|
Search the dblp DataBase
Yongdae Kim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
Security model for a multi-agent marketplace. [Citation Graph (0, 0)][DBLP] ICEC, 2003, pp:119-124 [Conf]
- Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:17-32 [Conf]
- Sangwon Lee, Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (0, 0)][DBLP] ACNS, 2003, pp:357-371 [Conf]
- Yongdae Kim, Sangjin Lee, Choonsik Park
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. [Citation Graph (0, 0)][DBLP] CARDIS, 1996, pp:- [Conf]
- Yongdae Kim, Adrian Perrig, Gene Tsudik
Simple and fault-tolerant key agreement for dynamic collaborative groups. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:235-244 [Conf]
- Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim
Remote Software-Based Attestation for Wireless Sensors. [Citation Graph (0, 0)][DBLP] ESAS, 2005, pp:27-41 [Conf]
- Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
Timed-Release and Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:191-205 [Conf]
- Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
On the Performance of Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] ICDCS, 2002, pp:463-464 [Conf]
- Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik
Exploring Robustness in Group Key Agreement. [Citation Graph (0, 0)][DBLP] ICDCS, 2001, pp:399-408 [Conf]
- Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP] ICDCS, 2000, pp:330-343 [Conf]
- Mark Shaneck, Yongdae Kim, Vipin Kumar
Privacy Preserving Nearest Neighbor Search. [Citation Graph (0, 0)][DBLP] ICDM Workshops, 2006, pp:541-545 [Conf]
- HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
Batch Verifications with ID-Based Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:233-248 [Conf]
- Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
Admission Control in Peer Groups. [Citation Graph (0, 0)][DBLP] NCA, 2003, pp:131-139 [Conf]
- Joengmin Hwang, Yongdae Kim
Revisiting random key pre-distribution schemes for wireless sensor networks. [Citation Graph (0, 0)][DBLP] SASN, 2004, pp:43-52 [Conf]
- Yongdae Kim, Adrian Perrig, Gene Tsudik
Communication-Efficient Group Key Agreement. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:229-244 [Conf]
- Joengmin Hwang, Tian He, Yongdae Kim
Achieving realistic sensing area modeling. [Citation Graph (0, 0)][DBLP] SenSys, 2006, pp:415-416 [Conf]
- Vishal Kher, Yongdae Kim
Decentralized Authentication Mechanisms for Object-based Storage Devices. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2003, pp:1-10 [Conf]
- Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik
Secure Group Services for Storage Area Networks. [Citation Graph (0, 0)][DBLP] IEEE Security in Storage Workshop, 2002, pp:80-93 [Conf]
- Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
Design and implementation of a secure multi-agent marketplace. [Citation Graph (0, 0)][DBLP] Electronic Commerce Research and Applications, 2004, v:3, n:4, pp:355-368 [Journal]
- Yongdae Kim, Adrian Perrig, Gene Tsudik
Group Key Agreement Efficient in Communication. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2004, v:53, n:7, pp:905-921 [Journal]
- Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal]
- Yongdae Kim, Adrian Perrig, Gene Tsudik
Tree-based group key agreement. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:60-96 [Journal]
- Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik
Secure Group Communication Using Robust Contributory Key Agreement. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:5, pp:468-480 [Journal]
- Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim
Combating Double-Spending Using Cooperative P2P Systems. [Citation Graph (0, 0)][DBLP] ICDCS, 2007, pp:41- [Conf]
- Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim
Realistic Sensing Area Modeling. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:2421-2425 [Conf]
- Joengmin Hwang, Tian He, Yongdae Kim
Detecting Phantom Nodes in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:2391-2395 [Conf]
- Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee
Privacy Protection in PKIs: A Separation-of-Authority Approach. [Citation Graph (0, 0)][DBLP] WISA, 2006, pp:297-311 [Conf]
- Jason Kealey, Yongdae Kim, Daniel Amyot, Gunter Mussbacher
Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System. [Citation Graph (0, 0)][DBLP] CCECE, 2006, pp:2432-2435 [Conf]
Membership-concealing overlay networks. [Citation Graph (, )][DBLP]
Towards complete node enumeration in a peer-to-peer botnet. [Citation Graph (, )][DBLP]
Scalable onion routing with torsk. [Citation Graph (, )][DBLP]
Efficient Cryptographic Primitives for Private Data Mining. [Citation Graph (, )][DBLP]
Why Kad Lookup Fails. [Citation Graph (, )][DBLP]
Exploring in-situ sensing irregularity in wireless sensor networks. [Citation Graph (, )][DBLP]
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. [Citation Graph (, )][DBLP]
Securing distributed storage: challenges, techniques, and systems. [Citation Graph (, )][DBLP]
Voice coil motor nano stage with an eddy current damper. [Citation Graph (, )][DBLP]
Secure localization with phantom node detection. [Citation Graph (, )][DBLP]
Search in 0.007secs, Finished in 0.008secs
|