Researcher Page

사진

Kim, Yongdae (김용대) I-6736-2012

Department
School of Electrical Engineering(전기및전자공학부)
Co-author
Collaboration Network Collaboration Network
Website
http://syssec.kaist.ac.kr/~yongdaekHomePage
Research Area

Keyword Cloud

Reload 더보기
1

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

Choi, Hyunwoo; Kim, YongdaeresearcherWILEY-HINDAWISECURITY AND COMMUNICATION NETWORKS, 2018-04

2

GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes

Son, Yunmok; Noh, Juhwan; Choi, Jaeyoung; Kim, YongdaeresearcherASSOC COMPUTING MACHINERYACM Transactions on Privacy and Security, v.21, no.2, 2018-02

3

Crime Scene Reconstruction: Online Gold Farming Network Analysis

Kwon, Hyukmin; Mohaisen, Aziz; Woo, Jiyoung; Kim, Yongdaeresearcher; Lee, Eunjo; Kim, Huy KangIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.12, no.3, pp.544 - 556, 2017-03

4

Private Over-Threshold Aggregation Protocols over Distributed Datasets

Kim, Myungsun; Mohaisen, Aziz; Cheon, Jung Hee; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.28, no.9, pp.2467 - 2479, 2016-09

5

Supply-Chain Security for Cyberinfrastructure

Forte, Domenic; Perez, Ron; Kim, Yongdaeresearcher; Bhunia, SwarupIEEE COMPUTER SOCCOMPUTER, v.49, no.8, pp.12 - 16, 2016-08

6

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

Mohaisen, Aziz; Mekky, Hesham; Zhang, Xinwen; Xie, Haiyong; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687, 2015-11

7

Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications

Choi, Hyunwoo; Kim, Jeongmin; Hong, Hyunwook; Kim, Yongdaeresearcher; Lee, Jonghyup; Han, DongsuresearcherASSOC COMPUTING MACHINERYACM SIGCOMM COMPUTER COMMUNICATION REVIEW, v.45, no.4, pp.593 - 594, 2015-08

8

Hijacking the Vuze BitTorrent network: all your hop are belong to us

Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Kim, YongdaeresearcherINST ENGINEERING TECHNOLOGY-IETIET INFORMATION SECURITY, v.9, no.4, pp.203 - 208, 2015-07

9

Revisiting security of proportional fair scheduler in wireless cellular networks

Park, Han Jin; Yi, Yungresearcher; Kim, YongdaeresearcherELSEVIER SCIENCE BVCOMPUTER NETWORKS, v.75, pp.58 - 74, 2014-12

10

Trustworthy Distributed Computing on Social Networks

Mohaisen, Aziz; Tran, Huy; Chandra, Abhishek; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON SERVICES COMPUTING, v.7, no.3, pp.333 - 345, 2014-07

11

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

Mohaien, Abedelaziz; Kune, Denis Foo; Vasserman, Eugene Y.; Kim, Myungsun; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11

12

The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Kim, YongdaeresearcherASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11

13

SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdaeresearcher; Zhang, YanchaoIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

14

On Homomorphic Signatures for Network Coding

Yun, Aaram; Cheon, Jung Hee; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON COMPUTERS, v.59, no.9, pp.1295 - 1296, 2010-09

15

Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks

Hwang, Joengmin; He, Tian; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.21, no.4, pp.547 - 561, 2010-04

16

Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, YongdaeresearcherELSEVIER SCIENCE BVAD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

17

Provably secure timed-release public key encryption

Cheon, JH; Hopper, N; Kim, Yongdaeresearcher; Osipkov, IASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03

18

Design and implementation of a secure multi-agent marketplace

Jaiswal, Ashutosh; Kim, Yongdaeresearcher; Gini, MariaElsevierElectronic Commerce Research and Applications, v.3, no.4, pp.355 - 368, 2004-12

19

On the performance of group key agreement protocols

Amir, Y.; Kim, Yongdaeresearcher; Nita-Rotaru, C.; Tsudik, G.Association for Computing Machinery (ACM)ACM Transactions on Information and System Security, v.7, no.3, pp.457 - 488, 2004-08

20

Group key agreement efficient in communication

Kim, Yongdaeresearcher; Perrig, A; Tsudik, GIEEE COMPUTER SOCIEEE TRANSACTIONS ON COMPUTERS, v.53, no.7, pp.905 - 921, 2004-07

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0