Researcher Page

사진

Kim, Yongdae (김용대) I-6736-2012

Department
School of Electrical Engineering(전기및전자공학부)
Co-author
Collaboration Network Collaboration Network
Website
http://syssec.kaist.ac.kr/~yongdaekHomePage
Research Area

Keyword Cloud

Reload 더보기
1

Crime Scene Reconstruction: Online Gold Farming Network Analysis

Kwon, Hyukmin; Mohaisen, Aziz; Woo, Jiyoung; Kim, Yongdaeresearcher; Lee, Eunjo; Kim, Huy KangIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.12, no.3, pp.544 - 556, 2017-03

2

Private Over-Threshold Aggregation Protocols over Distributed Datasets

Kim, Myungsun; Mohaisen, Aziz; Cheon, Jung Hee; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.28, no.9, pp.2467 - 2479, 2016-09

3

Supply-Chain Security for Cyberinfrastructure

Forte, Domenic; Perez, Ron; Kim, Yongdaeresearcher; Bhunia, SwarupIEEE COMPUTER SOCCOMPUTER, v.49, no.8, pp.12 - 16, 2016-08

4

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

Mohaisen, Aziz; Mekky, Hesham; Zhang, Xinwen; Xie, Haiyong; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687, 2015-11

5

Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications

Choi, Hyunwoo; Kim, Jeongmin; Hong, Hyunwook; Kim, Yongdaeresearcher; Lee, Jonghyup; Han, DongsuresearcherASSOC COMPUTING MACHINERYACM SIGCOMM COMPUTER COMMUNICATION REVIEW, v.45, no.4, pp.593 - 594, 2015-08

6

Hijacking the Vuze BitTorrent network: all your hop are belong to us

Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Kim, YongdaeresearcherINST ENGINEERING TECHNOLOGY-IETIET INFORMATION SECURITY, v.9, no.4, pp.203 - 208, 2015-07

7

Revisiting security of proportional fair scheduler in wireless cellular networks

Park, Han Jin; Yi, Yungresearcher; Kim, YongdaeresearcherELSEVIER SCIENCE BVCOMPUTER NETWORKS, v.75, pp.58 - 74, 2014-12

8

Trustworthy Distributed Computing on Social Networks

Mohaisen, Aziz; Tran, Huy; Chandra, Abhishek; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON SERVICES COMPUTING, v.7, no.3, pp.333 - 345, 2014-07

9

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

Mohaien, Abedelaziz; Kune, Denis Foo; Vasserman, Eugene Y.; Kim, Myungsun; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11

10

The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Kim, YongdaeresearcherASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11

11

SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdaeresearcher; Zhang, YanchaoIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

12

On Homomorphic Signatures for Network Coding

Yun, Aaram; Cheon, Jung Hee; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON COMPUTERS, v.59, no.9, pp.1295 - 1296, 2010-09

13

Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks

Hwang, Joengmin; He, Tian; Kim, YongdaeresearcherIEEE COMPUTER SOCIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.21, no.4, pp.547 - 561, 2010-04

14

Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, YongdaeresearcherELSEVIER SCIENCE BVAD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

15

Provably secure timed-release public key encryption

Cheon, JH; Hopper, N; Kim, Yongdaeresearcher; Osipkov, IASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03

16

Design and implementation of a secure multi-agent marketplace

Jaiswal, Ashutosh; Kim, Yongdaeresearcher; Gini, MariaElsevierElectronic Commerce Research and Applications, v.3, no.4, pp.355 - 368, 2004-12

17

On the performance of group key agreement protocols

Amir, Y.; Kim, Yongdaeresearcher; Nita-Rotaru, C.; Tsudik, G.Association for Computing Machinery (ACM)ACM Transactions on Information and System Security, v.7, no.3, pp.457 - 488, 2004-08

18

Group key agreement efficient in communication

Kim, Yongdaeresearcher; Perrig, A; Tsudik, GIEEE COMPUTER SOCIEEE TRANSACTIONS ON COMPUTERS, v.53, no.7, pp.905 - 921, 2004-07

19

Secure group communication using robust contributory key agreement

Amir, Y; Kim, Yongdaeresearcher; Nita-Rotaru, C; Schultz, JL; Stanton, J; Tsudik, GIEEE COMPUTER SOCIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.15, no.5, pp.468 - 480, 2004-05

20

Tree-based group key agreement

Kim, Yongdaeresearcher; Perrig, A.; Tsudik, G.Association for Computing Machinery (ACM)ACM Transactions on Information and System Security, v.7, no.1, pp.60 - 96, 2004-02

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0