Cyber–Physical Security of a Smart Grid Infrastructure Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli Proceedings of the IEEE 100 (1), 195-209, 2012 | 1321 | 2012 |
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure THJ Kim, LS Huang, A Perring, C Jackson, V Gligor Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013 | 205 | 2013 |
Lightweight source authentication and path validation THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig ACM SIGCOMM Computer Communication Review 44 (4), 271-282, 2014 | 179 | 2014 |
ARPKI: Attack resilient public-key infrastructure D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 173 | 2014 |
The Effect of Social Influence on Security Sensitivity S Das, THJ Kim, LA Dabbish, JI Hong Symposium on Usable Privacy and Security (SOUPS), 2014 | 153 | 2014 |
LAP: Lightweight Anonymity and Privacy HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng Security and Privacy (SP), 2012 IEEE Symposium on, 506-520, 2012 | 107 | 2012 |
Vanet alert endorsement using multi-source filters THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer Proceedings of the seventh ACM international workshop on VehiculAr …, 2010 | 85 | 2010 |
XIA: architecting a more trustworthy and evolvable internet D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ... ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014 | 75 | 2014 |
SafeSlinger: easy-to-use and secure public-key exchange M Farb, YH Lin, THJ Kim, J McCune, A Perrig Proceedings of the 19th annual international conference on Mobile computing …, 2013 | 75 | 2013 |
Challenges in Access Right Assignment for Secure Home Networks. THJ Kim, L Bauer, J Newsome, A Perrig, J Walker HotSec, 2010 | 72 | 2010 |
Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski IEEE Transactions on Dependable and Secure Computing, 1-1, 0 | 64 | |
Access right assignment mechanisms for secure home networks THJ Kim, L Bauer, J Newsome, A Perrig, J Walker Communications and Networks, Journal of 13 (2), 175-186, 2011 | 41 | 2011 |
Mechanized network origin and path authenticity proofs F Zhang, L Jia, C Basescu, THJ Kim, YC Hu, A Perrig Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 39 | 2014 |
ShortMAC: Efficient data-plane fault localization X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012 | 37 | 2012 |
Exploiting Privacy Policy Conflicts in Online Social Networks A Yamada, THJ Kim, A Perrig | 36 | 2012 |
Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005) A Yamada, THJ Kim, A Perrig | 36* | 2012 |
STRIDE: sanctuary trail--refuge from internet DDoS entrapment HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 31 | 2013 |
Authentication Challenges in a Global Environment S Matsumoto, RM Reischuk, P Szalachowski, THJ Kim, A Perrig ACM Transactions on Privacy and Security (TOPS) 20 (1), 1, 2017 | 24 | 2017 |
Security Implications of Redirection Trail in Popular Websites Worldwide L Chang, HC Hsiao, W Jeng, THJ Kim, WH Lin Proceedings of the 26th International Conference on World Wide Web, 1491-1500, 2017 | 23 | 2017 |
RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication THJ Kim, A Yamada, V Gligor, JI Hong, A Perrig Technical Report CMU-CyLab-11-014, Carnegie Mellon University, 2011 | 21 | 2011 |