Follow
Tiffany Hyun-Jin Kim
Tiffany Hyun-Jin Kim
Verified email at ece.cmu.edu
Title
Cited by
Cited by
Year
Cyber–Physical Security of a Smart Grid Infrastructure
Y Mo, THJ Kim, K Brancik, D Dickinson, H Lee, A Perrig, B Sinopoli
Proceedings of the IEEE 100 (1), 195-209, 2012
13012012
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure
THJ Kim, LS Huang, A Perring, C Jackson, V Gligor
Proceedings of the 22nd international conference on World Wide Web, 679-690, 2013
2002013
Lightweight source authentication and path validation
THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig
ACM SIGCOMM Computer Communication Review 44 (4), 271-282, 2014
1712014
ARPKI: Attack resilient public-key infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1692014
The Effect of Social Influence on Security Sensitivity
S Das, THJ Kim, LA Dabbish, JI Hong
Symposium on Usable Privacy and Security (SOUPS), 2014
1462014
LAP: Lightweight Anonymity and Privacy
HC Hsiao, THJ Kim, A Perrig, A Yamada, SC Nelson, M Gruteser, W Meng
Security and Privacy (SP), 2012 IEEE Symposium on, 506-520, 2012
1042012
Vanet alert endorsement using multi-source filters
THJ Kim, A Studer, R Dubey, X Zhang, A Perrig, F Bai, B Bellur, A Iyer
Proceedings of the seventh ACM international workshop on VehiculAr …, 2010
852010
SafeSlinger: easy-to-use and secure public-key exchange
M Farb, YH Lin, THJ Kim, J McCune, A Perrig
Proceedings of the 19th annual international conference on Mobile computing …, 2013
762013
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
752014
Challenges in Access Right Assignment for Secure Home Networks.
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
HotSec, 2010
712010
Design, Analysis, and Implementation of ARPKI: an Attack-Resilient Public-Key Infrastructure
D Basin, C Cremers, THJ Kim, A Perrig, R Sasse, P Szalachowski
IEEE Transactions on Dependable and Secure Computing, 1-1, 0
63
Access right assignment mechanisms for secure home networks
THJ Kim, L Bauer, J Newsome, A Perrig, J Walker
Communications and Networks, Journal of 13 (2), 175-186, 2011
412011
Mechanized network origin and path authenticity proofs
F Zhang, L Jia, C Basescu, THJ Kim, YC Hu, A Perrig
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
362014
ShortMAC: Efficient data-plane fault localization
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2012
362012
Exploiting Privacy Policy Conflicts in Online Social Networks
A Yamada, THJ Kim, A Perrig
352012
Exploiting Privacy Policy Conflicts in Online Social Networks (CMU-CyLab-12-005)
A Yamada, THJ Kim, A Perrig
35*2012
STRIDE: sanctuary trail--refuge from internet DDoS entrapment
HC Hsiao, THJ Kim, S Yoo, X Zhang, SB Lee, V Gligor, A Perrig
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
302013
Authentication Challenges in a Global Environment
S Matsumoto, RM Reischuk, P Szalachowski, THJ Kim, A Perrig
ACM Transactions on Privacy and Security (TOPS) 20 (1), 1, 2017
232017
Security Implications of Redirection Trail in Popular Websites Worldwide
L Chang, HC Hsiao, W Jeng, THJ Kim, WH Lin
Proceedings of the 26th International Conference on World Wide Web, 1491-1500, 2017
212017
RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication
THJ Kim, A Yamada, V Gligor, JI Hong, A Perrig
Technical Report CMU-CyLab-11-014, Carnegie Mellon University, 2011
212011
The system can't perform the operation now. Try again later.
Articles 1–20