• home
  • login
  • join

타이틀

bg




icon

Publications by Year


Publications by Year


For copyright of the versions available below, please see here.
  1. line


  2. Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark Web
    Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, and Seungwon Shin
    Network and Distributed Systems Security (NDSS) Symposium 2019 (To appear)
  3. line


  4. Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models
    Sangwook Bae, Mincheol Son, Sooel Son, and Yongdae Kim
    ACM International Workshop on Mobile Computing Systems and Applications (HotMobile'19) (To appear)
  5. line


  6. Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
    Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae Kim
    IEEE Symposium on Security and Privacy 2019 (To appear)
  7. line


  8. Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
    Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee and Yongdae Kim
    IEEE Transactions on Mobile Computing, Vol. 17, No. 10, 2018
  9. line


  10. GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes
    Yunmok Son, Juhwan Noh, Jaeyeong Choi and Yongdae Kim
    ACM Transactions on Privacy and Security, Vol. 21, No. 2, Article 10, 2018
  11. line


  12. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    Byeongdo Hong, Sangwook Bae, and Yongdae Kim
    Network and Distributed Systems Security (NDSS) Symposium 2018
  13. line


  14. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim
    ACM Conference on Computer and Communications Security. (CCS 2017)
  15. line


  16. Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
    Hocheol Shin, Dohyun Kim, Yujin Kwon, and Yongdae Kim
    Conference on Cryptographic Hardware and Embedded Systems. (CHES 2017)
  17. line


  18. When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, and Yongdae Kim
    Proceedings of the 2nd IEEE European Symposium on Security and Privacy. (EuroS&P 2017)
  19. line


  20. Enabling Automatic Protocol Behavior Analysis for Android Applications
    Jeongmin Kim, Hyunwoo Choi, Hun Namkung, Woohyun Choi, Byungkwon Choi, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han
    The 12th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT '16)
  21. line


  22. PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    Wonjun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, and John Kim
    Proceedings of the 25th USENIX Conference on Security Symposium. (USENIX Security 2016)
  23. line


  24. Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems
    Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, and Yongdae Kim
    10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
  25. line


  26. This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump
    Youngseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, and Yongdae Kim
    10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
  27. line


  28. Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim
    The 17th World Conference on Information Security Applications (WISA 2016)
  29. line


  30. Pay As You Want: Bypassing Charging System in Operational Cellular Networks
    Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee and Yongdae Kim
    The 17th World Conference on Information Security Applications (WISA 2016)
  31. line


  32. Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi and Yongdae Kim
    9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2016)
    Best Paper Award
  33. line


  34. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie and Yongdae Kim
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol.12 no.6, 2015
  35. line


  36. Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim
    Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (CCS 2015)
  37. line


  38. Frying PAN: Dissecting Customized Protocol for Personal Area Network
    Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, and Yongdae Kim
    The 16th International Workshop on Information Security Applications (WISA 2015)
  39. line


  40. Security Analysis of FHSS-type Drone Controller
    Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, and Yongdae Kim
    The 16th International Workshop on Information Security Applications (WISA 2015)
  41. line


  42. BurnFit: Analyzing and Exploiting Wearable Devices
    Dongkwan Kim, Suwan Park, Kibum Choi, and Yongdae Kim
    The 16th International Workshop on Information Security Applications (WISA 2015)
    Best Paper Award
  43. line


  44. Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications
    Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, and Dongsu Han
    Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. (ACM SIGCOMM 2015, poster)
  45. line


  46. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, abd Yongdae Kim
    Proceedings of the 24th USENIX Conference on Security Symposium. (USENIX Security 2015)
  47. line


  48. Hijacking the Vuze BitTorrent network: all your hop are belong to us
    Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    IET Information Security, vol.9, no.4, 2015
  49. line


  50. Bittersweet ADB: Attacks and Defenses
    Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu
    10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
  51. line


  52. Revisiting Security of Proportional Fair Scheduler in Wireless Cellular Networks
    Hanjin Park, Yung Yi, Yongdae Kim
    Elsevier Computer Networks, vol. 75, Part A, pp. 55-74, 2014
  53. line


  54. Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim
    17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014)
  55. line


  56. Trustworthy Distributed Computing on Social Networks
    Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim
    IEEE Transactions on Services Computing, vol.7, no.3, 2014
  57. line


  58. Analyzing Security of Korean USIM-based PKI Certificate Service
    Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim
    15th International Workshop on Information Security Applications (WISA 2014)
  59. line


  60. Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission
    Younghwan Go, Jongil Won, Denis Foo Kune, Eunyoung Jeong, Yongdae Kim, and Kyoungsoo Park
    Network and Distributed System Security (NDSS) Symposium 2014
  61. line


  62. Impact of Malicious TCP Retransmission on Cellular Traffic Accounting
    Younghwan Go, Denis Foo Kune, Shinae Woo, Kyoungsoo Park, and Yongdae Kim
    Proceedings of the 5th Annual Wireless of the Students, by the Students, for the Students Workshop (ACM S3 2013)
  63. line


  64. Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    Max Schuchard, Christopher Thompson, Nicholas Hopper, and Yongdae Kim
    IEEE 33rd International Conference on Distributed Computing Systems (ICDCS 2013)
  65. line


  66. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    Denis Foo Kune, John Backes, Shane Clark, Wenyuan Xu, Dan Kramer, Matthew Reynolds, Kevin Fu, and Yongdae Kim
    IEEE Symposium on Security & Privacy (Oakland 2013)
  67. line


  68. Trustworthy Distributed Computing on Social Networks
    Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
  69. line


  70. Dynamix: Anonymity on Dynamic Social Structures
    Abedelaziz Mohaisen, Huy Tran, Ting Zhu, and Yongdae Kim
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
  71. line


  72. Protecting Access Privacy of Cached Contents in Information Centric Networks
    Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
  73. line


  74. SocialCloud: Using Social Networks for Building Distributed Computing Services
    A. Mohaisen, H. Tran, A. Chandra, and Y. Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Also available at Technical Report, CS Department, University of Minnesota 2011
    Media: MIT Technical Review, The Verge, MSN.COM, Data News
  75. line


  76. Towards Accurate Accounting of Cellular Data for TCP Retransmission
    Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, and Yongdae Kim
    ACM International Workshop on Mobile Computing Systems and Applications (HotMobile'13)
  77. line


  78. Private over-threshold aggregation protocols
    Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, and Yongdae Kim
    International Conference on Information Security and Cryptology (ICISC 2012)
  79. line


  80. Towards a safe Integrated Clinical Environment: A communication security perspective
    Denis Foo Kune, Eugene Vasserman, Krishna Venkatasubramanian, Yongdae Kim, Insup Lee
    ACM Workshop on Medical Communication Systems (MedCOMM 2012)
  81. line


  82. Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling
    Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang
    2012 Military Communications Conference (MILCOM 2012).
  83. line


  84. One-way indexing for plausible deniability in censorship resistant storage
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)
  85. line


  86. On the Mixing Time of Directed Social Graphs and Security Implications
    Abedalaziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012)
  87. line


  88. Private Top-k Aggregation Protocols
    Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, and Yongdae Kim
    IACR Cryptology ePrint Archive, 2012
  89. line


  90. Location leaks on the GSM air interface
    D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim
    ISOC Network & Distributed System Security Symposium (NDSS 2012)
    Nominated for the best paper award
    Media: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr
  91. line


  92. Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them
    M. Schuchard, C. Thompson, N. Hopper, Y. Kim
    Technical Report, CS Department, University of Minnesota, 2011
  93. line


  94. Censorship resistant overlay publishing
    E. Y. Vasserman, V. Heorhiadi, Y. Kim, N. Hopper
    Technical Report, CS Department, University of Minnesota, 2011
  95. line


  96. i-Code: A New Approach to Practical Network Coding for Content Distribution
    H. J. Kang, A. Yun, E. Y. Vasserman, Y. Kim
    Technical Report, CS Department, University of Minnesota 2011
  97. line


  98. The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
    E. Chan-Tin, V. Heorhiadi, Y. Kim, and N. Hopper
    ACM Transactions on Information and System Security (TISSEC) 14(3), 2011
  99. line


  100. Mistaking friends for foes: An analysis of a social network-based Sybil defense in mobile networks
    A. Mohaisen, T. AbuHmed, H. J. Kang, D. Nyang, Y. Kim
    In 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011)
  101. line


  102. Understanding social networks properties for trustworthy computing
    A. Mohaisen, H. Tran, N. Hopper, and Y. Kim
    The 31st IEEE ICDCS Workshops (SIMPLEX 2011), Minneapolis, MN, USA, IEEE (Invited Paper)
  103. line


  104. Keep your friends close: Incorporating trust into social network-based Sybil defenses
    A. Mohaisen, N. Hopper, Y. Kim
    The 30th IEEE Conference on Computer Communications (INFOCOM'11)
  105. line


  106. Losing Control of the Internet: Using the data plane to attack the control plane
    M. Schuchard, E. Vasserman, A. Mohaisen, D. F. Kune, N. Hopper, and Y. Kim
    ISOC Network & Distributed System Security Symposium (NDSS 2011)
    Media: New Scientist, Slashdot, ZDNet, CBS News, Minnesota Daily, Metro, Gizmodo, The Register
  107. line


  108. Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks.
    J. Hwang, T. He, and Y. Kim.
    IEEE Transactions on Parallel and Distributed Systems, vol. 21, issue 4, pp. 547-561 , 2010.
  109. line


  110. On Homomorphic Signatures for Network Coding
    A. Yun, J. Cheon, Y. Kim
    Transactions on Computer (brief contribution), vol. 59, issue 9, 2010.
  111. line


  112. Recruiting New Tor Relays with BRAIDS
    R. Jansen, N. Hopper, and Y. Kim
    ACM Conference on Computer and Communications Security (CCS), 2010.
  113. line


  114. Measuring the mixing time of social graphs
    A. Mohaisen, A. Yun, and Y. Kim
    ACM Internet Measurement Conference (IMC), 2010.
  115. line


  116. Balancing the Shadows
    M. Schuchard, A. Dean, V. Heorhiadi, Y. Kim, and N. Hopper
    Workshop on Privacy in the Electronic Society (WPES), 2010.
  117. line


  118. Efficient Cryptographic Primitives for Private Data Mining
    M. Shaneck, and Y. Kim
    HICSS, Koloa, Kauai, HI, USA, IEEE Computer Society, pp. 1-9, 2010.
  119. line


  120. Timing attacks on PIN Input Devices
    D. Foo Kune, and Y. Kim
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  121. line


  122. Losing Control of the Internet: Using the Data Plane to Attack the Control Plane
    M. Schuchard, A. Mohaisen, E. Vasserman, D. F. Kune, Y. Kim, and N. Hopper
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  123. line


  124. Secure Encounter-based Social Networks: Requirements, Challenges, and Designs
    A. Mohaisen, E. Vasserman, M. Schuchard, D. F. Kune, and Y. Kim
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  125. line


  126. The Distributed Virtual Network for High Fidelity, Large Scale Peer to Peer Network Simulation
    Denis Foo Kune, Tyson Malchow, James Tyra, Nicholas J. Hopper, Yongdae Kim
    University of Minnesota, Technical report, 2010.
  127. line


  128. Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -
    E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper, Y. Kim
    Wiley Security and Communication Networks, 2009.
  129. line


  130. Membership-concealing overlay networks
    E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Y. Kim
    ACM Conference on Computer and Communications Security (CCS), 2009
  131. line


  132. Scalable onion routing with Torsk
    J. McLachlan, A. Tran, N. Hopper, Y. Kim
    ACM Conference on Computer and Communications Security (CCS), 2009
  133. line


  134. On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage
    A. Yun, C. Shi, Y. Kim
    The ACM Cloud Computing Security Workshop (CCSW), 2009
  135. line


  136. Hashing it out in public: Common failure modes of DHT-based anonymity schemes
    A. Tran, N. Hopper, Y. Kim
    Workshop on Privacy in the Electronic Society (WPES), 2009
  137. line


  138. The Frogboiling attack: limitations of anomaly detection for secure network coordinates
    E. Chan-Tin, D. Feldman, N. Hopper, Y. Kim
    SecureComm, 2009
  139. line


  140. Why Kad Lookup Fails
    H. -J. Kang, E. Chan-Tin, N. Hopper, Y. Kim
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2009
  141. line


  142. Towards Complete Node Enumeration in a Peer-to-Peer Botnet
    B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim
    ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009)
  143. line


  144. Secure Localization with Phantom Node Detection
    J. Hwang, T. He, Y. Kim
    Ad Hoc Networks, Volume 6, Issue 7 (September 2008) Elsevier.
  145. line


  146. Provably Secure Timed-Release Public Key Encryption.
    J. Cheon, N. Hopper, Y. Kim, I. Osipkov,(alphabetical order. Main author of the paper is I. Osipkov.)
    ACM Transactions on Information Systems Security Volume 11 , Issue 2 (March 2008).
  147. line


  148. Attacking the Kad Network
    P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Foo Kune, N. Hopper, and Y. Kim.
    at SecureComm 2008.
  149. line


  150. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage
    V. Kher and Y. Kim
    IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007
  151. line


  152. Exploring In-Situ Sensing Area Modeling for Wireless Sensor Networks
    J. Hwang, T. He, Y. Kim.
    ACM Conference on Embedded Networked Sensor Systems (SenSys), 2007.
  153. line


  154. Combating doublespending using cooperative P2P systems
    I. Osipkov, E. Vasserman, N. Hopper and Y. Kim.
    2007 IEEE Conference on Distributed Computing Systems (ICDCS), 2007.
  155. line


  156. Realistic Sensing Area Modeling.
    J. Hwang, Y. Gu, T. He, and Y. Kim.
    IEEE Infocom 2007 Minisymposia, August 2007.
  157. line


  158. Detecting Phantom Nodes in Wireless Sensor Networks.
    J. Hwang, T. He, and Y. Kim.
    IEEE Infocom2007 Minisymposia, August 2007.
  159. line


  160. Robust Accounting in Decentralized P2P Storage Systems.
    I. Osipkov, P. Wang, N. Hopper and Y. Kim.
    In Proceedings of the 26th IEEE Conference on Distributed Computing systems (ICDCS), 2006.
  161. line


  162. Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography.
    J. -H. Cheon, N. Hopper, Y. Kim and I. Osipkov.
    In 10th Conference on Financial Cryptography and Data Security, February 2006.
  163. line


  164. Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard
    D. Du, D. He, C. Hong, J. Jeong, V. Kher, Y. Kim, Y. Lu, A. Raghuveer, S. Sharafkandi
    NASA/IEEE Conference on Mass Storage Systems and Technologies 2006.
  165. line


  166. SGFS: Secure, Efficient and Policy-based Global File Sharing (Short Paper)
    V. Kher, E. Seppanen, C. Leach, Y. Kim
    NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006.
  167. line


  168. Privacy Protection in PKIs: A Separation-of-Authority Approach.
    T. Kwon, J. Cheon, Y. Kim, J. Lee
    7th International Workshop on Information Security Applications (WISA) 2006.
  169. line


  170. Privacy Preserving Nearest Neighbor Search
    M. Shaneck, Y. Kim, V. Kumar
    IEEE International Workshop on Privacy Aspects of Data Mining, December 2006
  171. line


  172. Myrmic: Secure and Robust DHT Routing
    P. Wang, N. Hopper, I. Osipkov, and Y. Kim
    UMN DTC Research Report 2006/20, November 2006.
  173. line


  174. Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
    P. Wang, Y. Kim, V. Kher, T. Kwon
    ACNS 2005.
  175. line


  176. Securing Distributed Storage: Challenges, Techniques, and Systems
    V. Kher and Y. Kim
    StorageSS’05. (invited paper)
  177. line


  178. Remote Software-based Attestation for Wireless Sensors.
    M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim.
    ESAS 2005.
  179. line


  180. A Machine Learning Framework for Network Anomaly Detection using SVM and GA
    T. Shon, Y. Kim, C. Lee, J. Moon
    6th IEEE Information Assurance Workshop, 2005
  181. line


  182. On the Performance of Group Key Agreement Protocols
    Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik
    ACM Transaction on Information and System Security, Vol. 7, No. 3, Aug. 2004.
  183. line


  184. Robust Contributory Key Agreement in Secure Spread
    Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, G. Tsudik
    IEEE Transaction on Parallel and Distributed System, Vol. 15, No. 5, May 2004.
  185. line


  186. Communication-Efficient Group Key Agreement
    Y. Kim, A. Perrig, G. Tsudik
    IEEE Transaction on Computers, Vol. 53, No. 7, Jul. 2004.
  187. line


  188. Tree-based Group Key Agreement
    Y. Kim, A. Perrig, G. Tsudik
    in ACM Transaction on Information and System Security, Vol. 7, No. 1, Feb. 2004.
  189. line


  190. Design and implementation of a secure multi-agent marketplace
    A. Jaiswal, Y. Kim, M. Gini
    Electronic Commerce Research and Application, Volume 3, Issue 4, Winter, Elsevier Science, 2004
  191. line


  192. Batch Verifications with ID-Based Signatures
    H. Yoon, J. Cheon, Y. Kim
    ICISC 2004.
  193. line


  194. Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks
    J. Hwang, Y. Kim
    2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04).
  195. line


  196. Secure Group Key Management for Storage Area Networks
    Y. Kim, F. Maino, M. Narasimha, K. Rhee, G. Tsudik
    IEEE Communications Magazine, Vol. 41, No. 8, Aug. 2003.
  197. line


  198. Admission Control in Collaborative Groups
    Y. Kim, D. Mazzochi, G. Tsudik
    2nd IEEE International Symposium on Network Computing and Applications (NCA-03), Massachusetts, USA, April, 2003.
  199. line


  200. An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
    S. Lee, Y. Kim, K. Kim, D. Ryu
    ACNS 2003
  201. line


  202. Decentralized Authentication Mechanism for Object-based Storage Devices
    V. Kher, Y. Kim
    Security in Storage Workshop 2003 (SISW), Washington D.C., Nov. 2003.
  203. line


  204. Security Model for a Multi-Agent Marketplace
    A. Jaiswal, Y. Kim, M. Gini
    The Fifth International Conference on Electronic Commerce (ICEC 03), Pennsylvania, Sep. 2003
  205. line


  206. Admission Control in Peer Groups
    Y. Kim, G. Tsudik
    Large-Scale Network Security Workshop ? New Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles, Virginia, Mar. 2003
  207. line


  208. On the Performance of Group Key Agreement Protocols
    Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik
    The 22nd International Conference on Distributed Computing Systems (IEEE ICDCS 2002)
  209. line


  210. Secure Group Services for Storage Area Networks
    Y. Kim, F. Maino, M. Narasimha, G. Tsudik
    1st International IEEE Security in Storage Workshop (SISW 2002), Dec. 2002
  211. line


  212. Communication-Efficient Group Key Agreement
    Y. Kim, A. Perrig, G. Tsudik
    In Proceedings of IFIP TC11 Sixteenth International Conference on Information Security (IFIP/SEC 2001), Kluwer Academic Publishers, June 2001
  213. line


  214. Exploring Robustness in Group Key Agreement
    Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
    In Proceedings of The 21st International Conference on Distributed Computing Systems (IEEE ICDCS 2001), IEEE Press, April 2001
    Nominated for the best paper award
  215. line


  216. Simple and Fault-tolerant Group Key Agreement Scheme
    Y. Kim, A. Perrig, G. Tsudik
    In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000
  217. line


  218. Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
    In Proceedings of The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE Press, April 2000
  219. line


  220. The Design of a Group Key Agreement API
    G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
    In Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX 2000), IEEE Computer Society Press, 2000
  221. line


  222. On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application
    Y. Kim, S. Lee, and S. Park
    In Proceedings of CARDIS, Smart Card Research and Advanced Application: Second International Conference, Amsterdam, September, 1996.
  223. line


  224. How to Use Exponent Permutations in Cryptography: Classifications and Applications
    S. Park, S. Chee, K. Kim, Y. Kim, and S. Lee
    In Proceedings of International Conference on Cryptology and Information Security, ROC, December, 1996.
  225. line


  226. On the Security of Lin-Chang-Lee Public Key Cryptosystem
    S. Park, Y. Kim, and K. Kim
    Journal of the Korean Institute of Information Security and Cryptography, 1996.
  227. line


bg