The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yongdae Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
    Security model for a multi-agent marketplace. [Citation Graph (0, 0)][DBLP]
    ICEC, 2003, pp:119-124 [Conf]
  2. Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon
    Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:17-32 [Conf]
  3. Sangwon Lee, Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu
    An Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:357-371 [Conf]
  4. Yongdae Kim, Sangjin Lee, Choonsik Park
    On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  5. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Simple and fault-tolerant key agreement for dynamic collaborative groups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:235-244 [Conf]
  6. Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim
    Remote Software-Based Attestation for Wireless Sensors. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:27-41 [Conf]
  7. Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
    Timed-Release and Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:191-205 [Conf]
  8. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
    On the Performance of Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:463-464 [Conf]
  9. Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik
    Exploring Robustness in Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:399-408 [Conf]
  10. Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik
    Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:330-343 [Conf]
  11. Mark Shaneck, Yongdae Kim, Vipin Kumar
    Privacy Preserving Nearest Neighbor Search. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:541-545 [Conf]
  12. HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
    Batch Verifications with ID-Based Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:233-248 [Conf]
  13. Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
    Admission Control in Peer Groups. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:131-139 [Conf]
  14. Joengmin Hwang, Yongdae Kim
    Revisiting random key pre-distribution schemes for wireless sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2004, pp:43-52 [Conf]
  15. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Communication-Efficient Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:229-244 [Conf]
  16. Joengmin Hwang, Tian He, Yongdae Kim
    Achieving realistic sensing area modeling. [Citation Graph (0, 0)][DBLP]
    SenSys, 2006, pp:415-416 [Conf]
  17. Vishal Kher, Yongdae Kim
    Decentralized Authentication Mechanisms for Object-based Storage Devices. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2003, pp:1-10 [Conf]
  18. Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik
    Secure Group Services for Storage Area Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:80-93 [Conf]
  19. Ashutosh Jaiswal, Yongdae Kim, Maria L. Gini
    Design and implementation of a secure multi-agent marketplace. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research and Applications, 2004, v:3, n:4, pp:355-368 [Journal]
  20. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Group Key Agreement Efficient in Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:7, pp:905-921 [Journal]
  21. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
    On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal]
  22. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Tree-based group key agreement. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:60-96 [Journal]
  23. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik
    Secure Group Communication Using Robust Contributory Key Agreement. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:5, pp:468-480 [Journal]
  24. Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper, Yongdae Kim
    Combating Double-Spending Using Cooperative P2P Systems. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:41- [Conf]
  25. Joengmin Hwang, Yu Gu, Tian He, Yongdae Kim
    Realistic Sensing Area Modeling. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2421-2425 [Conf]
  26. Joengmin Hwang, Tian He, Yongdae Kim
    Detecting Phantom Nodes in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:2391-2395 [Conf]
  27. Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee
    Privacy Protection in PKIs: A Separation-of-Authority Approach. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:297-311 [Conf]
  28. Jason Kealey, Yongdae Kim, Daniel Amyot, Gunter Mussbacher
    Integrating an Eclipse-Based Scenario Modeling Environment with a Requirements Management System. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:2432-2435 [Conf]

  29. Membership-concealing overlay networks. [Citation Graph (, )][DBLP]


  30. Towards complete node enumeration in a peer-to-peer botnet. [Citation Graph (, )][DBLP]


  31. Scalable onion routing with torsk. [Citation Graph (, )][DBLP]


  32. Efficient Cryptographic Primitives for Private Data Mining. [Citation Graph (, )][DBLP]


  33. Why Kad Lookup Fails. [Citation Graph (, )][DBLP]


  34. Exploring in-situ sensing irregularity in wireless sensor networks. [Citation Graph (, )][DBLP]


  35. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. [Citation Graph (, )][DBLP]


  36. Securing distributed storage: challenges, techniques, and systems. [Citation Graph (, )][DBLP]


  37. Voice coil motor nano stage with an eddy current damper. [Citation Graph (, )][DBLP]


  38. Secure localization with phantom node detection. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.008secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002