Yongdae Kim, Ph.D.

Affiliations: 
2002 University of Southern California, Los Angeles, CA, United States 
Area:
Computer Science
Google:
"Yongdae Kim"

Parents

Sign in to add mentor
Gene Tsudik grad student 2002 USC
 (Group key agreement: Theory and practice.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Seol H, Kim M, Kim Y, et al. (2019) Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks Ieee Transactions On Computers. 1-1
Kim M, Mohaisen A, Cheon JH, et al. (2016) Private Over-Threshold Aggregation Protocols over Distributed Datasets Ieee Transactions On Knowledge and Data Engineering. 28: 2467-2479
Mohaisen A, Mekky H, Zhang X, et al. (2015) Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 675-687
Chan-Tin E, Heorhiadi V, Hopper N, et al. (2015) Hijacking the Vuze BitTorrent network: All your hop are belong to us Iet Information Security. 9: 203-208
Mohaien A, Kune DF, Vasserman EY, et al. (2013) Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs Ieee Transactions On Dependable and Secure Computing. 10: 380-393
Wang P, Tyra J, Chan-Tin E, et al. (2013) Attacking the kad network-real world evaluation and high fidelity simulation using DVN Security and Communication Networks. 6: 1556-1575
Chan-Tin E, Heorhiadi V, Hopper N, et al. (2011) The Frog-Boiling attack: Limitations of secure network coordinate systems Acm Transactions On Information and System Security. 14
Yun A, Cheon JH, Kim Y. (2010) On Homomorphic Signatures for Network Coding Ieee Transactions On Computers. 59: 1295-1296
Cheon JH, Hopper N, Kim Y, et al. (2008) Provably Secure Timed-Release Public Key Encryption Acm Transactions On Information and System Security. 11: 4
Kim Y, Perrig A, Tsudik G. (2004) Tree-based group key agreement Acm Transactions On Information and System Security. 7: 60-96
See more...