The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jihye Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jihye Kim, Sihui Zhao, Steffen Heber
    Finding association rules of cis-regulatory elements involved in alternative splicing. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 2007, pp:232-237 [Conf]
  2. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Authentication for Paranoids: Multi-party Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:325-339 [Conf]
  3. Sangmin Bae, DongSup Song, Jihye Kim, Sungho Kang
    An Efficient On-Line Monitoring BIST for Remote Service System. [Citation Graph (0, 0)][DBLP]
    AISA, 2002, pp:205-214 [Conf]
  4. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:287-308 [Conf]
  5. Jihye Kim, Gene Tsudik
    SRDP: Securing Route Discovery in DSR. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:247-260 [Conf]
  6. Hyun-min Kim, Jihye Kim, Chang Wook Ahn, R. S. Ramakrishna
    Efficient Dynamic Load Balancing for Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2002, pp:886-894 [Conf]
  7. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:193-207 [Conf]
  8. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Secure acknowledgment aggregation and multisignatures with limited robustness. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:10, pp:1639-1652 [Journal]

  9. Fair Threshold Decryption with Semi-Trusted Third Parties. [Citation Graph (, )][DBLP]


  10. Large-scale Discovery of Regulatory Motifs Involved in Alternative Splicing. [Citation Graph (, )][DBLP]


  11. Robust group key agreement using short broadcasts. [Citation Graph (, )][DBLP]


  12. Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  13. Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. [Citation Graph (, )][DBLP]


  14. Privacy-Preserving Policy-Based Information Transfer. [Citation Graph (, )][DBLP]


  15. Mining of cis-Regulatory Motifs Associated with Tissue-Specific Alternative Splicing. [Citation Graph (, )][DBLP]


  16. Analysis of Cis-Regulatory Motifs in Cassette Exons by Incorporating Exon Skipping Rates. [Citation Graph (, )][DBLP]


  17. Logit-transformation Based Confidence Intervals for the Sensitivity of a Continuous-scale Diagnostic Test. [Citation Graph (, )][DBLP]


  18. SRDP: Secure route discovery for dynamic source routing in MANETs. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002