Showing results 28 to 46 of 46
Realistic Sensing Area Modeling Hwang, J; Gu, Y; He, T; Kim, Yongdae, IEEE Infocom 2007 Minisymposia, IEEE, 2007-05 |
Recruiting New Tor Relays with BRAIDS Jansen, Rob; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS) 2010. , ACM, 2010-10 |
Remote Software-based Attestation for Wireless Sensors. Shaneck, M; Mahadevan, K; Kher, V; Kim, Yongdae, ESAS 2005. , IEEE, 2005-07 |
Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks Hwang, Joengmin; Kim, Yongdae, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), ACM, 2004-10 |
Robust Accounting in Decentralized P2P Storage Systems Osipkov, I; Wang, P; Hopper, N; Kim, Yongdae, The 26th IEEE Conference on Distributed Computing systems (ICDCS), IEEE, 2006-07 |
Scalable onion routing with Torsk McLachlan, Jon; Tran, Andrew; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11 |
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04 |
Secure Group Services for Storage Area Networks Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12 |
Secure Localization with Phantom Node Detection Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09 |
Securing Distributed Storage: Challenges, Techniques, and Systems, Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11 |
Security Model for a Multi-Agent Marketplace Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09 |
SGFS: Secure, Efficient and Policy-based Global File Sharing Kher, V; Seppanen, E; Leach, C; Kim, Yongdae, NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006. , NASA/IEEE, 2006-05 |
Simple and Fault-tolerant Group Key Agreement Scheme Kim, Yongdae; Perrig, Adrian; Tsudik, Gene, The 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM, 2000-11 |
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks Wang, P; Kim, Yongdae; Kher, V; Kwon, T, Applied Cryptography and Network Security 2005 (ACNS 2005). , iTwin, 2005-06 |
The Design of a Group Key Agreement API Ateniese, Giuseppe; Chevassut, Oliver; Hasse, Damian; Kim, Yongdae; Tsudik, Gene, DARPA Information Survivability Conference and Exposition (DISCEX 2000), DARPA, 2000-01 |
The Frogboiling attack: limitations of anomaly detection for secure network coordinates Chan-Tin, E; Feldman, D.; Hopper, N.; Kim, Yongdae, SecureComm, 2009, ICST, 2009-09 |
Towards a safe Integrated Clinical Environment: A communication security perspective Kune, Denis Foo; Vasserman, Eugene; Venkatasubramanian, Krishna; Kim, Yongdae; Lee, Insup, Workshop on Medical Communication Systems (MedCOMM 2012), ACM, 2012-08-13 |
Towards Complete Node Enumeration in a Peer-to-Peer Botnet Kang, B; Chan-Tin, E; Lee, C; Tyra, J; Kang, H; Nunnery, C; Wadler, Z; et al, ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) , ACM, 2009-03 |
Why Kad Lookup Fails Kang, Hun J.; Chan-Tin, Eric; Hopper, Nicholas; Kim, Yongdae, IEEE International Conference on Peer-to-Peer Computing (P2P), 2009 , IEEE, 2009-09 |
Discover