Browse "School of Electrical Engineering(전기및전자공학부)" by Author 1872

Showing results 21 to 46 of 46

21
Membership-concealing overlay networks

Vasserman, Eugene; Jansen, Rob; Tyra, James; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11

22
On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage,

Yun, A; Shi, C; Kim, Yongdae, The ACM Cloud Computing Security Workshop (CCSW), 2009 , ACM, 2009-11-13

23
On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application

Kim, Yongdae; Lee, S.; Park, S., CARDIS, Smart Card Research and Advanced Application: Second International Conference, CARDIS, 1996-09

24
On the Mixing Time of Directed Social Graphs and Security Implications

Mohaisen, Abedelaziz; Tran, Huy; Hopper, Nicholas; Kim, Yongdae, ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012), ACM/SIGSAC, 2012-10

25
One-way indexing for plausible deniability in censorship resistant storage

Vasserman, Eugene Y.; Heorhiadi, Victor; Hopper, Nicholas; Kim, Yongdae, USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), USENIX, 2012-08-06

26
Privacy Preserving Nearest Neighbor Search

Shaneck, M; Kim, Yongdae; Kumar, V, IEEE International Workshop on Privacy Aspects of Data Mining, IEEE, 2006-12-18

27
Privacy Protection in PKIs: A Separation-of-Authority Approach

Kwon, T; Cheon, J; Kim, Yongdae; Lee, J, 7th International Workshop on Information Security Applications (WISA) 2006., Korea Institute of Information Security and cryptology(KIISC), 2006-08

28
Realistic Sensing Area Modeling

Hwang, J; Gu, Y; He, T; Kim, Yongdae, IEEE Infocom 2007 Minisymposia, IEEE, 2007-05

29
Recruiting New Tor Relays with BRAIDS

Jansen, Rob; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS) 2010. , ACM, 2010-10

30
Remote Software-based Attestation for Wireless Sensors.

Shaneck, M; Mahadevan, K; Kher, V; Kim, Yongdae, ESAS 2005. , IEEE, 2005-07

31
Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks

Hwang, Joengmin; Kim, Yongdae, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), ACM, 2004-10

32
Robust Accounting in Decentralized P2P Storage Systems

Osipkov, I; Wang, P; Hopper, N; Kim, Yongdae, The 26th IEEE Conference on Distributed Computing systems (ICDCS), IEEE, 2006-07

33
Scalable onion routing with Torsk

McLachlan, Jon; Tran, Andrew; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11

34
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments

Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04

35
Secure Group Services for Storage Area Networks

Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12

36
Secure Localization with Phantom Node Detection

Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09

37
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

38
Security Model for a Multi-Agent Marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09

39
SGFS: Secure, Efficient and Policy-based Global File Sharing

Kher, V; Seppanen, E; Leach, C; Kim, Yongdae, NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006. , NASA/IEEE, 2006-05

40
Simple and Fault-tolerant Group Key Agreement Scheme

Kim, Yongdae; Perrig, Adrian; Tsudik, Gene, The 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM, 2000-11

41
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks

Wang, P; Kim, Yongdae; Kher, V; Kwon, T, Applied Cryptography and Network Security 2005 (ACNS 2005). , iTwin, 2005-06

42
The Design of a Group Key Agreement API

Ateniese, Giuseppe; Chevassut, Oliver; Hasse, Damian; Kim, Yongdae; Tsudik, Gene, DARPA Information Survivability Conference and Exposition (DISCEX 2000), DARPA, 2000-01

43
The Frogboiling attack: limitations of anomaly detection for secure network coordinates

Chan-Tin, E; Feldman, D.; Hopper, N.; Kim, Yongdae, SecureComm, 2009, ICST, 2009-09

44
Towards a safe Integrated Clinical Environment: A communication security perspective

Kune, Denis Foo; Vasserman, Eugene; Venkatasubramanian, Krishna; Kim, Yongdae; Lee, Insup, Workshop on Medical Communication Systems (MedCOMM 2012), ACM, 2012-08-13

45
Towards Complete Node Enumeration in a Peer-to-Peer Botnet

Kang, B; Chan-Tin, E; Lee, C; Tyra, J; Kang, H; Nunnery, C; Wadler, Z; et al, ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) , ACM, 2009-03

46
Why Kad Lookup Fails

Kang, Hun J.; Chan-Tin, Eric; Hopper, Nicholas; Kim, Yongdae, IEEE International Conference on Peer-to-Peer Computing (P2P), 2009 , IEEE, 2009-09

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0