
Electronic Commerce Research and Applications 3(4): 355-368 (2004) |
13 | EE | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Group Key Agreement Efficient in Communication.
IEEE Trans. Computers 53(7): 905-921 (2004) |
12 | EE | Yair Amir,
Yongdae Kim,
Cristina Nita-Rotaru,
John L. Schultz,
Jonathan Robert Stanton,
Gene Tsudik:
Secure Group Communication Using Robust Contributory Key Agreement.
IEEE Trans. Parallel Distrib. Syst. 15(5): 468-480 (2004) |
2003 |
11 | EE | Sangwon Lee,
Yongdae Kim,
Kwangjo Kim,
DaeHyun Ryu:
An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
ACNS 2003: 357-371 |
10 | EE | Ashutosh Jaiswal,
Yongdae Kim,
Maria L. Gini:
Security model for a multi-agent marketplace.
ICEC 2003: 119-124 |
9 | EE | Vishal Kher,
Yongdae Kim:
Decentralized Authentication Mechanisms for Object-based Storage Devices.
IEEE Security in Storage Workshop 2003: 1-10 |
8 | EE | Yongdae Kim,
Daniele Mazzocchi,
Gene Tsudik:
Admission Control in Peer Groups.
NCA 2003: 131-139 |
2002 |
7 | EE | Yair Amir,
Yongdae Kim,
Cristina Nita-Rotaru,
Gene Tsudik:
On the Performance of Group Key Agreement Protocols.
ICDCS 2002: 463-464 |
6 | EE | Yongdae Kim,
Maithili Narasimha,
Fabio Maino,
Gene Tsudik:
Secure Group Services for Storage Area Networks.
IEEE Security in Storage Workshop 2002: 80-93 |
2001 |
5 | EE | Yair Amir,
Cristina Nita-Rotaru,
John L. Schultz,
Jonathan Robert Stanton,
Yongdae Kim,
Gene Tsudik:
Exploring Robustness in Group Key Agreement.
ICDCS 2001: 399-408 |
4 | | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Communication-Efficient Group Key Agreement.
SEC 2001: 229-244 |
2000 |
3 | EE | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Simple and fault-tolerant key agreement for dynamic collaborative groups.
ACM Conference on Computer and Communications Security 2000: 235-244 |
2 | EE | Jonathan Robert Stanton,
Yair Amir,
Damian Hasse,
Giuseppe Ateniese,
Yongdae Kim,
Cristina Nita-Rotaru,
Theo Schlossnagle,
John L. Schultz,
Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
ICDCS 2000: 330-343 |
1996 |
1 | | Yongdae Kim,
Sangjin Lee,
Choonsik Park:
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications.
CARDIS 1996 |