Daeyoung Kim
Daeyoung Kim
Verified email at kennesaw.edu - Homepage
Cited by
Cited by
Seeing is believing: Sharing real-time visual traffic information via vehicular clouds
D Kwak, R Liu, D Kim, B Nath, L Iftode
IEEE Access 4, 3617-3631, 2016
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
Detecting plagiarized mobile apps using API birthmarks
D Kim, A Gokhale, V Ganapathy, A Srivastava
Automated Software Engineering 23 (4), 591-618, 2016
DoppelDriver: Counterfactual Actual Travel Times for Alternative Routes
D Kwak, D Kim, R Liu, B Nath, L Iftode
PerCom, 2015
Tweeting traffic image reports on the road
D Kwak, D Kim, R Liu, L Iftode, B Nath
6th International Conference on Mobile Computing, Applications and Services …, 2014
A privacy protecting UMTS AKA protocol providing perfect forward secrecy
D Kim, Y Cui, S Kim, H Oh
Computational Science and Its Applications–ICCSA 2007, 987-995, 2007
Data-driven inference of API mappings
A Gokhale, D Kim, V Ganapathy
Proceedings of the 2nd Workshop on Programming for Mobile & Touch, 29-32, 2014
Recent advances in smart contracts: A technical overview and state of the art
VY Kemmoe, W Stone, J Kim, D Kim, J Son
IEEE Access 8, 117782-117801, 2020
Regulating smart personal devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
A practical way to provide perfect forward secrecy for secure e-mail protocols
S Kim, C Lee, D Kim, H Oh
Distributed Computing and Internet Technology, 327-335, 2007
Regulating Smart Devices in Restricted Spaces
D Kim
School of Graduate Studies Rutgers, The State University of New Jersey, 2019
Practical Secure E-mail Protocols Providing Perfect Forward Secrecy
CY Lee, DY Kim, DH Shim, SJ Kim, HK Oh
Journal of the Korea Institute of Information Security & Cryptology 17 (5 …, 2007
The system can't perform the operation now. Try again later.
Articles 1–12