Yongdae Kim's Publications

For copyright of the versions available below, please see here.
  1. GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
    Byeongdo Hong, Sangwook Bae, and Yongdae Kim
    Network and Distributed Systems Security (NDSS) Symposium 2018 (To appear)
  2. Crime Scene Reconstruction: Online Gold Farming Network Analysis.
    Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kang Kim:
    IEEE Trans. Information Forensics and Security 12(3): 544-556 (2017)
  3. Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
    Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim
    ACM Conference on Computer and Communications Security. (CCS 2017)
    Media: ACM The Morning Paper
  4. Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
    Hocheol Shin, Dohyun Kim, Yujin Kwon, and Yongdae Kim
    Conference on Cryptographic Hardware and Embedded Systems. (CHES 2017)
    Media: The Register
  5. When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
    Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, and Yongdae Kim
    Proceedings of the 2nd IEEE European Symposium on Security and Privacy. (EuroS&P 2017)
  6. Enabling Automatic Protocol Behavior Analysis for Android Applications
    Jeongmin Kim, Hyunwoo Choi, Hun Namkung, Woohyun Choi, Byungkwon Choi, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han
    The 12th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT '16)
  7. PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
    Wonjun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, and John Kim
    Proceedings of the 25th USENIX Conference on Security Symposium. (USENIX Security 2016)
  8. Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems
    Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, and Yongdae Kim
    10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
  9. This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump
    Youngseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, and Yongdae Kim
    10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
  10. Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
    Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim
    The 17th World Conference on Information Security Applications (WISA 2016)
  11. Pay As You Want: Bypassing Charging System in Operational Cellular Networks
    Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee and Yongdae Kim
    The 17th World Conference on Information Security Applications (WISA 2016)
  12. Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
    Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi and Yongdae Kim
    9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2016)
    Best Paper Award
  13. Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
    Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie and Yongdae Kim
    IEEE Transactions on Dependable and Secure Computing (TDSC), vol.12 no.6, 2015
  14. Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
    Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim.
    ACM CCS 2015
    Media: CVE-2015-6614, Nexus Security Bulletin, CERT, DSLReports, IT World, Softpedia, tom's guide, Pocketnow, FierceMobileIT, Techworm, Neowin, Network World
  15. Security Analysis of FHSS-type Drone Controller
    Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, Yongdae Kim
    WISA 2015
  16. Frying PAN: Dissecting Customized Protocol for Personal Area Network
    Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim
    WISA 2015
  17. BurnFit: Analyzing and Exploiting Wearable Devices
    Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim
    WISA 2015
    Best Paper Award
  18. Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
    Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim
    Usenix Security 2015
    Media: PCWorld, Slashdot, Popular Science, New York Daily, Network World, Gizmodo, Discover Magazine
  19. Bittersweet ADB: Attacks and Defenses
    Sungjae Hwang, Sungho Lee, Yongdae Kim, and Sukyoung Ryu
    AsiaCCS'15
  20. Timing Attacks on Access Privacy in ICN and Countermeasures
    Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, and Yongdae Kim
    IEEE TDSC, 2015.
  21. Revisiting security of proportional fair scheduler in wireless cellular networks
    Hanjin Park, Yung Yi, Yongdae Kim
    Computer Networks 2014
  22. SocialCloud: Trustworthy Distributed Computing on Social Networks
    Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim
    IEEE Transactions on Services Computing, 2014
  23. Analyzing Security of Korean USIM-based PKI Certificate Service
    Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim
    15th International Workshop on Information Security Applications (WISA 2014)
  24. Hijacking the Vuze BitTorrent network: all your hop are belong to us
    Eric Chan-Tin, Victor Heorhiadi, Nick Hopper, Yongdae Kim
    IET Information Security, 2014
  25. Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
    Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, and Myungchul Kim,
    RAID 2014
  26. Secure encounter-based social networks: Requirements, challenges, and designs.
    Aziz Mohaisen, Denis Foo Kune, Eugene Vasserman, Myungsun Kim, and Yongdae Kim
    IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2013
  27. Peer Pressure: Exerting Malicious Influence on Routers at a Distance
    Max Schuchard, Christopher Thompson, Nick Hopper, Yongdae Kim
    Distributed Computing Systems (ICDCS), 2013
  28. Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
    Denis Foo Kune, John Backes, Shane Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu
    IEEE Symposium on Security and Privacy (Oakland 2013)
  29. Dynamix: Anonymity on Dynamic Social Structures
    Abedelaziz Mohaisen, Huy Tran, Ting Zhu, and Yongdae Kim
    8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
  30. Protecting Access Privacy of Cached Contents in Information Centric Networks
    Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
  31. SocialCloud: Using Social Networks for Building Distributed Computing Services,
    A. Mohaisen, H. Tran, A. Chandra, and Y. Kim, 
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Also available at Technical Report, CS Department, University of Minnesota 2011
    Media: MIT Technical Review, The Verge, MSN.COM, Data News
  32. Towards Accurate Accounting of Cellular Data for TCP Retransmission
    Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, and Yongdae Kim
    ACM International Workshop on Mobile Computing Systems and Applications (HotMobile'13)
  33. Towards a safe Integrated Clinical Environment: A communication security perspective
    Denis Foo Kune, Eugene Vasserman, Krishna Venkatasubramanian, Yongdae Kim, Insup Lee
    ACM Workshop on Medical Communication Systems (MedCOMM 2012)
  34. Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling
    Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang
    2012 Military Communications Conference (MILCOM 2012).
  35. One-way indexing for plausible deniability in censorship resistant storage
    Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
    USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)
  36. On the Mixing Time of Directed Social Graphs and Security Implications
    Abedalaziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim
    ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012)
  37. Location leaks on the GSM air interface,
    D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim, 
    ISOC Network & Distributed System Security Symposium (NDSS 2012)
    Nominated for the best paper award
    Media: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr
  38. Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them,
    M. Schuchard, C. Thompson, N. Hopper, Y. Kim,
    Technical Report, CS Department, University of Minnesota, 2011
  39. Censorship resistant overlay publishing
    E. Y. Vasserman, V. Heorhiadi, Y. Kim, N. Hopper,
    Technical Report, CS Department, University of Minnesota, 2011
  40. i-Code: A New Approach to Practical Network Coding for Content Distribution,
    H. J. Kang, A. Yun, E. Y. Vasserman, Y. Kim,
    Technical Report, CS Department, University of Minnesota 2011
  41. The FrogBoiling Attack: Limitations of Secure Network Coordinate Systems,
    E. Chan-Tin, V. Heorhiadi, Y. Kim, and N. Hopper, 
    ACM Transactions on Information and System Security (TISSEC) 14(3),  2011
  42. An analysis of a social network-based Sybil defense in mobile networks,
    A. Mohaisen, T. AbuHmed, H. J. Kang, D. Nyang, Y. Kim,
    In 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011)
  43. Understanding social networks properties for trustworthy computing,
    A. Mohaisen, H. Tran, N. Hopper, and Y. Kim,
    The 31st IEEE ICDCS Workshops (SIMPLEX 2011), Minneapolis, MN, USA, IEEE (Invited Paper)
  44. Incorporating trust into social network-based Sybil defenses,
    A. Mohaisen, N. Hopper, Y. Kim,
    The 30th IEEE Conference on Computer Communications (INFOCOM'11)
  45. Losing control of the Internet: Using the data plane to attack the control plane,
    M. Schuchard, E. Vasserman, A. Mohaisen, D. F. Kune, N. Hopper, and Y. Kim, 
    ISOC Network & Distributed System Security Symposium (NDSS 2011)
    Media: New Scientist, Slashdot, ZDNet, CBS News, Minnesota Daily, Metro, Gizmodo, The Register
  46. Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks.
    J. Hwang, T. He, and Y. Kim.
    IEEE Transactions on Parallel and Distributed Systems, vol. 21, issue 4, pp. 547-561 , 2010.
  47. On Homomorphic Signatures for Network Coding,
    A. Yun, J. Cheon, Y. Kim,
    Transactions on Computer (brief contribution), vol. 59, issue 9, 2010.
  48. Recruiting New Tor Relays with BRAIDS,
    R. Jansen, N. Hopper, and Y. Kim,
    ACM Conference on Computer and Communications Security (CCS), 2010.
  49. Measuring the mixing time of social graphs,
    A. Mohaisen, A. Yun, and Y. Kim, 
    ACM Internet Measurement Conference (IMC), 2010. 
  50. Balancing the Shadows,
    M. Schuchard, A. Dean, V. Heorhiadi, Y. Kim, and N. Hopper,
    Workshop on Privacy in the Electronic Society (WPES), 2010.
  51. Efficient Cryptographic Primitives for Private Data Mining,
    M. Shaneck, and Y. Kim,
    HICSS, Koloa, Kauai, HI, USA, IEEE Computer Society, pp. 1-9, 2010.
  52. Timing attacks on PIN Input Devices,
    D. Foo Kune, and Y. Kim,
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010. 
  53. Losing Control of the Internet: Using the Data Plane to Attack the Control Plane,
    M. Schuchard, A. Mohaisen, E. Vasserman, D. F. Kune, Y. Kim, and N. Hopper,
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  54. Secure Encounter-based Social Networks: Requirements, Challenges, and Designs,
    A. Mohaisen, E. Vasserman, M. Schuchard, D. F. Kune, and Y. Kim,
    ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
  55. The Distributed Virtual Network for High Fidelity, Large Scale Peer to Peer Network Simulation,
    Denis Foo Kune, Tyson Malchow, James Tyra, Nicholas J. Hopper, Yongdae Kim, 
    University of Minnesota, Technical report, 2010. 
  56. Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN -,
    E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper, Y. Kim,
    Wiley Security and Communication Networks, 2009. 
  57. Membership-concealing overlay networks,
    E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Y. Kim,
    ACM Conference on Computer and Communications Security (CCS), 2009 
  58. Scalable onion routing with Torsk,
    J. McLachlan, A. Tran, N. Hopper, Y. Kim,
    ACM Conference on Computer and Communications Security (CCS), 2009 
  59. On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage,
    A. Yun, C. Shi, Y. Kim,
    The ACM Cloud Computing Security Workshop (CCSW), 2009 
  60. Hashing it out in public: Common failure modes of DHT-based anonymity schemes,
    A. Tran, N. Hopper, Y. Kim,
    Workshop on Privacy in the Electronic Society (WPES), 2009 
  61. The Frogboiling attack: limitations of anomaly detection for secure network coordinates,
    E. Chan-Tin, D. Feldman, N. Hopper, Y. Kim,
    SecureComm, 2009 
  62. Why Kad Lookup Fails,
    H. -J. Kang, E. Chan-Tin, N. Hopper, Y. Kim,
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2009 
  63. Towards Complete Node Enumeration in a Peer-to-Peer Botnet,
    B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim,
    ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009) 
  64. Secure Localization with Phantom Node Detection,
    J. Hwang, T. He, Y. Kim,
    Ad Hoc Networks, Volume 6, Issue 7 (September 2008) Elsevier. 
  65. Provably Secure Timed-Release Public Key Encryption.
    J. Cheon, N. Hopper, Y. Kim, I. Osipkov,(alphabetical order. Main author of the paper is I. Osipkov.)
    ACM Transactions on Information Systems Security Volume 11 , Issue 2 (March 2008). 
  66. Attacking the Kad Network,
    P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Foo Kune, N. Hopper, and Y. Kim.
    at SecureComm 2008. 
  67. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage,
    V. Kher and Y. Kim,
    IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007 
  68. In-Situ Sensing Area Modeling for Wireless Sensor Networks,
    J. Hwang, T. He, Y. Kim.
    ACM Conference on Embedded Networked Sensor Systems (SenSys), 2007. 
  69. Combating doublespending using cooperative P2P systems,
    I. Osipkov, E. Vasserman, N. Hopper and Y. Kim.
    2007 IEEE Conference on Distributed Computing Systems (ICDCS), 2007. 
  70. Realistic Sensing Area Modeling.
    J. Hwang, Y. Gu, T. He, and Y. Kim.
    IEEE Infocom 2007 Minisymposia, August 2007. 
  71. Detecting Phantom Nodes in Wireless Sensor Networks.
    J. Hwang, T. He, and Y. Kim.
    IEEE Infocom2007 Minisymposia, August 2007. 
  72. Robust Accounting in Decentralized P2P Storage Systems.
    I. Osipkov, P. Wang, N. Hopper and Y. Kim.
    In Proceedings of the 26th IEEE Conference on Distributed Computing systems (ICDCS), 2006. 
  73. Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography.
    J. -H. Cheon, N. Hopper, Y. Kim and I. Osipkov.
    In 10th Conference on Financial Cryptography and Data Security, February 2006. 
  74. Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard,
    D. Du, D. He, C. Hong, J. Jeong, V. Kher, Y. Kim, Y. Lu, A. Raghuveer, S. Sharafkandi,
    NASA/IEEE Conference on Mass Storage Systems and Technologies 2006. 
  75. SGFS: Secure, Efficient and Policy-based Global File Sharing (Short Paper),
    V. Kher, E. Seppanen, C. Leach, Y. Kim,
    NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006. 
  76. Privacy Protection in PKIs: A Separation-of-Authority Approach.
    T. Kwon, J. Cheon, Y. Kim, J. Lee,
    7th International Workshop on Information Security Applications (WISA) 2006.
  77. Privacy Preserving Nearest Neighbor Search,
    M. Shaneck, Y. Kim, V. Kumar,
    IEEE International Workshop on Privacy Aspects of Data Mining, December 2006 
  78. Myrmic: Secure and Robust DHT Routing,
    P. Wang, N. Hopper, I. Osipkov, and Y. Kim,
    UMN DTC Research Report 2006/20, November 2006. 
  79. Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks,
    P. Wang, Y. Kim, V. Kher, T. Kwon,
    ACNS 2005. 
  80. Securing Distributed Storage: Challenges, Techniques, and Systems,
    V. Kher and Y. Kim,
    StorageSS’05. (invited paper) 
  81. Remote Software-based Attestation for Wireless Sensors.
    M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim.
    ESAS 2005. 
  82. A Machine Learning Framework for Network Anomaly Detection using SVM and GA,
    T. Shon, Y. Kim, C. Lee, J. Moon,
    6th IEEE Information Assurance Workshop, 2005
  83. On the Performance of Group Key Agreement Protocols,
    Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik,
    ACM Transaction on Information and System Security, Vol. 7, No. 3, Aug. 2004. 
  84. Robust Contributory Key Agreement in Secure Spread,
    Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, G. Tsudik,
    IEEE Transaction on Parallel and Distributed System, Vol. 15, No. 5, May 2004. 
  85. Communication-Efficient Group Key Agreement,
    Y. Kim, A. Perrig, G. Tsudik,
    IEEE Transaction on Computers, Vol. 53, No. 7, Jul. 2004. 
  86. Tree-based Group Key Agreement,
    Y. Kim, A. Perrig, G. Tsudik,
    in ACM Transaction on Information and System Security, Vol. 7, No. 1, Feb. 2004.
  87. Design and implementation of a secure multi-agent marketplace,
    A. Jaiswal, Y. Kim, M. Gini,
    Electronic Commerce Research and Application, Volume 3, Issue 4, Winter, Elsevier Science, 2004 
  88. Batch Verifications with ID-Based Signatures,
    H. Yoon, J. Cheon, Y. Kim,
    ICISC 2004. 
  89. Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks,
    J. Hwang, Y. Kim,
    2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04). 
  90. Secure Group Key Management for Storage Area Networks,
    Y. Kim, F. Maino, M. Narasimha, K. Rhee, G. Tsudik,
    IEEE Communications Magazine, Vol. 41, No. 8, Aug. 2003. 
  91. Admission Control in Collaborative Groups,
    Y. Kim, D. Mazzochi, G. Tsudik,
    2nd IEEE International Symposium on Network Computing and Applications (NCA-03), Massachusetts, USA, April, 2003. 
  92. An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
    S. Lee, Y. Kim, K. Kim, D. Ryu,
    ACNS 2003 
  93. Decentralized Authentication Mechanism for Object-based Storage Devices,
    V. Kher, Y. Kim,
    Security in Storage Workshop 2003 (SISW), Washington D.C., Nov. 2003. 
  94. Security Model for a Multi-Agent Marketplace,
    A. Jaiswal, Y. Kim, M. Gini,
    The Fifth International Conference on Electronic Commerce (ICEC 03), Pennsylvania, Sep. 2003
  95. Admission Control in Peer Groups,
    Y. Kim, G. Tsudik,
    Large-Scale Network Security Workshop – New Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles, Virginia, Mar. 2003
  96. On the performance of Group Key Agreement Protocols,
    Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik,
    The 22nd International Conference on Distributed Computing Systems (IEEE ICDCS 2002) 
  97. Secure Group Services for Storage Area Networks,
    Y. Kim, F. Maino, M. Narasimha, G. Tsudik,
    1st International IEEE Security in Storage Workshop (SISW 2002), Dec. 2002 
  98. Communication-Efficient Group Key Agreement,
    Y. Kim, A. Perrig, G. Tsudik,
    In Proceedings of IFIP TC11 Sixteenth International Conference on Information Security (IFIP/SEC 2001), Kluwer Academic Publishers, June 2001 
  99. Exploring Robustness in Group Key Agreement,
    Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik,
    In Proceedings of The 21st International Conference on Distributed Computing Systems (IEEE ICDCS 2001), IEEE Press, April 2001, Nominated best paper award 
  100. Simple and Fault-tolerant Group Key Agreement Scheme,
    Y. Kim, A. Perrig, G. Tsudik,
    In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000 
  101. Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments,
    Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik,
    In Proceedings of The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE Press, April 2000 
  102. The Design of a Group Key Agreement API,
    G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik,
    In Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX 2000), IEEE Computer Society Press, 2000
  103. On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application,
    Y. Kim, S. Lee, and S. Park,
    In Proceedings of CARDIS, Smart Card Research and Advanced Application: Second International Conference, Amsterdam, September, 1996. 
  104. How to Use Exponent Permutations in Cryptography: Classifications and Applications,
    S. Park, S. Chee, K. Kim, Y. Kim, and S. Lee,
    In Proceedings of International Conference on Cryptology and Information Security, ROC, December, 1996.
  105. On the Security of Lin-Chang-Lee Public Key Cryptosystem,
    S. Park, Y. Kim, and K. Kim,
    Journal of the Korean Institute of Information Security and Cryptography, 1996.


The views and opinions expressed in this page are strictly those of the page author.
The contents of this page have not been reviewed or approved by the University of Minnesota.