Follow
Tiffany Hyun-Jin Kim
Tiffany Hyun-Jin Kim
Verified email at ece.cmu.edu
Title
Cited by
Cited by
Year
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2012
12372012
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
THJ Kim, LS Huang, A Perring, C Jackson, V Gligor
Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013
1862013
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1572014
Lightweight source authentication and path validation
THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig
ACM SIGCOMM Computer Communication Review 44 (4), 271-282, 2014
1562014
The Effect of Social Influence on Security Sensitivity
S Das, THJ Kim, LA Dabbish, JI Hong
Symposium on Usable Privacy and Security (SOUPS), 2014
1352014
LAP: Lightweight Anonymity and Privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
Security and Privacy (SP), 2012 IEEE Symposium on, 506-520, 2012
982012
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
832010
Challenges in Access Right Assignment for Secure Home Networks.
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
HotSec, 2010
732010
SafeSlinger: easy-to-use and secure public-key exchange
M Farb, YH Lin, THJ Kim, J McCune, A Perrig
Proceedings of the 19th annual international conference on Mobile computing …, 2013
702013
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
672014
Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing, 1-1, 0
58
Exploiting Privacy Policy Conflicts in Online Social Networks
A Yamada, THJ Kim, A Perrig
362012
Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005)
A Yamada, THJ Kim, A Perrig
36*2012
Access right assignment mechanisms for secure home networks
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
Communications and Networks, Journal of 13 (2), 175-186, 2011
362011
Mechanized network origin and path authenticity proofs
F Zhang, L Jia, C Basescu, THJ Kim, YC Hu, A Perrig
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
342014
ShortMAC: Efficient data-plane fault localization
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
342012
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
312013
Authentication Challenges in a Global Environment
S Matsumoto, RM Reischuk, P Szalachowski, THJ Kim, A Perrig
ACM Transactions on Privacy and Security (TOPS) 20 (1), 1, 2017
222017
RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication
THJ Kim, A Yamada, V Gligor, JI Hong, A Perrig
Technical Report CMU-CyLab-11-014, Carnegie Mellon University, 2011
202011
Detecting selfish behavior in a cooperative commons
HJ Kim, JM Peha
New Frontiers in Dynamic Spectrum Access Networks, 2008. DySPAN 2008. 3rd …, 2008
202008
The system can't perform the operation now. Try again later.
Articles 1–20