Tiffany Hyun-Jin Kim
Tiffany Hyun-Jin Kim
Bestätigte E-Mail-Adresse bei ece.cmu.edu
Titel
Zitiert von
Zitiert von
Jahr
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2012
9392012
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
THJ Kim, LS Huang, A Perring, C Jackson, V Gligor
Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013
1482013
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1152014
Lightweight source authentication and path validation
THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig
ACM SIGCOMM Computer Communication Review 44 (4), 271-282, 2014
942014
LAP: Lightweight Anonymity and Privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
Security and Privacy (SP), 2012 IEEE Symposium on, 506-520, 2012
802012
The Effect of Social Influence on Security Sensitivity
S Das, THJ Kim, LA Dabbish, JI Hong
Symposium on Usable Privacy and Security (SOUPS), 2014
682014
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
612010
SafeSlinger: easy-to-use and secure public-key exchange
M Farb, YH Lin, THJ Kim, J McCune, A Perrig
Proceedings of the 19th annual international conference on Mobile computing …, 2013
592013
Challenges in Access Right Assignment for Secure Home Networks.
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
HotSec, 2010
562010
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
522014
Exploiting Privacy Policy Conflicts in Online Social Networks
A Yamada, THJ Kim, A Perrig
302012
Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005)
A Yamada, THJ Kim, A Perrig
30*2012
ShortMAC: Efficient data-plane fault localization
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
292012
Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing, 1-1, 0
29
Access right assignment mechanisms for secure home networks
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
Communications and Networks, Journal of 13 (2), 175-186, 2011
252011
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
222013
Mechanized network origin and path authenticity proofs
F Zhang, L Jia, C Basescu, THJ Kim, YC Hu, A Perrig
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
212014
RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication
THJ Kim, A Yamada, V Gligor, JI Hong, A Perrig
Technical Report CMU-CyLab-11-014, Carnegie Mellon University, 2011
192011
Detecting selfish behavior in a cooperative commons
HJ Kim, JM Peha
New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd …, 2008
172008
Authentication Challenges in a Global Environment
S Matsumoto, RM Reischuk, P Szalachowski, THJ Kim, A Perrig
ACM Transactions on Privacy and Security (TOPS) 20 (1), 1, 2017
142017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20