Yongdae Kim, Ph.D.
Affiliations: | 2002 | University of Southern California, Los Angeles, CA, United States |
Area:
Computer ScienceGoogle:
"Yongdae Kim"Parents
Sign in to add mentorGene Tsudik | grad student | 2002 | USC | |
(Group key agreement: Theory and practice.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Seol H, Kim M, Kim Y, et al. (2019) Amnesiac DRAM: A Proactive Defense Mechanism Against Cold Boot Attacks Ieee Transactions On Computers. 1-1 |
Kim M, Mohaisen A, Cheon JH, et al. (2016) Private Over-Threshold Aggregation Protocols over Distributed Datasets Ieee Transactions On Knowledge and Data Engineering. 28: 2467-2479 |
Mohaisen A, Mekky H, Zhang X, et al. (2015) Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures Ieee Transactions On Dependable and Secure Computing. 12: 675-687 |
Chan-Tin E, Heorhiadi V, Hopper N, et al. (2015) Hijacking the Vuze BitTorrent network: All your hop are belong to us Iet Information Security. 9: 203-208 |
Mohaien A, Kune DF, Vasserman EY, et al. (2013) Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs Ieee Transactions On Dependable and Secure Computing. 10: 380-393 |
Wang P, Tyra J, Chan-Tin E, et al. (2013) Attacking the kad network-real world evaluation and high fidelity simulation using DVN Security and Communication Networks. 6: 1556-1575 |
Chan-Tin E, Heorhiadi V, Hopper N, et al. (2011) The Frog-Boiling attack: Limitations of secure network coordinate systems Acm Transactions On Information and System Security. 14 |
Yun A, Cheon JH, Kim Y. (2010) On Homomorphic Signatures for Network Coding Ieee Transactions On Computers. 59: 1295-1296 |
Cheon JH, Hopper N, Kim Y, et al. (2008) Provably Secure Timed-Release Public Key Encryption Acm Transactions On Information and System Security. 11: 4 |
Kim Y, Perrig A, Tsudik G. (2004) Tree-based group key agreement Acm Transactions On Information and System Security. 7: 60-96 |