Browse "School of Electrical Engineering(전기및전자공학부)" by Author 1872

Showing results 33 to 46 of 46

33
Scalable onion routing with Torsk

McLachlan, Jon; Tran, Andrew; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11

34
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments

Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04

35
Secure Group Services for Storage Area Networks

Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12

36
Secure Localization with Phantom Node Detection

Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09

37
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

38
Security Model for a Multi-Agent Marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09

39
SGFS: Secure, Efficient and Policy-based Global File Sharing

Kher, V; Seppanen, E; Leach, C; Kim, Yongdae, NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006. , NASA/IEEE, 2006-05

40
Simple and Fault-tolerant Group Key Agreement Scheme

Kim, Yongdae; Perrig, Adrian; Tsudik, Gene, The 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM, 2000-11

41
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks

Wang, P; Kim, Yongdae; Kher, V; Kwon, T, Applied Cryptography and Network Security 2005 (ACNS 2005). , iTwin, 2005-06

42
The Design of a Group Key Agreement API

Ateniese, Giuseppe; Chevassut, Oliver; Hasse, Damian; Kim, Yongdae; Tsudik, Gene, DARPA Information Survivability Conference and Exposition (DISCEX 2000), DARPA, 2000-01

43
The Frogboiling attack: limitations of anomaly detection for secure network coordinates

Chan-Tin, E; Feldman, D.; Hopper, N.; Kim, Yongdae, SecureComm, 2009, ICST, 2009-09

44
Towards a safe Integrated Clinical Environment: A communication security perspective

Kune, Denis Foo; Vasserman, Eugene; Venkatasubramanian, Krishna; Kim, Yongdae; Lee, Insup, Workshop on Medical Communication Systems (MedCOMM 2012), ACM, 2012-08-13

45
Towards Complete Node Enumeration in a Peer-to-Peer Botnet

Kang, B; Chan-Tin, E; Lee, C; Tyra, J; Kang, H; Nunnery, C; Wadler, Z; et al, ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) , ACM, 2009-03

46
Why Kad Lookup Fails

Kang, Hun J.; Chan-Tin, Eric; Hopper, Nicholas; Kim, Yongdae, IEEE International Conference on Peer-to-Peer Computing (P2P), 2009 , IEEE, 2009-09

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0