Tree-based group key agreement Y Kim, A Perrig, G Tsudik ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004 | 764 | 2004 |
Simple and fault-tolerant key agreement for dynamic collaborative groups Y Kim, A Perrig, G Tsudik Proceedings of the 7th ACM conference on Computer and communications …, 2000 | 745 | 2000 |
Ghost talk: Mitigating EMI signal injection attacks against analog sensors DF Kune, J Backes, SS Clark, D Kramer, M Reynolds, K Fu, Y Kim, W Xu 2013 IEEE Symposium on Security and Privacy, 145-159, 2013 | 524 | 2013 |
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors YK Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum ... Usenix Security, 2015 | 435* | 2015 |
Communication-efficient group key agreement Y Kim, A Perrig, G Tsudik Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on …, 2001 | 344 | 2001 |
Revisiting random key pre-distribution schemes for wireless sensor networks J Hwang, Y Kim Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 296 | 2004 |
On the performance of group key agreement protocols Y Amir, Y Kim, C Nita-Rotaru, G Tsudik ACM Transactions on Information and System Security (TISSEC) 7 (3), 457-488, 2004 | 265 | 2004 |
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin Y Kwon, D Kim, Y Son, E Vasserman, Y Kim Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 263 | 2017 |
Illusion and dazzle: Adversarial optical channel exploits against lidars for automotive applications H Shin, D Kim, Y Kwon, Y Kim Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 254 | 2017 |
Group key agreement efficient in communication Y Kim, A Perrig, G Tsudik IEEE transactions on computers 53 (7), 905-921, 2004 | 254 | 2004 |
Measuring the mixing time of social graphs A Mohaisen, A Yun, Y Kim Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010 | 240 | 2010 |
Securing distributed storage: Challenges, techniques, and systems V Kher, Y Kim Proceedings of the 2005 ACM workshop on Storage security and survivability, 9-25, 2005 | 218 | 2005 |
A machine learning framework for network anomaly detection using SVM and GA T Shon, Y Kim, C Lee, J Moon Proceedings from the sixth annual IEEE SMC information assurance workshop …, 2005 | 217 | 2005 |
Remote software-based attestation for wireless sensors M Shaneck, K Mahadevan, V Kher, Y Kim European Workshop on Security in Ad-hoc and Sensor Networks, 27-41, 2005 | 187 | 2005 |
Batch verifications with ID-based signatures HJ Yoon, JH Cheon, Y Kim International Conference on Information Security and Cryptology, 233-248, 2004 | 180 | 2004 |
Secure group communication using robust contributory key agreement Y Amir, Y Kim, C Nita-Rotaru, JL Schultz, J Stanton, G Tsudik IEEE Transactions on Parallel and Distributed Systems 15 (5), 468-480, 2004 | 178 | 2004 |
Keep your friends close: Incorporating trust into social network-based sybil defenses A Mohaisen, N Hopper, Y Kim 2011 Proceedings IEEE INFOCOM, 1943-1951, 2011 | 155 | 2011 |
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane EYV Max Schuchard, Abedelaziz Mohaisen, Denis Foo Kune 18th Annual Network & Distributed System Security Symposium (NDSS), 2011 | 151* | 2011 |
Touching the untouchables: Dynamic security analysis of the lte control plane H Kim, J Lee, E Lee, Y Kim 2019 IEEE Symposium on Security and Privacy (SP), 1153-1168, 2019 | 148 | 2019 |
Scalable onion routing with torsk J McLachlan, A Tran, N Hopper, Y Kim Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 142 | 2009 |