- Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane
Hongil Kim, Jiho Lee, Eunkyu Lee, Yongdae Kim
IEEE Symposium on Security and Privacy (Oakland 2019) - To Appear
- Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -
Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim, Hyunwook Hong,
Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee and Yongdae Kim
IEEE Transactions on Mobile Computing, Vol. 17, 2018
- GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes
Yunmok Son, Juhwan Noh, Jaeyeong Choi and Yongdae Kim
ACM Transactions on Privacy and Security, Vol. 21, No. 2, Article 10, 2018
- GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier
Byeongdo Hong, Sangwook Bae, and Yongdae Kim
Network and Distributed Systems Security (NDSS) Symposium 2018
- Crime Scene Reconstruction: Online Gold Farming Network Analysis.
Hyukmin Kwon, Aziz Mohaisen, Jiyoung Woo, Yongdae Kim, Eunjo Lee, Huy Kang Kim:
IEEE Trans. Information Forensics and Security 12(3): 544-556 (2017)
- Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin
Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim
ACM Conference on Computer and Communications Security. (CCS 2017)
Media: ACM The Morning Paper
- Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications
Hocheol Shin, Dohyun Kim, Yujin Kwon, and Yongdae Kim
Conference on Cryptographic Hardware and Embedded Systems. (CHES 2017)
Media:
The Register
- When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks
Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, and Yongdae Kim
Proceedings of the 2nd IEEE European Symposium on Security and Privacy. (EuroS&P 2017)
- Enabling Automatic Protocol Behavior Analysis for Android Applications
Jeongmin Kim, Hyunwoo Choi, Hun Namkung, Woohyun Choi, Byungkwon Choi, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han
The 12th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT '16)
- PIkit: A New Kernel-Independent Processor-Interconnect Rootkit
Wonjun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, and John Kim
Proceedings of the 25th USENIX Conference on Security Symposium. (USENIX Security 2016)
- Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems
Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, and Yongdae Kim
10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
- This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump
Youngseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, and Yongdae Kim
10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
- Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack
Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim
The 17th World Conference on Information Security Applications (WISA 2016)
- Pay As You Want: Bypassing Charging System in Operational Cellular Networks
Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee and Yongdae Kim
The 17th World Conference on Information Security Applications (WISA 2016)
- Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4
Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi and Yongdae Kim
9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2016)
Best Paper Award
- Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures
Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie and Yongdae Kim
IEEE Transactions on Dependable and Secure Computing (TDSC), vol.12 no.6, 2015
- Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations
Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim.
ACM CCS 2015
Media:
CVE-2015-6614, Nexus Security Bulletin, CERT, DSLReports, IT World, Softpedia, tom's guide, Pocketnow, FierceMobileIT, Techworm, Neowin, Network World
- Security Analysis of FHSS-type Drone Controller
Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, Yongdae Kim
WISA 2015
- Frying PAN: Dissecting Customized Protocol for Personal Area Network
Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim
WISA 2015
- BurnFit: Analyzing and Exploiting Wearable Devices
Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim
WISA 2015
Best Paper Award
- Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors
Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, and Yongdae Kim
Usenix Security 2015 Media:
PCWorld, Slashdot, Popular Science, New York Daily, Network World, Gizmodo, Discover Magazine
- Bittersweet ADB: Attacks and Defenses
Sungjae Hwang, Sungho Lee, Yongdae Kim, and Sukyoung Ryu
AsiaCCS'15
- Timing Attacks on Access Privacy in ICN and Countermeasures
Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie, and Yongdae Kim
IEEE TDSC, 2015.
- Revisiting security of proportional fair scheduler in wireless cellular networks
Hanjin Park, Yung Yi, Yongdae Kim
Computer Networks 2014
- SocialCloud: Trustworthy Distributed Computing on Social Networks
Aziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim
IEEE Transactions on Services Computing, 2014
- Analyzing Security of Korean USIM-based PKI Certificate Service
Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim
15th International Workshop on Information Security Applications (WISA 2014)
- Hijacking the Vuze BitTorrent network: all your hop are belong to us
Eric Chan-Tin, Victor Heorhiadi, Nick Hopper, Yongdae Kim
IET Information Security, 2014
- Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks
Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, and Myungchul Kim,
RAID 2014
- Secure encounter-based social networks: Requirements, challenges, and designs.
Aziz Mohaisen, Denis Foo Kune, Eugene Vasserman, Myungsun Kim, and Yongdae Kim
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), 2013
- Peer Pressure: Exerting Malicious Influence on Routers at a Distance
Max Schuchard, Christopher Thompson, Nick Hopper, Yongdae Kim
Distributed Computing Systems (ICDCS), 2013
- Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
Denis Foo Kune, John Backes, Shane Clark, Daniel Kramer, Matthew Reynolds, Kevin Fu, Yongdae Kim, Wenyuan Xu
IEEE Symposium on Security and Privacy (Oakland 2013)
- Dynamix: Anonymity on Dynamic Social Structures
Abedelaziz Mohaisen, Huy Tran, Ting Zhu, and Yongdae Kim
8th ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2013)
- Protecting Access Privacy of Cached Contents in Information
Centric Networks
Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae
Kim
ACM Symposium on Information, Computer and Communications Security
(ASIACCS 2013)
- SocialCloud:
Using Social Networks for Building Distributed Computing Services,
A. Mohaisen, H. Tran, A. Chandra, and Y. Kim,
ACM Symposium on Information, Computer
and Communications Security (ASIACCS 2013), Also available at Technical
Report, CS
Department, University of Minnesota 2011 Media:
MIT
Technical Review, The Verge,
MSN.COM,
Data News
- Towards
Accurate Accounting of Cellular Data for TCP Retransmission
Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, and Yongdae
Kim
ACM International Workshop on Mobile Computing Systems and Applications
(HotMobile'13)
- Towards a safe Integrated Clinical Environment: A communication security perspective
Denis Foo Kune, Eugene Vasserman, Krishna Venkatasubramanian, Yongdae Kim, Insup Lee
ACM Workshop on Medical Communication Systems (MedCOMM 2012)
- Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling
Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang 2012 Military Communications Conference (MILCOM 2012).
- One-way indexing for plausible deniability in censorship resistant storage
Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim
USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)
- On the Mixing Time of Directed Social Graphs and Security
Implications
Abedalaziz Mohaisen, Huy Tran, Nicholas Hopper, and
Yongdae Kim ACM Symposium on Information, Computer and
Communications Security (ASIACCS 2012)
- Location leaks on the GSM air
interface,
D.
F.
Kune, J. Koelndorfer, N. Hopper, and Y. Kim, ISOC Network & Distributed System
Security Symposium (NDSS 2012)
Nominated for the best
paper
award Media:
Ars
Technica, Slashdot, MPR, Fox
Twin Cities, Physorg, TG
Daily, Network
World, e!
Science News, Scientific
Computing, gizmag, Crazy
Engineers, PC
Advisor, Mobile
Magazine, The
CyberJungle, Inquisitr
- Taking
Routers Off
Their Meds: Unstable Routers and the Buggy BGP Implementations That
Cause Them,
M. Schuchard, C. Thompson, N. Hopper, Y. Kim,
Technical Report, CS Department, University of Minnesota, 2011
- Censorship
resistant overlay publishing,
E. Y. Vasserman, V. Heorhiadi, Y. Kim, N. Hopper,
Technical Report, CS Department, University of Minnesota, 2011
- i-Code:
A New Approach to Practical Network Coding for Content Distribution,
H. J. Kang, A. Yun, E. Y. Vasserman, Y. Kim,
Technical Report, CS Department, University of Minnesota 2011
- The
FrogBoiling Attack: Limitations of Secure Network Coordinate
Systems,
E. Chan-Tin, V.
Heorhiadi, Y. Kim, and N. Hopper,
ACM
Transactions on Information and System Security
(TISSEC) 14(3), 2011
- An analysis of a social
network-based Sybil defense in mobile networks,
A. Mohaisen, T. AbuHmed, H. J. Kang, D. Nyang, Y. Kim,
In 5th ACM
International Conference on Ubiquitous Information Management and
Communication (ICUIMC 2011)
- Understanding social networks
properties for trustworthy computing,
A. Mohaisen, H. Tran, N. Hopper, and Y. Kim,
The 31st IEEE ICDCS Workshops (SIMPLEX 2011),
Minneapolis, MN, USA, IEEE (Invited Paper)
- Incorporating trust into social
network-based Sybil defenses,
A. Mohaisen, N. Hopper, Y. Kim,
The 30th IEEE Conference on Computer Communications
(INFOCOM'11)
- Losing
control of the Internet: Using the data plane to attack the control
plane,
M. Schuchard, E. Vasserman, A. Mohaisen, D. F. Kune, N. Hopper, and
Y. Kim,
ISOC Network & Distributed System
Security Symposium (NDSS 2011) Media:
New
Scientist,
Slashdot,
ZDNet,
CBS News,
Minnesota Daily,
Metro,
Gizmodo,
The Register
- Exploring In-Situ Sensing
Irregularity
in Wireless Sensor Networks.
J. Hwang, T. He, and Y. Kim.
IEEE Transactions on Parallel and
Distributed Systems, vol. 21, issue 4, pp. 547-561 , 2010.
- On Homomorphic Signatures for
Network Coding,
A.
Yun, J. Cheon, Y. Kim,
Transactions on Computer (brief contribution), vol.
59,
issue 9, 2010.
- Recruiting New Tor Relays with
BRAIDS,
R. Jansen, N. Hopper, and Y. Kim,
ACM Conference on Computer and Communications
Security
(CCS),
2010.
- Measuring
the mixing time of social graphs,
A. Mohaisen, A. Yun, and Y. Kim,
ACM Internet Measurement Conference
(IMC),
2010.
- Balancing the Shadows,
M. Schuchard, A. Dean, V. Heorhiadi, Y. Kim, and N. Hopper,
Workshop on Privacy in the Electronic Society
(WPES), 2010.
- Efficient Cryptographic
Primitives for Private
Data Mining,
M. Shaneck, and Y. Kim,
HICSS, Koloa, Kauai, HI, USA, IEEE Computer
Society, pp.
1-9, 2010.
- Timing attacks on PIN
Input Devices,
D. Foo Kune, and Y. Kim,
ACM
Conference on Computer and Communications Security (CCS/Posters),
2010.
- Losing Control of the Internet: Using the Data Plane
to
Attack
the Control Plane,
M. Schuchard, A. Mohaisen, E. Vasserman, D. F. Kune, Y. Kim, and N.
Hopper,
ACM Conference on Computer and Communications
Security (CCS/Posters), 2010.
- Secure Encounter-based Social
Networks: Requirements, Challenges, and Designs,
A. Mohaisen, E. Vasserman,
M. Schuchard, D. F. Kune, and Y. Kim,
ACM Conference on
Computer and Communications Security (CCS/Posters), 2010.
- The
Distributed Virtual Network for High Fidelity, Large Scale Peer to Peer
Network Simulation,
Denis Foo Kune, Tyson Malchow, James Tyra, Nicholas J. Hopper, Yongdae
Kim,
University of Minnesota, Technical report, 2010.
- Attacking the Kad Network
- Real World Evaluation and High
Fidelity Simulation using DVN -,
E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper,
Y. Kim,
Wiley Security and Communication
Networks, 2009.
- Membership-concealing overlay
networks,
E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Y. Kim,
ACM Conference on Computer and Communications
Security
(CCS), 2009
- Scalable onion routing with Torsk,
J. McLachlan, A. Tran, N. Hopper, Y. Kim,
ACM Conference on Computer and Communications
Security
(CCS), 2009
- On
Protecting Integrity and Confidentiality of Cryptographic File System
for Outsourced Storage,
A. Yun, C. Shi, Y. Kim,
The ACM Cloud Computing Security Workshop (CCSW),
2009
- Hashing it out in public:
Common failure modes of DHT-based anonymity schemes,
A. Tran, N. Hopper, Y. Kim,
Workshop on Privacy in the Electronic Society
(WPES),
2009
- The Frogboiling attack:
limitations of anomaly detection for secure network coordinates,
E. Chan-Tin, D. Feldman, N. Hopper, Y. Kim,
SecureComm, 2009
- Why
Kad Lookup Fails,
H. -J. Kang, E. Chan-Tin, N. Hopper, Y. Kim,
IEEE International Conference on Peer-to-Peer
Computing
(P2P), 2009
- Towards Complete Node Enumeration
in a Peer-to-Peer Botnet,
B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler,
G. Sinclair, N. Hopper, D. Dagon, and Y. Kim,
ACM Symposium on Information, Computer &
Communication Security (ASIACCS 2009)
- Secure Localization with
Phantom Node
Detection,
J. Hwang, T. He, Y. Kim,
Ad Hoc Networks, Volume 6, Issue 7 (September 2008)
Elsevier.
- Provably Secure
Timed-Release Public Key
Encryption.
J.
Cheon, N. Hopper, Y. Kim, I. Osipkov,(alphabetical order. Main author
of the paper is I. Osipkov.)
ACM Transactions on Information Systems Security
Volume
11
, Issue 2 (March 2008).
- Attacking the Kad
Network,
P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Foo Kune, N. Hopper, and
Y. Kim.
at SecureComm 2008.
- Building Trust in Storage
Outsourcing: Secure Accounting of Utility Storage,
V. Kher and Y. Kim,
IEEE International Symposium on Reliable
Distributed
Systems (SRDS), 2007
- In-Situ Sensing Area Modeling
for Wireless Sensor Networks,
J. Hwang, T. He, Y. Kim.
ACM Conference on Embedded Networked Sensor Systems
(SenSys), 2007.
- Combating doublespending using
cooperative P2P systems,
I. Osipkov, E. Vasserman, N. Hopper and Y. Kim.
2007 IEEE Conference on Distributed Computing
Systems
(ICDCS), 2007.
- Realistic
Sensing Area Modeling.
J. Hwang, Y. Gu, T. He, and Y. Kim.
IEEE Infocom 2007 Minisymposia, August
2007.
- Detecting Phantom Nodes in Wireless
Sensor Networks.
J. Hwang, T. He, and Y. Kim.
IEEE Infocom2007 Minisymposia, August
2007.
- Robust
Accounting in Decentralized P2P Storage Systems.
I. Osipkov, P. Wang, N. Hopper and Y. Kim.
In Proceedings of the 26th IEEE Conference on
Distributed
Computing systems (ICDCS), 2006.
- Authenticated Key-Insulated
Public Key Encryption and Timed-Release Cryptography.
J. -H. Cheon, N. Hopper, Y. Kim and I. Osipkov.
In 10th Conference on Financial Cryptography and
Data
Security, February 2006.
- Experiences in Building an
Object-Based Storage System based on the OSD T-10 Standard,
D. Du, D. He, C. Hong, J. Jeong, V. Kher, Y. Kim, Y. Lu, A. Raghuveer,
S. Sharafkandi,
NASA/IEEE Conference on Mass Storage Systems and
Technologies 2006.
- SGFS: Secure, Efficient and
Policy-based Global File Sharing (Short Paper),
V. Kher, E. Seppanen, C. Leach, Y. Kim,
NASA/IEEE Conference on Mass Storage Systems and
Technologies, 2006.
- Privacy
Protection in PKIs: A
Separation-of-Authority Approach.
T. Kwon, J. Cheon, Y. Kim, J. Lee,
7th International Workshop on
Information Security Applications (WISA) 2006.
- Privacy Preserving Nearest Neighbor
Search,
M.
Shaneck, Y. Kim, V. Kumar,
IEEE International Workshop on Privacy Aspects of
Data
Mining, December
2006
- Myrmic: Secure and Robust DHT Routing,
P. Wang, N. Hopper, I. Osipkov, and Y. Kim,
UMN DTC Research Report 2006/20, November
2006.
- Strengthening Password-Based
Authentication Protocols Against Online Dictionary Attacks,
P. Wang, Y. Kim, V. Kher, T. Kwon,
ACNS 2005.
- Securing
Distributed Storage: Challenges, Techniques, and Systems,
V. Kher and Y. Kim,
StorageSS’05. (invited paper)
- Remote Software-based Attestation for
Wireless Sensors.
M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim.
ESAS 2005.
- A Machine Learning Framework for
Network
Anomaly Detection using SVM and GA,
T.
Shon, Y. Kim, C. Lee, J. Moon,
6th IEEE Information Assurance
Workshop, 2005
- On the Performance of
Group Key Agreement Protocols,
Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik,
ACM Transaction on Information and
System Security, Vol. 7, No. 3, Aug. 2004.
- Robust Contributory
Key Agreement in Secure Spread,
Y. Amir, Y. Kim,
C. Nita-Rotaru, J. Schultz, J. Stanton, G. Tsudik,
IEEE Transaction on Parallel and
Distributed System, Vol. 15, No. 5, May 2004.
- Communication-Efficient Group Key
Agreement,
Y. Kim, A.
Perrig, G. Tsudik,
IEEE
Transaction on Computers, Vol. 53, No. 7, Jul. 2004.
- Tree-based Group Key Agreement,
Y.
Kim, A. Perrig, G. Tsudik,
in ACM
Transaction on Information and System Security, Vol. 7, No. 1, Feb.
2004.
- Design and implementation of a
secure
multi-agent marketplace,
A. Jaiswal, Y. Kim, M. Gini,
Electronic Commerce Research and Application,
Volume 3, Issue 4, Winter, Elsevier Science, 2004
- Batch Verifications with
ID-Based Signatures,
H. Yoon, J. Cheon, Y. Kim,
ICISC 2004.
- Revisiting Random Key
Pre-distribution Schemes for Wireless Sensor Networks,
J. Hwang, Y. Kim,
2004 ACM Workshop on Security of Ad Hoc and Sensor
Networks (SASN ’04).
- Secure Group
Key Management for Storage Area Networks,
Y. Kim, F. Maino, M. Narasimha, K. Rhee, G. Tsudik,
IEEE Communications Magazine,
Vol. 41, No. 8, Aug. 2003.
- Admission Control in Collaborative
Groups,
Y. Kim, D. Mazzochi, G. Tsudik,
2nd IEEE International Symposium on Network
Computing and
Applications (NCA-03), Massachusetts, USA, April, 2003.
- An
Efficient Tree-Based Group Key Agreement Using Bilinear Map.
S. Lee, Y. Kim, K. Kim, D. Ryu,
ACNS 2003
- Decentralized Authentication
Mechanism for
Object-based Storage Devices,
V. Kher, Y. Kim,
Security in Storage Workshop 2003 (SISW),
Washington D.C., Nov. 2003.
- Security Model for a
Multi-Agent Marketplace,
A.
Jaiswal, Y. Kim, M. Gini,
The Fifth International Conference on Electronic Commerce (ICEC 03),
Pennsylvania, Sep. 2003
- Admission Control in Peer Groups,
Y.
Kim, G. Tsudik,
Large-Scale Network
Security Workshop – New Directions in Scalable Cyber-Security in
Large-Scale Networks: Deployment Obstacles, Virginia, Mar. 2003
- On the performance of
Group Key Agreement Protocols,
Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik,
The 22nd International Conference on Distributed Computing Systems
(IEEE ICDCS 2002)
- Secure Group Services
for Storage Area Networks,
Y. Kim, F. Maino, M. Narasimha, G. Tsudik,
1st International IEEE Security in Storage
Workshop (SISW 2002), Dec. 2002
- Communication-Efficient Group
Key Agreement,
Y. Kim, A. Perrig, G. Tsudik,
In
Proceedings of IFIP TC11 Sixteenth International Conference on
Information Security (IFIP/SEC 2001), Kluwer Academic Publishers, June
2001
- Exploring Robustness in Group Key
Agreement,
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik,
In Proceedings of The 21st International Conference
on
Distributed Computing Systems (IEEE ICDCS 2001), IEEE Press, April
2001, Nominated best paper award
- Simple
and Fault-tolerant Group Key Agreement Scheme,
Y. Kim, A. Perrig, G. Tsudik,
In Proceedings of the 7th ACM Conference on Computer and Communications
Security (ACM CCS 2000), ACM Press, Nov. 2000
- Secure Group Communication in
Asynchronous Networks with Failures: Integration and Experiments,
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T.
Schlossnagle, J. Schultz, J. Stanton and G. Tsudik,
In
Proceedings of The 20th International Conference on Distributed
Computing Systems (IEEE ICDCS 2000), IEEE Press, April 2000
- The
Design of a Group Key Agreement API,
G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik,
In Proceedings of DARPA
Information Survivability Conference and Exposition (DISCEX 2000), IEEE
Computer Society Press, 2000
- On the Design of Stream Ciphers and a Hash Function
Suitable to Smart Card Application,
Y. Kim, S. Lee, and S. Park,
In
Proceedings of CARDIS, Smart Card Research and Advanced Application:
Second International Conference, Amsterdam, September, 1996.
- How to Use Exponent
Permutations in Cryptography: Classifications and Applications,
S. Park, S. Chee, K. Kim, Y. Kim, and S. Lee,
In
Proceedings of International Conference on Cryptology and Information
Security, ROC, December, 1996.
- On the Security of Lin-Chang-Lee Public
Key Cryptosystem,
S. Park, Y. Kim, and K. Kim,
Journal of the Korean Institute of Information
Security and Cryptography, 1996.
|