Publications

SoK: A Minimalist Approach to Formalizing Analog Sensor SecurityChen Yan, Hocheol Shin, Connor Bolton, Wenyuan Xu, Yongdae Kim, and Kevin FuIEEE Symposium on Security and Privacy 2020 (To appear)
Impossibility of Full Decentralization in Permissionless BlockchainsYujin Kwon, Jian Liu, Minjeong Kim, Dawn Song, Yongdae KimarXiv:1905.05158v1, 2019
Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTEHojoon Yang, Sangwook Bae, Mincheol Son, Hongil Kim, Songmin Kim, and Yongdae KimProceedings of the 28th USENIX Conference on Security Symposium. (USENIX Security 2019) (To appear)
Is Stellar As Secure As You Think?Minjeong Kim, Yujin Kwon, Yongdae KimIEEE Security and Privacy on the Blockchain (IEEE S&B 2019)
Tractor Beam: Safe-hijacking of Consumer Drones with Adaptive GPS SpoofingJuhwan Noh, Yujin Kwon, Yunmok Son, Hocheol Shin, Dohyun Kim, Jaeyeong Choi, Yongdae KimACM Transactions on Privacy and Security, Vol. 22, No. 2, Article 12, 2019
Bitcoin vs. Bitcoin Cash: Coexistence or Downfall of Bitcoin Cash?Yujin Kwon, Hyoungshick Kim, Jinwoo Shin, Yongdae KimIEEE Symposium on Security and Privacy 2019
Cybercriminal Minds: An investigative study of cryptocurrency abuses in the Dark WebSeunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, and Seungwon ShinNetwork and Distributed Systems Security (NDSS) Symposium 2019
Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models Sangwook Bae, Mincheol Son, Sooel Son, and Yongdae Kim ACM International Workshop on Mobile Computing Systems and Applications (HotMobile'19)
Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane Hongil Kim, Jiho Lee, Eunkyu Lee, and Yongdae KimIEEE Symposium on Security and Privacy 2019
Peeking over the Cellular Walled Gardens - A Method for Closed Network Diagnosis Byeongdo Hong, Shinjo Park, Hongil Kim, Dongkwan Kim, Hyunwook Hong, Hyunwoo Choi, Jean-Pierre Seifert, Sung-Ju Lee and Yongdae Kim IEEE Transactions on Mobile Computing, Vol. 17, No. 10, 2018
GyrosFinger: Fingerprinting Drones for Location Tracking based on the Outputs of MEMS Gyroscopes Yunmok Son, Juhwan Noh, Jaeyeong Choi and Yongdae Kim ACM Transactions on Privacy and Security, Vol. 21, No. 2, Article 10, 2018
GUTI Reallocation Demystified: Cellular Location Tracking with Changing Temporary Identifier Byeongdo Hong, Sangwook Bae, and Yongdae Kim Network and Distributed Systems Security (NDSS) Symposium 2018
Be Selfish and Avoid Dilemmas: Fork After Withholding (FAW) Attacks on Bitcoin Yujin Kwon, Dohyun Kim, Yunmok Son, Eugene Vasserman, and Yongdae Kim ACM Conference on Computer and Communications Security. (CCS 2017)
Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications Hocheol Shin, Dohyun Kim, Yujin Kwon, and Yongdae Kim Conference on Cryptographic Hardware and Embedded Systems. (CHES 2017)
When Cellular Networks Met IPv6: Security Problems of Middleboxes in IPv6 Cellular Networks Hyunwook Hong, Hyunwoo Choi, Dongkwan Kim, Hongil Kim, Byeongdo Hong, Jiseong Noh, and Yongdae Kim Proceedings of the 2nd IEEE European Symposium on Security and Privacy. (EuroS&P 2017)
Enabling Automatic Protocol Behavior Analysis for Android Applications Jeongmin Kim, Hyunwoo Choi, Hun Namkung, Woohyun Choi, Byungkwon Choi, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, Dongsu Han The 12th International Conference on emerging Networking EXperiments and Technologies (ACM CoNEXT '16)
PIkit: A New Kernel-Independent Processor-Interconnect Rootkit Wonjun Song, Hyunwoo Choi, Junhong Kim, Eunsoo Kim, Yongdae Kim, and John Kim Proceedings of the 25th USENIX Conference on Security Symposium. (USENIX Security 2016)
Sampling Race: Bypassing Timing-based Analog Active Sensor Spoofing Detection on Analog-digital Systems Hocheol Shin, Yunmok Son, Youngseok Park, Yujin Kwon, and Yongdae Kim 10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
This ain't your dose: Sensor Spoofing Attack on Medical Infusion Pump Youngseok Park, Yunmok Son, Hocheol Shin, Dohyun Kim, and Yongdae Kim 10th USENIX Workshop on Offensive Technologies. (USENIX WOOT 2016)
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim The 17th World Conference on Information Security Applications (WISA 2016)
Pay As You Want: Bypassing Charging System in Operational Cellular Networks Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee and Yongdae Kim The 17th World Conference on Information Security Applications (WISA 2016)
Dissecting Customized Protocols: Automatic Analysis for Customized Protocols based on IEEE 802.15.4 Kibum Choi, Yunmok Son, Juhwan Noh, Hocheol Shin, Jaeyeong Choi and Yongdae Kim 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2016) Best Paper Award
Timing Attacks on Access Privacy in Information Centric Networks and Countermeasures Aziz Mohaisen, Hesham Mekky, Xinwen Zhang, Haiyong Xie and Yongdae Kim IEEE Transactions on Dependable and Secure Computing (TDSC), vol.12 no.6, 2015
Breaking and Fixing VoLTE: Exploiting Hidden Data Channels and Mis-implementations Hongil Kim, Dongkwan Kim, Minhee Kwon, Hyungseok Han, Yeongjin Jang, Dongsu Han, Taesoo Kim, and Yongdae Kim Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. (CCS 2015)
Frying PAN: Dissecting Customized Protocol for Personal Area Network Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, and Yongdae Kim The 16th International Workshop on Information Security Applications (WISA 2015)
Security Analysis of FHSS-type Drone Controller Hocheol Shin, Kibum Choi, Youngseok Park, Jaeyeong Choi, and Yongdae Kim The 16th International Workshop on Information Security Applications (WISA 2015)
BurnFit: Analyzing and Exploiting Wearable Devices Dongkwan Kim, Suwan Park, Kibum Choi, and Yongdae Kim The 16th International Workshop on Information Security Applications (WISA 2015) Best Paper Award
Extractocol: Automatic Extraction of Application-level Protocol Behaviors for Android Applications Hyunwoo Choi, Jeongmin Kim, Hyunwook Hong, Yongdae Kim, Jonghyup Lee, and Dongsu Han Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication. (ACM SIGCOMM 2015, poster)
Rocking Drones with Intentional Sound Noise on Gyroscopic Sensors Yunmok Son, Hocheol Shin, Dongkwan Kim, Youngseok Park, Juhwan Noh, Kibum Choi, Jungwoo Choi, Yongdae Kim Proceedings of the 24th USENIX Conference on Security Symposium. (USENIX Security 2015)
Hijacking the Vuze BitTorrent network: all your hop are belong to us Eric Chan-Tin, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim IET Information Security, vol.9, no.4, 2015
Bittersweet ADB: Attacks and Defenses Sungjae Hwang, Sungho Lee, Yongdae Kim, Sukyoung Ryu 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
Revisiting Security of Proportional Fair Scheduler in Wireless Cellular Networks Hanjin Park, Yung Yi, Yongdae Kim Elsevier Computer Networks, vol. 75, Part A, pp. 55-74, 2014
Run Away If You Can: Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2014)
Trustworthy Distributed Computing on Social Networks Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim IEEE Transactions on Services Computing, vol.7, no.3, 2014
Analyzing Security of Korean USIM-based PKI Certificate Service Shinjo Park, Suwan Park, Insu Yun, Dongkwan Kim, Yongdae Kim 15th International Workshop on Information Security Applications (WISA 2014)
Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission Younghwan Go, Jongil Won, Denis Foo Kune, Eunyoung Jeong, Yongdae Kim, and Kyoungsoo Park Network and Distributed System Security (NDSS) Symposium 2014
Impact of Malicious TCP Retransmission on Cellular Traffic Accounting Younghwan Go, Denis Foo Kune, Shinae Woo, Kyoungsoo Park, and Yongdae Kim Proceedings of the 5th Annual Wireless of the Students, by the Students, for the Students Workshop (ACM S3 2013)
Peer Pressure: Exerting Malicious Influence on Routers at a Distance Max Schuchard, Christopher Thompson, Nicholas Hopper, and Yongdae Kim IEEE 33rd International Conference on Distributed Computing Systems (ICDCS 2013)
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors Denis Foo Kune, John Backes, Shane Clark, Wenyuan Xu, Dan Kramer, Matthew Reynolds, Kevin Fu, and Yongdae Kim IEEE Symposium on Security & Privacy (Oakland 2013)
Trustworthy Distributed Computing on Social Networks Abedelaziz Mohaisen, Huy Tran, Abhishek Chandra, and Yongdae Kim 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
Dynamix: Anonymity on Dynamic Social Structures Abedelaziz Mohaisen, Huy Tran, Ting Zhu, and Yongdae Kim 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
Protecting Access Privacy of Cached Contents in Information Centric Networks Abedelaziz Mohaisen, Xinwen Zhang, Max Schuchard, Haiyong Xie, Yongdae Kim ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)
SocialCloud: Using Social Networks for Building Distributed Computing Services A. Mohaisen, H. Tran, A. Chandra, and Y. Kim ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), Also available at Technical Report, CS Department, University of Minnesota 2011 Media: MIT Technical Review, The Verge, MSN.COM, Data News
Towards Accurate Accounting of Cellular Data for TCP Retransmission Younghwan Go, Denis Foo Kune, Shinae Woo, KyoungSoo Park, and Yongdae Kim ACM International Workshop on Mobile Computing Systems and Applications (HotMobile'13)
Private over-threshold aggregation protocols Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, and Yongdae Kim International Conference on Information Security and Cryptology (ICISC 2012)
Towards a safe Integrated Clinical Environment: A communication security perspective Denis Foo Kune, Eugene Vasserman, Krishna Venkatasubramanian, Yongdae Kim, Insup Lee ACM Workshop on Medical Communication Systems (MedCOMM 2012)
Measuring Bias in the Mixing Time of Social Graphs due to Graph Sampling Abedelaziz Mohaisen, Pengkui Luo, Yanhua Li, Yongdae Kim, Zhi-Li Zhang 2012 Military Communications Conference (MILCOM 2012).
One-way indexing for plausible deniability in censorship resistant storage Eugene Y. Vasserman, Victor Heorhiadi, Nicholas Hopper, Yongdae Kim USENIX Workshop on Free and Open Communications on the Internet (FOCI 2012)
On the Mixing Time of Directed Social Graphs and Security Implications Abedalaziz Mohaisen, Huy Tran, Nicholas Hopper, and Yongdae Kim ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012)
Private Top-k Aggregation Protocols Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, and Yongdae KimIACR Cryptology ePrint Archive, 2012
Location leaks on the GSM air interface D. F. Kune, J. Koelndorfer, N. Hopper, and Y. Kim ISOC Network & Distributed System Security Symposium (NDSS 2012) Nominated for the best paper awardMedia: Ars Technica, Slashdot, MPR, Fox Twin Cities, Physorg, TG Daily, Network World, e! Science News, Scientific Computing, gizmag, Crazy Engineers, PC Advisor, Mobile Magazine, The CyberJungle, Inquisitr
Taking Routers Off Their Meds: Unstable Routers and the Buggy BGP Implementations That Cause Them M. Schuchard, C. Thompson, N. Hopper, Y. Kim Technical Report, CS Department, University of Minnesota, 2011
Censorship resistant overlay publishing E. Y. Vasserman, V. Heorhiadi, Y. Kim, N. Hopper Technical Report, CS Department, University of Minnesota, 2011
i-Code: A New Approach to Practical Network Coding for Content Distribution H. J. Kang, A. Yun, E. Y. Vasserman, Y. Kim Technical Report, CS Department, University of Minnesota 2011
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems E. Chan-Tin, V. Heorhiadi, Y. Kim, and N. Hopper ACM Transactions on Information and System Security (TISSEC) 14(3), 2011
Mistaking friends for foes: An analysis of a social network-based Sybil defense in mobile networks A. Mohaisen, T. AbuHmed, H. J. Kang, D. Nyang, Y. Kim In 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011)
Understanding social networks properties for trustworthy computing A. Mohaisen, H. Tran, N. Hopper, and Y. Kim The 31st IEEE ICDCS Workshops (SIMPLEX 2011), Minneapolis, MN, USA, IEEE (Invited Paper)
Keep your friends close: Incorporating trust into social network-based Sybil defenses A. Mohaisen, N. Hopper, Y. Kim The 30th IEEE Conference on Computer Communications (INFOCOM'11)
Losing Control of the Internet: Using the data plane to attack the control plane M. Schuchard, E. Vasserman, A. Mohaisen, D. F. Kune, N. Hopper, and Y. Kim ISOC Network & Distributed System Security Symposium (NDSS 2011) Media: New Scientist, Slashdot, ZDNet, CBS News, Minnesota Daily, Metro, Gizmodo, The Register
Exploring In-Situ Sensing Irregularity in Wireless Sensor Networks. J. Hwang, T. He, and Y. Kim. IEEE Transactions on Parallel and Distributed Systems, vol. 21, issue 4, pp. 547-561 , 2010.
On Homomorphic Signatures for Network Coding A. Yun, J. Cheon, Y. Kim Transactions on Computer (brief contribution), vol. 59, issue 9, 2010.
Recruiting New Tor Relays with BRAIDS R. Jansen, N. Hopper, and Y. Kim ACM Conference on Computer and Communications Security (CCS), 2010.
Measuring the mixing time of social graphs A. Mohaisen, A. Yun, and Y. Kim ACM Internet Measurement Conference (IMC), 2010.
Balancing the Shadows M. Schuchard, A. Dean, V. Heorhiadi, Y. Kim, and N. Hopper Workshop on Privacy in the Electronic Society (WPES), 2010.
Efficient Cryptographic Primitives for Private Data Mining M. Shaneck, and Y. Kim HICSS, Koloa, Kauai, HI, USA, IEEE Computer Society, pp. 1-9, 2010.
Timing attacks on PIN Input Devices D. Foo Kune, and Y. Kim ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
Losing Control of the Internet: Using the Data Plane to Attack the Control Plane M. Schuchard, A. Mohaisen, E. Vasserman, D. F. Kune, Y. Kim, and N. Hopper ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
Secure Encounter-based Social Networks: Requirements, Challenges, and Designs A. Mohaisen, E. Vasserman, M. Schuchard, D. F. Kune, and Y. Kim ACM Conference on Computer and Communications Security (CCS/Posters), 2010.
The Distributed Virtual Network for High Fidelity, Large Scale Peer to Peer Network Simulation Denis Foo Kune, Tyson Malchow, James Tyra, Nicholas J. Hopper, Yongdae Kim University of Minnesota, Technical report, 2010.
Attacking the Kad Network - Real World Evaluation and High Fidelity Simulation using DVN - E. Chan-Tin, P. Wang, J. Tyra, T. Malchow, D. Foo Kune, N. Hopper, Y. Kim Wiley Security and Communication Networks, 2009.
Membership-concealing overlay networks E. Vasserman, R. Jansen, J. Tyra, N. Hopper, Y. Kim ACM Conference on Computer and Communications Security (CCS), 2009
Scalable onion routing with Torsk J. McLachlan, A. Tran, N. Hopper, Y. Kim ACM Conference on Computer and Communications Security (CCS), 2009
On Protecting Integrity and Confidentiality of Cryptographic File System for Outsourced Storage A. Yun, C. Shi, Y. Kim The ACM Cloud Computing Security Workshop (CCSW), 2009
Hashing it out in public: Common failure modes of DHT-based anonymity schemes A. Tran, N. Hopper, Y. Kim Workshop on Privacy in the Electronic Society (WPES), 2009
The Frogboiling attack: limitations of anomaly detection for secure network coordinates E. Chan-Tin, D. Feldman, N. Hopper, Y. Kim SecureComm, 2009
Why Kad Lookup Fails H. -J. Kang, E. Chan-Tin, N. Hopper, Y. Kim IEEE International Conference on Peer-to-Peer Computing (P2P), 2009
Towards Complete Node Enumeration in a Peer-to-Peer Botnet B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009)
Secure Localization with Phantom Node Detection J. Hwang, T. He, Y. Kim Ad Hoc Networks, Volume 6, Issue 7 (September 2008) Elsevier.
Provably Secure Timed-Release Public Key Encryption. J. Cheon, N. Hopper, Y. Kim, I. Osipkov,(alphabetical order. Main author of the paper is I. Osipkov.) ACM Transactions on Information Systems Security Volume 11 , Issue 2 (March 2008).
Attacking the Kad Network P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Foo Kune, N. Hopper, and Y. Kim. at SecureComm 2008.
Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage V. Kher and Y. Kim IEEE International Symposium on Reliable Distributed Systems (SRDS), 2007
Exploring In-Situ Sensing Area Modeling for Wireless Sensor Networks J. Hwang, T. He, Y. Kim. ACM Conference on Embedded Networked Sensor Systems (SenSys), 2007.
Combating doublespending using cooperative P2P systems I. Osipkov, E. Vasserman, N. Hopper and Y. Kim. 2007 IEEE Conference on Distributed Computing Systems (ICDCS), 2007.
Realistic Sensing Area Modeling. J. Hwang, Y. Gu, T. He, and Y. Kim. IEEE Infocom 2007 Minisymposia, August 2007.
Detecting Phantom Nodes in Wireless Sensor Networks. J. Hwang, T. He, and Y. Kim. IEEE Infocom2007 Minisymposia, August 2007.
Robust Accounting in Decentralized P2P Storage Systems. I. Osipkov, P. Wang, N. Hopper and Y. Kim. In Proceedings of the 26th IEEE Conference on Distributed Computing systems (ICDCS), 2006.
Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography. J. -H. Cheon, N. Hopper, Y. Kim and I. Osipkov. In 10th Conference on Financial Cryptography and Data Security, February 2006.
Experiences in Building an Object-Based Storage System based on the OSD T-10 Standard D. Du, D. He, C. Hong, J. Jeong, V. Kher, Y. Kim, Y. Lu, A. Raghuveer, S. Sharafkandi NASA/IEEE Conference on Mass Storage Systems and Technologies 2006.
SGFS: Secure, Efficient and Policy-based Global File Sharing (Short Paper) V. Kher, E. Seppanen, C. Leach, Y. Kim NASA/IEEE Conference on Mass Storage Systems and Technologies, 2006.
Privacy Protection in PKIs: A Separation-of-Authority Approach. T. Kwon, J. Cheon, Y. Kim, J. Lee 7th International Workshop on Information Security Applications (WISA) 2006.
Privacy Preserving Nearest Neighbor Search M. Shaneck, Y. Kim, V. Kumar IEEE International Workshop on Privacy Aspects of Data Mining, December 2006
Myrmic: Secure and Robust DHT Routing P. Wang, N. Hopper, I. Osipkov, and Y. Kim UMN DTC Research Report 2006/20, November 2006.
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks P. Wang, Y. Kim, V. Kher, T. Kwon ACNS 2005.
Securing Distributed Storage: Challenges, Techniques, and Systems V. Kher and Y. Kim StorageSS’05. (invited paper)
Remote Software-based Attestation for Wireless Sensors. M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim. ESAS 2005.
A Machine Learning Framework for Network Anomaly Detection using SVM and GA T. Shon, Y. Kim, C. Lee, J. Moon 6th IEEE Information Assurance Workshop, 2005
On the Performance of Group Key Agreement Protocols Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik ACM Transaction on Information and System Security, Vol. 7, No. 3, Aug. 2004.
Robust Contributory Key Agreement in Secure Spread Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton, G. Tsudik IEEE Transaction on Parallel and Distributed System, Vol. 15, No. 5, May 2004.
Communication-Efficient Group Key Agreement Y. Kim, A. Perrig, G. Tsudik IEEE Transaction on Computers, Vol. 53, No. 7, Jul. 2004.
Tree-based Group Key Agreement Y. Kim, A. Perrig, G. Tsudik in ACM Transaction on Information and System Security, Vol. 7, No. 1, Feb. 2004.
Design and implementation of a secure multi-agent marketplace A. Jaiswal, Y. Kim, M. Gini Electronic Commerce Research and Application, Volume 3, Issue 4, Winter, Elsevier Science, 2004
Batch Verifications with ID-Based Signatures H. Yoon, J. Cheon, Y. Kim ICISC 2004.
Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks J. Hwang, Y. Kim 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04).
Secure Group Key Management for Storage Area Networks Y. Kim, F. Maino, M. Narasimha, K. Rhee, G. Tsudik IEEE Communications Magazine, Vol. 41, No. 8, Aug. 2003.
Admission Control in Collaborative Groups Y. Kim, D. Mazzochi, G. Tsudik 2nd IEEE International Symposium on Network Computing and Applications (NCA-03), Massachusetts, USA, April, 2003.
An Efficient Tree-Based Group Key Agreement Using Bilinear Map. S. Lee, Y. Kim, K. Kim, D. Ryu ACNS 2003
Decentralized Authentication Mechanism for Object-based Storage Devices V. Kher, Y. Kim Security in Storage Workshop 2003 (SISW), Washington D.C., Nov. 2003.
Security Model for a Multi-Agent Marketplace A. Jaiswal, Y. Kim, M. Gini The Fifth International Conference on Electronic Commerce (ICEC 03), Pennsylvania, Sep. 2003
Admission Control in Peer Groups Y. Kim, G. Tsudik Large-Scale Network Security Workshop ? New Directions in Scalable Cyber-Security in Large-Scale Networks: Deployment Obstacles, Virginia, Mar. 2003
On the Performance of Group Key Agreement Protocols Y. Amir, Y. Kim, C. Nita-Rotaru, G. Tsudik The 22nd International Conference on Distributed Computing Systems (IEEE ICDCS 2002)
Secure Group Services for Storage Area Networks Y. Kim, F. Maino, M. Narasimha, G. Tsudik 1st International IEEE Security in Storage Workshop (SISW 2002), Dec. 2002
Communication-Efficient Group Key Agreement Y. Kim, A. Perrig, G. Tsudik In Proceedings of IFIP TC11 Sixteenth International Conference on Information Security (IFIP/SEC 2001), Kluwer Academic Publishers, June 2001
Exploring Robustness in Group Key Agreement Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik In Proceedings of The 21st International Conference on Distributed Computing Systems (IEEE ICDCS 2001), IEEE Press, April 2001 Nominated for the best paper award
Simple and Fault-tolerant Group Key Agreement Scheme Y. Kim, A. Perrig, G. Tsudik In Proceedings of the 7th ACM Conference on Computer and Communications Security (ACM CCS 2000), ACM Press, Nov. 2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik In Proceedings of The 20th International Conference on Distributed Computing Systems (IEEE ICDCS 2000), IEEE Press, April 2000
The Design of a Group Key Agreement API G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik In Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX 2000), IEEE Computer Society Press, 2000
On the Design of Stream Ciphers and a Hash Function Suitable to Smart Card Application Y. Kim, S. Lee, and S. Park In Proceedings of CARDIS, Smart Card Research and Advanced Application: Second International Conference, Amsterdam, September, 1996.
How to Use Exponent Permutations in Cryptography: Classifications and Applications S. Park, S. Chee, K. Kim, Y. Kim, and S. Lee In Proceedings of International Conference on Cryptology and Information Security, ROC, December, 1996.
On the Security of Lin-Chang-Lee Public Key Cryptosystem S. Park, Y. Kim, and K. Kim Journal of the Korean Institute of Information Security and Cryptography, 1996.