default search action
Tiffany Hyun-Jin Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Shu-Po Tung, Yu-Min Lin, Keng-Lun Chang, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
Detecting IP Prefix Mismatches on SDN Data Plane. ICCCN 2024: 1-9 - [i3]Kai-Hsiang Chou, Yi-Min Lin, Yi-An Wang, Jonathan Weiping Li, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao:
Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats. CoRR abs/2410.06587 (2024) - 2023
- [c30]Ping-Lun Wang, Kai-Hsiang Chou, Shou-Ching Hsiao, Ann Tene Low, Tiffany Hyun-Jin Kim, Hsu-Chun Hsiao:
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers. ACNS (1) 2023: 260-283 - 2020
- [c29]Yu-Hsi Chiang, Hsu-Chun Hsiao, Chia-Mu Yu, Tiffany Hyun-Jin Kim:
On the Privacy Risks of Compromised Trigger-Action Platforms. ESORICS (2) 2020: 251-271 - [c28]Joshua Lampkins, Tiffany Hyun-Jin Kim:
Bidirectional Blockchain. ICCCN 2020: 1-8 - [c27]Chih-Chun Liu, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints. ICETE (2) 2020: 180-191
2010 – 2019
- 2019
- [c26]Tiffany Hyun-Jin Kim, Joshua Lampkins:
SSP: Self-Sovereign Privacy for Internet of Things Using Blockchain and MPC. Blockchain 2019: 411-418 - [c25]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Yu-Ming Ku, Chun-Ming Chang, Hung-Fang Chen, Yu-Jen Chen, Chun-Wen Wang, Wei Jeng:
An Investigation of Cyber Autonomy on Government Websites. WWW 2019: 2814-2821 - 2018
- [j6]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure. IEEE Trans. Dependable Secur. Comput. 15(3): 393-408 (2018) - [c24]Tiffany Hyun-Jin Kim, Joshua Lampkins:
BRICS: Blockchain-based Resilient Information Control System. IEEE BigData 2018: 5363-5365 - [c23]Yu-Ming Ke, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim:
SDNProbe: Lightweight Fault Localization in the Error-Prone Environment. ICDCS 2018: 489-499 - 2017
- [j5]Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Authentication Challenges in a Global Environment. ACM Trans. Priv. Secur. 20(1): 1:1-1:34 (2017) - [c22]Li Chang, Hsu-Chun Hsiao, Wei Jeng, Tiffany Hyun-Jin Kim, Wei-Hsi Lin:
Security Implications of Redirection Trail in Popular Websites Worldwide. WWW 2017: 1491-1500 - 2016
- [c21]Edwin Lupito Loe, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Shao-Chuan Lee, Shin-Ming Cheng:
SandUSB: An installation-free sandbox for USB peripherals. WF-IoT 2016: 621-626 - 2015
- [j4]Pawel Szalachowski, Tiffany Hyun-Jin Kim:
Secure broadcast in distributed networks with strong adversaries. Secur. Commun. Networks 8(18): 3739-3750 (2015) - [c20]Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig:
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. ICNP 2015: 212-223 - [i2]Stephanos Matsumoto, Raphael M. Reischuk, Pawel Szalachowski, Tiffany Hyun-Jin Kim, Adrian Perrig:
Designing a Global Authentication Infrastructure. CoRR abs/1506.03392 (2015) - [i1]Yi-Hsuan Kung, Taeho Lee, Po-Ning Tseng, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Soo Bum Lee, Yue-Hsun Lin, Adrian Perrig:
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds. CoRR abs/1509.02268 (2015) - 2014
- [j3]David Naylor, Matthew K. Mukerjee, Patrick Agyapong, Robert Grandl, Ruogu Kang, Michel Machado, Stephanie Brown, Cody Doucette, Hsu-Chun Hsiao, Dongsu Han, Tiffany Hyun-Jin Kim, Hyeontaek Lim, Carol Ovon, Dong Zhou, Soo Bum Lee, Yue-Hsun Lin, H. Colleen Stuart, Daniel Paul Barrett, Aditya Akella, David G. Andersen, John W. Byers, Laura Dabbish, Michael Kaminsky, Sara B. Kiesler, Jon M. Peha, Adrian Perrig, Srinivasan Seshan, Marvin A. Sirbu, Peter Steenkiste:
XIA: architecting a more trustworthy and evolvable internet. Comput. Commun. Rev. 44(3): 50-57 (2014) - [c19]Tiffany Hyun-Jin Kim:
Challenges of Establishing Trust in Online Entities and Beyond. TrustED@CCS 2014: 49 - [c18]Fuyuan Zhang, Limin Jia, Cristina Basescu, Tiffany Hyun-Jin Kim, Yih-Chun Hu, Adrian Perrig:
Mechanized Network Origin and Path Authenticity Proofs. CCS 2014: 346-357 - [c17]David A. Basin, Cas Cremers, Tiffany Hyun-Jin Kim, Adrian Perrig, Ralf Sasse, Pawel Szalachowski:
ARPKI: Attack Resilient Public-Key Infrastructure. CCS 2014: 382-393 - [c16]Tiffany Hyun-Jin Kim, H. Colleen Stuart, Hsu-Chun Hsiao, Yue-Hsun Lin, Leon Zhang, Laura Dabbish, Sara B. Kiesler:
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords. AsiaCCS 2014: 513-518 - [c15]Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, Adrian Perrig:
Lightweight source authentication and path validation. SIGCOMM 2014: 271-282 - [c14]Sauvik Das, Tiffany Hyun-Jin Kim, Laura A. Dabbish, Jason I. Hong:
The Effect of Social Influence on Security Sensitivity. SOUPS 2014: 143-157 - 2013
- [c13]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Sangjae Yoo, Xin Zhang, Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
STRIDE: sanctuary trail - refuge from internet DDoS entrapment. AsiaCCS 2013: 415-426 - [c12]Tiffany Hyun-Jin Kim, Akira Yamada, Virgil D. Gligor, Jason I. Hong, Adrian Perrig:
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. Financial Cryptography 2013: 69-77 - [c11]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Jorge Guajardo, Jason I. Hong, Adrian Perrig:
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference. Financial Cryptography Workshops 2013: 112-130 - [c10]Michael W. Farb, Yue-Hsun Lin, Tiffany Hyun-Jin Kim, Jonathan M. McCune, Adrian Perrig:
SafeSlinger: easy-to-use and secure public-key exchange. MobiCom 2013: 417-428 - [c9]Tiffany Hyun-Jin Kim, Lin-Shung Huang, Adrian Perrig, Collin Jackson, Virgil D. Gligor:
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. WWW 2013: 679-690 - 2012
- [b1]Tiffany Hyun-Jin Kim:
All Trust Is Local: Empowering Users' Authentication Decisions on the Internet. Carnegie Mellon University, USA, 2012 - [j2]Yilin Mo, Tiffany Hyun-Jin Kim, Kenneth Brancik, Dona Dickinson, Heejo Lee, Adrian Perrig, Bruno Sinopoli:
Cyber-Physical Security of a Smart Grid Infrastructure. Proc. IEEE 100(1): 195-209 (2012) - [c8]Tiffany Hyun-Jin Kim, Payas Gupta, Jun Han, Emmanuel Owusu, Jason I. Hong, Adrian Perrig, Debin Gao:
OTO: online trust oracle for user-centric trust establishment. CCS 2012: 391-403 - [c7]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
GeoPKI: Converting Spatial Trust into Certificate Trust. EuroPKI 2012: 128-144 - [c6]Xin Zhang, Zongwei Zhou, Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Patrick Tague:
ShortMAC: Efficient Data-Plane Fault Localization. NDSS 2012 - [c5]Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C. Nelson, Marco Gruteser, Wei Meng:
LAP: Lightweight Anonymity and Privacy. IEEE Symposium on Security and Privacy 2012: 506-520 - [c4]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
Street-Level Trust Semantics for Attribute Authentication. Security Protocols Workshop 2012: 96-115 - 2011
- [j1]Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker:
Access right assignment mechanisms for secure home networks. J. Commun. Networks 13(2): 175-186 (2011) - [c3]Tiffany Hyun-Jin Kim, Virgil D. Gligor, Adrian Perrig:
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems. ICCCN 2011: 1-6 - 2010
- [c2]Tiffany Hyun-Jin Kim, Ahren Studer, Rituik Dubey, Xin Zhang, Adrian Perrig, Fan Bai, Bhargav Bellur, Aravind Iyer:
VANET alert endorsement using multi-source filters. Vehicular Ad Hoc Networks 2010: 51-60 - [c1]Tiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker:
Challenges in Access Right Assignment for Secure Home Networks. HotSec 2010
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint