Follow
Tiffany Hyun-Jin Kim
Tiffany Hyun-Jin Kim
Verified email at ece.cmu.edu
Title
Cited by
Cited by
Year
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2012
11642012
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
THJ Kim, LS Huang, A Perring, C Jackson, V Gligor
Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013
1722013
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1452014
Lightweight source authentication and path validation
THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig
ACM SIGCOMM Computer Communication Review 44 (4), 271-282, 2014
1372014
The Effect of Social Influence on Security Sensitivity
S Das, THJ Kim, LA Dabbish, JI Hong
Symposium on Usable Privacy and Security (SOUPS), 2014
1202014
LAP: Lightweight Anonymity and Privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
Security and Privacy (SP), 2012 IEEE Symposium on, 506-520, 2012
922012
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
742010
SafeSlinger: easy-to-use and secure public-key exchange
M Farb, YH Lin, THJ Kim, J McCune, A Perrig
Proceedings of the 19th annual international conference on Mobile computing …, 2013
702013
Challenges in Access Right Assignment for Secure Home Networks.
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
HotSec, 2010
672010
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
652014
Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing, 1-1, 0
48
Exploiting Privacy Policy Conflicts in Online Social Networks
A Yamada, THJ Kim, A Perrig
342012
Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005)
A Yamada, THJ Kim, A Perrig
34*2012
Access right assignment mechanisms for secure home networks
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
Communications and Networks, Journal of 13 (2), 175-186, 2011
332011
Mechanized network origin and path authenticity proofs
F Zhang, L Jia, C Basescu, THJ Kim, YC Hu, A Perrig
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
322014
ShortMAC: Efficient data-plane fault localization
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
322012
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
282013
Authentication Challenges in a Global Environment
S Matsumoto, RM Reischuk, P Szalachowski, THJ Kim, A Perrig
ACM Transactions on Privacy and Security (TOPS) 20 (1), 1, 2017
202017
RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication
THJ Kim, A Yamada, V Gligor, JI Hong, A Perrig
Technical Report CMU-CyLab-11-014, Carnegie Mellon University, 2011
202011
Detecting selfish behavior in a cooperative commons
HJ Kim, JM Peha
New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd …, 2008
202008
The system can't perform the operation now. Try again later.
Articles 1–20