Follow
Yongdae Kim
Yongdae Kim
Professor of Electrical Engineering, KAIST, Korea
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM conference on Computer and communications …, 2000
7422000
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7282004
Ghost talk: Mitigating EMI signal injection attacks against analog sensors
DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu
2013 IEEE Symposium on Security and Privacy, 145-159, 2013
4422013
Communication-efficient group key agreement
Y Kim, A Perrig, G Tsudik
Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on …, 2001
3442001
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
YK Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum ...
Usenix Security, 2015
333*2015
Revisiting random key pre-distribution schemes for wireless sensor networks
J Hwang, Y Kim
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
2862004
On the performance of group key agreement protocols
Y Amir, Y Kim, C Nita-Rotaru, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004
2602004
Group key agreement efficient in communication
Y Kim, A Perrig, G Tsudik
IEEE transactions on computers 53 (7), 905-921, 2004
2392004
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010
2362010
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Y Kwon, D Kim, Y Son, E Vasserman, Y Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2222017
Securing distributed storage: Challenges, techniques, and systems
V Kher, Y Kim
Proceedings of the 2005 ACM workshop on Storage security and survivability, 9-25, 2005
1962005
A machine learning framework for network anomaly detection using SVM and GA
T Shon, Y Kim, C Lee, J Moon
Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005
1932005
Remote software-based attestation for wireless sensors
M Shaneck, K Mahadevan, V Kher, Y Kim
European Workshop on Security in Ad-hoc and Sensor Networks, 27-41, 2005
1822005
Secure group communication using robust contributory key agreement
Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004
1782004
Batch verifications with ID-based signatures
HJ Yoon, JH Cheon, Y Kim
International Conference on Information Security and Cryptology, 233-248, 2004
1772004
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
H Shin, D Kim, Y Kwon, Y Kim
International Conference on Cryptographic Hardware and Embedded Systems, 445-467, 2017
1682017
Keep your friends close: Incorporating trust into social network-based sybil defenses
A Mohaisen, N Hopper, Y Kim
2011 Proceedings IEEE INFOCOM, 1943-1951, 2011
1512011
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
EYV Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune
18th Annual Network & Distributed System Security Symposium (NDSS), 2011
141*2011
Scalable onion routing with torsk
J McLachlan, A Tran, N Hopper, Y Kim
Proceedings of the 16th ACM conference on Computer and communications …, 2009
1342009
Admission control in peer groups
Y Kim, D Mazzocchi, G Tsudik
Second IEEE International Symposium on Network Computing and Applications …, 2003
1282003
The system can't perform the operation now. Try again later.
Articles 1–20