Browse "School of Electrical Engineering(전기및전자공학부)" by Author 1872

Showing results 1 to 46 of 46

1
A Machine Learning Framework for Network Anomaly Detection using SVM and GA

Shon, T; Kim, Yongdae; Lee, C; Moon, J, 6th IEEE Information Assurance Workshop, 2005, IEEE, 2005-06

2
Admission Control in Collaborative Groups

Kim, Yongdae; Mazzocchi, Daniele; Tsudik, Gene, IEEE International Symposium on Network Computing and Applications (NCA 2003), IEEE, 2003-04

3
An analysis of a social network-based Sybil defense in mobile networks

Kim, Yongdae; Mohaisen, A.; AbuHmed, T.; Kang, H. J.; Nyang, D., 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011), ACM, 2011-02

4
Attacking the Kad Network

Wang, P; Tyra, J; Chan-Tin, E; Malchow, T; Foo Kune, D; Hopper, N; Kim, Yongdae, SecureComm 2008. , ICST, 2008-09

5
Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -

Chan-Tin, Eric; Wang, Peng; Tyra, James; Malchow, Tyson; Kune, Denis Foo; Hopper, Nicholas; Kim, Yongdae, Wiley Security and Communication Networks, 2009 , IEEE, 2009-05

6
Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography

Cheon, JH; Hopper, N; Kim, Yongdae; Osipkov, I, 10th Conference on Financial Cryptography and Data Security, International Financial Cryptography Association, 2006-03-01

7
Balancing the Shadows

Schuchard, M.; Dean, A.; Heorhiadi, V.; Kim, Yongdae; Hopper, N., Workshop on Privacy in the Electronic Society (WPES), 2010., ACM, 2010-10-04

8
Batch Verifications with ID-Based Signatures

Yoon, HyoJin; Cheon, Jung Hee; Kim, Yongdae, Information Security and Cryptology (ICISC 2004) , KIISC, NSRI, 2004-12

9
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage,

Kher, V; Kim, Yongdae, IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007 , IEEE, 2007-10

10
Combating doublespending using cooperative P2P systems

Osipkov, I; Vasserman, E; Hopper, N; Kim, Yongdae, 2007 IEEE Conference on Distributed Computing Systems (ICDCS), IEEE, 2007-06

11
Communication-Efficient Group Key Agreement

Kim, Yongdae; Perrig, Adrian; Tsudik, Gene, IFIP TC11 Sixteenth International Conference on Information Security (IFIP/SEC 2001), IFIP, 2001-06

12
Decentralized Authentication Mechanism for Object-based Storage Devices

Kim, Yongdae; Kher, Vishal, Security in Storage Workshop 2003 (SISW), IEEE, 2003-10

13
Detecting Phantom Nodes in Wireless Sensor Networks

Hwang, J; He, T; Kim, Yongdae, IEEE Infocom2007 Minisymposia, IEEE, 2007-05

14
Efficient Cryptographic Primitives for Private Data Mining

Shaneck, M; Kim, Yongdae, HICSS, Koloa, Kauai, HI, USA, IEEE Computer Society,2010., IEEE, 2010-01

15
Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard

Du, D; He, D; Hong, C; Jeong, J; Kher, V; Kim, Yongdae; Lu, Y; et al, NASA/IEEE Conference on Mass Storage Systems and Technologies 2006. , NASA/IEEE, 2006-05

16
Exploring Robustness in Group Key Agreement

Amir, Yair; Kim, Yongdae; Nita-Rotaru, Cristina; Schultz, John; Stanton, Jonathan, The 21st International Conference on Distributed Computing Systems (IEEE ICDCS 2001), IEEE, 2001-04

17
Hashing it out in public: Common failure modes of DHT-based anonymity schemes

Tran, A; Hopper, N; Kim, Yongdae, Workshop on Privacy in the Electronic Society (WPES), 2009 , ACM, 2009-11-09

18
Impact of Malicious TCP Retransmission on Cellular Traffic Accounting

Go, Younghwan; Kune, Denis Foo; Woo, Shinae; Park, KyoungSoo; Kim, Yongdae, 5th Annual Wireless of the Students, by the Students, for the Students Workshop (ACM S3 2013), pp.1 - 3, ACM, 2013-09-30

19
In-Situ Sensing Area Modeling for Wireless Sensor Networks

Hwang, J; He, T; Kim, Yongdae, ACM Conference on Embedded Networked Sensor Systems (SenSys), ACM, 2007-11

20
Incorporating trust into social network-based Sybil defenses

Mohaisen, A.; Hopper, N.; Kim, Yongdae, The 30th IEEE Conference on Computer Communications (INFOCOM'11), IEEE, 2011-04

21
Membership-concealing overlay networks

Vasserman, Eugene; Jansen, Rob; Tyra, James; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11

22
On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage,

Yun, A; Shi, C; Kim, Yongdae, The ACM Cloud Computing Security Workshop (CCSW), 2009 , ACM, 2009-11-13

23
On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application

Kim, Yongdae; Lee, S.; Park, S., CARDIS, Smart Card Research and Advanced Application: Second International Conference, CARDIS, 1996-09

24
On the Mixing Time of Directed Social Graphs and Security Implications

Mohaisen, Abedelaziz; Tran, Huy; Hopper, Nicholas; Kim, Yongdae, ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012), ACM/SIGSAC, 2012-10

25
One-way indexing for plausible deniability in censorship resistant storage

Vasserman, Eugene Y.; Heorhiadi, Victor; Hopper, Nicholas; Kim, Yongdae, USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012), USENIX, 2012-08-06

26
Privacy Preserving Nearest Neighbor Search

Shaneck, M; Kim, Yongdae; Kumar, V, IEEE International Workshop on Privacy Aspects of Data Mining, IEEE, 2006-12-18

27
Privacy Protection in PKIs: A Separation-of-Authority Approach

Kwon, T; Cheon, J; Kim, Yongdae; Lee, J, 7th International Workshop on Information Security Applications (WISA) 2006., Korea Institute of Information Security and cryptology(KIISC), 2006-08

28
Realistic Sensing Area Modeling

Hwang, J; Gu, Y; He, T; Kim, Yongdae, IEEE Infocom 2007 Minisymposia, IEEE, 2007-05

29
Recruiting New Tor Relays with BRAIDS

Jansen, Rob; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS) 2010. , ACM, 2010-10

30
Remote Software-based Attestation for Wireless Sensors.

Shaneck, M; Mahadevan, K; Kher, V; Kim, Yongdae, ESAS 2005. , IEEE, 2005-07

31
Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks

Hwang, Joengmin; Kim, Yongdae, ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), ACM, 2004-10

32
Robust Accounting in Decentralized P2P Storage Systems

Osipkov, I; Wang, P; Hopper, N; Kim, Yongdae, The 26th IEEE Conference on Distributed Computing systems (ICDCS), IEEE, 2006-07

33
Scalable onion routing with Torsk

McLachlan, Jon; Tran, Andrew; Hopper, Nicholas; Kim, Yongdae, ACM Conference on Computer and Communications Security (CCS), 2009 , ACM, 2009-11

34
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments

Amir, Yair; Ateniese, Giuseppe; Hasse, Damian; Kim, Yongdae; Nita-Rotaru, Cristina; Schlossnagle, Theo; Schultz, John; et al, The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE, 2000-04

35
Secure Group Services for Storage Area Networks

Kim, Yongdae; Maino, Fabio; Narasimba, Maithili; Tsudik, Gene, 1st International IEEE Security in Storage Workshop (SISW 2002), IEEE, 2002-12

36
Secure Localization with Phantom Node Detection

Hwang, J; He, T; Kim, Yongdae, 7th International Conference on AD-HOC Networks & Wireless , 2008-09

37
Securing Distributed Storage: Challenges, Techniques, and Systems,

Kher, V; Kim, Yongdae, International Workshop onStorage Security and Survivability 2005, ACM, 2005-11-11

38
Security Model for a Multi-Agent Marketplace

Jaiswal, Ashutosh; Kim, Yongdae; Gini, Maria, The Fifth International Conference on Electronic Commerce (ICEC 03), ACM, 2003-09

39
SGFS: Secure, Efficient and Policy-based Global File Sharing

Kher, V; Seppanen, E; Leach, C; Kim, Yongdae, NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006. , NASA/IEEE, 2006-05

40
Simple and Fault-tolerant Group Key Agreement Scheme

Kim, Yongdae; Perrig, Adrian; Tsudik, Gene, The 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM, 2000-11

41
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks

Wang, P; Kim, Yongdae; Kher, V; Kwon, T, Applied Cryptography and Network Security 2005 (ACNS 2005). , iTwin, 2005-06

42
The Design of a Group Key Agreement API

Ateniese, Giuseppe; Chevassut, Oliver; Hasse, Damian; Kim, Yongdae; Tsudik, Gene, DARPA Information Survivability Conference and Exposition (DISCEX 2000), DARPA, 2000-01

43
The Frogboiling attack: limitations of anomaly detection for secure network coordinates

Chan-Tin, E; Feldman, D.; Hopper, N.; Kim, Yongdae, SecureComm, 2009, ICST, 2009-09

44
Towards a safe Integrated Clinical Environment: A communication security perspective

Kune, Denis Foo; Vasserman, Eugene; Venkatasubramanian, Krishna; Kim, Yongdae; Lee, Insup, Workshop on Medical Communication Systems (MedCOMM 2012), ACM, 2012-08-13

45
Towards Complete Node Enumeration in a Peer-to-Peer Botnet

Kang, B; Chan-Tin, E; Lee, C; Tyra, J; Kang, H; Nunnery, C; Wadler, Z; et al, ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) , ACM, 2009-03

46
Why Kad Lookup Fails

Kang, Hun J.; Chan-Tin, Eric; Hopper, Nicholas; Kim, Yongdae, IEEE International Conference on Peer-to-Peer Computing (P2P), 2009 , IEEE, 2009-09

Discover

Type

. next

Open Access

Date issued

. next

Subject

. next

rss_1.0 rss_2.0 atom_1.0