Researcher Page

사진

Kim, Yongdae (김용대) I-6736-2012

Department
School of Electrical Engineering(전기및전자공학부)
Co-author
Collaboration Network Collaboration Network
Website
http://syssec.kaist.ac.kr/~yongdaekHomePage
Research Area

Keyword Cloud

Reload 더보기
1

Crime Scene Reconstruction: Online Gold Farming Network Analysis

Kwon, Hyukmin; Mohaisen, Aziz; Woo, Jiyoung; Kim, Yongdaeresearcher; Lee, Eunjo; Kim, Huy KangIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.12, no.3, pp.544 - 556, 2017-03

2

Private Over-Threshold Aggregation Protocols over Distributed Datasets

Mohaisen, Aziz; Kim, Yongdaeresearcher; Cheon, Jung Hee; Kim, MyungsunIEEE COMPUTER SOCIEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.28, no.9, pp.2467 - 2479, 2016-09

3

Supply-Chain Security for Cyberinfrastructure

Forte, Domenic; Kim, Yongdaeresearcher; Perez, Ron; Bhunia, SwarupIEEE COMPUTER SOCCOMPUTER, v.49, no.8, pp.12 - 16, 2016-08

4

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

Mekky, Hesham; Kim, Yongdaeresearcher; Zhang, Xinwen; Mohaisen, Aziz; Xie, HaiyongIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687, 2015-11

5

Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications

Hong, Hyunwook; Kim, Yongdaeresearcher; Lee, Jonghyup; Choi, Hyunwoo; Han, Dongsuresearcher; Kim, JeongminASSOC COMPUTING MACHINERYACM SIGCOMM COMPUTER COMMUNICATION REVIEW, v.45, no.4, pp.593 - 594, 2015-08

6

Hijacking the Vuze BitTorrent network: all your hop are belong to us

Kim, Yongdaeresearcher; Heorhiadi, Victor; Hopper, Nicholas; Chan-Tin, EricINST ENGINEERING TECHNOLOGY-IETIET INFORMATION SECURITY, v.9, no.4, pp.203 - 208, 2015-07

7

Revisiting security of proportional fair scheduler in wireless cellular networks

Yi, Yungresearcher; Kim, Yongdaeresearcher; Park, Han JinELSEVIER SCIENCE BVCOMPUTER NETWORKS, v.75, pp.58 - 74, 2014-12

8

Trustworthy Distributed Computing on Social Networks

Mohaisen, Aziz; Tran, Huy; Chandra, Abhishek; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON SERVICES COMPUTING, v.7, no.3, pp.333 - 345, 2014-07

9

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

Vasserman, Eugene Y.; Mohaien, Abedelaziz; Kim, Myungsun; Kune, Denis Foo; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11

10

The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

Hopper, Nicholas; Kim, Yongdaeresearcher; Chan-Tin, Eric; Heorhiadi, VictorASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11

11

SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

Kim, Yongdaeresearcher; Cao, Guohong; Zhang, Yanchao; Hubaux, Jean-PierreIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

12

On Homomorphic Signatures for Network Coding

Kim, Yongdaeresearcher; Cheon, Jung Hee; Yun, AaramIEEE COMPUTER SOCIEEE TRANSACTIONS ON COMPUTERS, v.59, no.9, pp.1295 - 1296, 2010-09

13

Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks

He, Tian; Kim, Yongdaeresearcher; Hwang, JoengminIEEE COMPUTER SOCIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.21, no.4, pp.547 - 561, 2010-04

14

Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, YongdaeresearcherELSEVIER SCIENCE BVAD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

15

Provably secure timed-release public key encryption

Cheon, JH; Osipkov, I; Hopper, N; Kim, YongdaeresearcherASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03

16

Design and implementation of a secure multi-agent marketplace

Jaiswal, Ashutosh; Kim, Yongdaeresearcher; Gini, MariaElsevierElectronic Commerce Research and Applications, v.3, no.4, pp.355 - 368, 2004-12

17

On the performance of group key agreement protocols

Amir, Y.; Kim, Yongdaeresearcher; Tsudik, G.; Nita-Rotaru, C.Association for Computing Machinery (ACM)ACM Transactions on Information and System Security, v.7, no.3, pp.457 - 488, 2004-08

18

Group key agreement efficient in communication

Kim, Yongdaeresearcher; Perrig, A; Tsudik, GIEEE COMPUTER SOCIEEE TRANSACTIONS ON COMPUTERS, v.53, no.7, pp.905 - 921, 2004-07

19

Secure group communication using robust contributory key agreement

Stanton, J; Tsudik, G; Amir, Y; Kim, Yongdaeresearcher; Schultz, JL; Nita-Rotaru, CIEEE COMPUTER SOCIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.15, no.5, pp.468 - 480, 2004-05

20

Tree-based group key agreement

Perrig, A.; Kim, Yongdaeresearcher; Tsudik, G.Association for Computing Machinery (ACM)ACM Transactions on Information and System Security, v.7, no.1, pp.60 - 96, 2004-02

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0