Tiffany Hyun-Jin Kim
Tiffany Hyun-Jin Kim
Verified email at ece.cmu.edu
TitleCited byYear
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2012
8092012
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
THJ Kim, LS Huang, A Perring, C Jackson, V Gligor
Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013
1272013
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1002014
Lightweight source authentication and path validation
THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig
ACM SIGCOMM Computer Communication Review 44 (4), 271-282, 2014
792014
LAP: Lightweight Anonymity and Privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
Security and Privacy (SP), 2012 IEEE Symposium on, 506-520, 2012
662012
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
572010
Challenges in Access Right Assignment for Secure Home Networks.
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
HotSec, 2010
562010
The Effect of Social Influence on Security Sensitivity
S Das, THJ Kim, LA Dabbish, JI Hong
Symposium on Usable Privacy and Security (SOUPS), 2014
532014
SafeSlinger: easy-to-use and secure public-key exchange
M Farb, YH Lin, THJ Kim, J McCune, A Perrig
Proceedings of the 19th annual international conference on Mobile computing …, 2013
522013
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
482014
Exploiting Privacy Policy Conflicts in Online Social Networks
A Yamada, THJ Kim, A Perrig
272012
Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005)
A Yamada, THJ Kim, A Perrig
27*2012
ShortMAC: Efficient data-plane fault localization
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
272012
Access right assignment mechanisms for secure home networks
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
Communications and Networks, Journal of 13 (2), 175-186, 2011
232011
Mechanized network origin and path authenticity proofs
F Zhang, L Jia, C Basescu, THJ Kim, YC Hu, A Perrig
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
192014
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
192013
RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication
THJ Kim, A Yamada, V Gligor, JI Hong, A Perrig
Technical Report CMU-CyLab-11-014, Carnegie Mellon University, 2011
172011
Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing, 1-1, 0
17
Detecting selfish behavior in a cooperative commons
HJ Kim, JM Peha
New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd …, 2008
162008
OTO: Online Trust Oracle for User-Centric Trust Establishment
THJ Kim, P Gupta, J Han, E Owusu, J Hong, A Perrig, D Gao
122012
The system can't perform the operation now. Try again later.
Articles 1–20