Researcher Page

사진

Kim, Yongdae (김용대) I-6736-2012

Department
School of Electrical Engineering(전기및전자공학부)
Website
http://syssec.kaist.ac.kr/~yongdaekHomePage
Research Area

Keyword Cloud

Reload 더보기
1

Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis -

Hong, Byeong Do; Park, Shinjo; Kim, Hongil; et al, IEEE TRANSACTIONS ON MOBILE COMPUTING, v.17, no.10, pp.2366 - 2380, 2018-10

2

Large-Scale Analysis of Remote Code Injection Attacks in Android Apps

Choi, Hyunwoo; Kim, Yongdaeresearcher, SECURITY AND COMMUNICATION NETWORKS, 2018-04

3

GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes

Son, Yunmok; Noh, Juhwan; Choi, Jaeyoung; et al, ACM Transactions on Privacy and Security, v.21, no.2, 2018-02

4

Crime Scene Reconstruction: Online Gold Farming Network Analysis

Kwon, Hyukmin; Mohaisen, Aziz; Woo, Jiyoung; et al, IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.12, no.3, pp.544 - 556, 2017-03

5

Private Over-Threshold Aggregation Protocols over Distributed Datasets

Kim, Myungsun; Mohaisen, Aziz; Cheon, Jung Hee; et al, IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, v.28, no.9, pp.2467 - 2479, 2016-09

6

Supply-Chain Security for Cyberinfrastructure

Forte, Domenic; Perez, Ron; Kim, Yongdaeresearcher; et al, COMPUTER, v.49, no.8, pp.12 - 16, 2016-08

7

Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures

Mohaisen, Aziz; Mekky, Hesham; Zhang, Xinwen; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.12, no.6, pp.675 - 687, 2015-11

8

Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications

Choi, Hyunwoo; Kim, Jeongmin; Hong, Hyunwook; et al, ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, v.45, no.4, pp.593 - 594, 2015-08

9

Hijacking the Vuze BitTorrent network: all your hop are belong to us

Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; et al, IET INFORMATION SECURITY, v.9, no.4, pp.203 - 208, 2015-07

10

Revisiting security of proportional fair scheduler in wireless cellular networks

Park, Han Jin; Yi, Yungresearcher; Kim, Yongdaeresearcher, COMPUTER NETWORKS, v.75, pp.58 - 74, 2014-12

11

Trustworthy Distributed Computing on Social Networks

Mohaisen, Aziz; Tran, Huy; Chandra, Abhishek; et al, IEEE TRANSACTIONS ON SERVICES COMPUTING, v.7, no.3, pp.333 - 345, 2014-07

12

Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs

Mohaien, Abedelaziz; Kune, Denis Foo; Vasserman, Eugene Y.; et al, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.10, no.6, pp.380 - 393, 2013-11

13

The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems

Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; et al, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.14, no.3, 2011-11

14

SECURITY AND PRIVACY IN EMERGING WIRELESS NETWORKS

Cao, Guohong; Hubaux, Jean-Pierre; Kim, Yongdaeresearcher; et al, IEEE WIRELESS COMMUNICATIONS, v.17, no.5, pp.10 - 11, 2010-10

15

On Homomorphic Signatures for Network Coding

Yun, Aaram; Cheon, Jung Hee; Kim, Yongdaeresearcher, IEEE TRANSACTIONS ON COMPUTERS, v.59, no.9, pp.1295 - 1296, 2010-09

16

Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks

Hwang, Joengmin; He, Tian; Kim, Yongdaeresearcher, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, v.21, no.4, pp.547 - 561, 2010-04

17

Secure localization with phantom node detection

Hwang, Joengmin; He, Tian; Kim, Yongdaeresearcher, AD HOC NETWORKS, v.6, no.7, pp.1031 - 1050, 2008-09

18

Provably secure timed-release public key encryption

Cheon, JH; Hopper, N; Kim, Yongdaeresearcher; et al, ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03

19

Design and implementation of a secure multi-agent marketplace

Jaiswal, Ashutosh; Kim, Yongdaeresearcher; Gini, Maria, Electronic Commerce Research and Applications, v.3, no.4, pp.355 - 368, 2004-12

20

On the performance of group key agreement protocols

Amir, Y.; Kim, Yongdaeresearcher; Nita-Rotaru, C.; et al, ACM Transactions on Information and System Security, v.7, no.3, pp.457 - 488, 2004-08

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0