default search action
Jihye Kim
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j39]Jihye Kwak, Junhyuk Lee, Jihye Kim, Hyunji Lee, Seokhyeon Kim, Sinae Kim, Moon Seong Kang:
Development of an inclusive, scalable, and flexible hydrologic modeling system: Establishing integrated flood simulation system at agricultural watersheds. Environ. Model. Softw. 183: 106225 (2025) - 2024
- [j38]Daehyeon Lee, Ohsuk Shin, Yeonghyeon Cha, Junghee Lee, Taisic Yun, Jihye Kim, Hyunok Oh, Chrysostomos Nicopoulos, Sang Su Lee:
A Hardware-Based Correct Execution Environment Supporting Virtual Memory. IEEE Access 12: 114008-114022 (2024) - [j37]Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh:
vCNN: Verifiable Convolutional Neural Network Based on zk-SNARKs. IEEE Trans. Dependable Secur. Comput. 21(4): 4254-4270 (2024) - [j36]Jaehoon Jung, Jihye Kim, Seong-Cheol Kim, Sohee Lim:
Eye-Gaze Tracking Based on Head Orientation Estimation Using FMCW Radar Sensor. IEEE Trans. Instrum. Meas. 73: 1-10 (2024) - [c54]Jongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim:
zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain. AsiaCCS 2024 - [c53]Wenyi Tang, Shankha Shubhra Mukherjee, Seongho Park, Changhao Chenli, Hyunok Oh, Jihye Kim, Taeho Jung:
GrAC: Graph-Based Anonymous Credentials from Identity Graphs on Blockchain. Blockchain 2024: 113-122 - [c52]Yunha Park, Jihye Kim, Kyu-Min Lee, Wonseok Oh:
The Information Billboard: Effects of Popular Search Terms on Search Behaviors and Digital Divide. HICSS 2024: 6999-7008 - [c51]Huayi Duan, Jihye Kim, Marc Wyss, Adrian Perrig:
DNS Congestion Control in Adversarial Settings. SOSP 2024: 726-747 - [i24]Jihye Kim, Deok-Sun Lee, Byungjoon Min, Mason A. Porter, Maxi San Miguel, K.-I. Goh:
Competition between group interactions and nonlinearity in voter dynamics on hypergraphs. CoRR abs/2407.11261 (2024) - [i23]Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, Hyunok Oh:
Hadamard Product Arguments and Their Applications. IACR Cryptol. ePrint Arch. 2024: 981 (2024) - [i22]Seongho Park, Jaekyoung Choi, Jihye Kim, Hyunok Oh:
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system. IACR Cryptol. ePrint Arch. 2024: 1003 (2024) - [i21]Byeongjun Jang, Gweonho Jeong, Hyuktae Kwon, Hyunok Oh, Jihye Kim:
Lego-DLC: batching module for commit-carrying SNARK under Pedersen Engines. IACR Cryptol. ePrint Arch. 2024: 1405 (2024) - [i20]Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim:
DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group. IACR Cryptol. ePrint Arch. 2024: 1509 (2024) - [i19]Seungwoo Kim, Semin Han, Seongho Park, Kyeongtae Lee, Jihye Kim, Hyunok Oh:
zkMarket : Privacy-preserving Digital Data Trade System via Blockchain. IACR Cryptol. ePrint Arch. 2024: 1775 (2024) - 2023
- [j35]Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts. IEEE Access 11: 56463-56480 (2023) - [j34]Hayoung Lee, Jihye Kim, Jongho Park, Sungho Kang:
STRAIT: Self-Test and Self-Recovery for AI Accelerator. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(9): 3092-3104 (2023) - [c50]Sanghoon Lee, Gwanghoon Jang, Chanhwi Kim, Se-Jeong Park, Kiwoong Yoo, Jihye Kim, Sunkyu Kim, Jaewoo Kang:
Enhancing Clinical Outcome Predictions through Auxiliary Loss and Sentence-Level Self-Attention. BIBM 2023: 1210-1217 - [c49]Sungwook Kim, Sungju Kim, Yulim Shin, Sunmi Kim, Jihye Kim, Hyunok Oh:
Efficient Transparent Polynomial Commitments for zk-SNARKs. ESORICS (3) 2023: 348-366 - [c48]Jaehyoung Park, Jihye Kim, Jiyou Seo, Sangpil Kim, Jong-Hyouk Lee:
Illegal 3D Content Distribution Tracking System based on DNN Forensic Watermarking. ICAIIC 2023: 777-781 - [c47]Jihye Kim, Jaehyoung Park, Jong-Hyouk Lee:
Analysis of Recent IIoT Security Technology Trends in a Smart Factory Environment. ICAIIC 2023: 840-845 - [c46]Yuguang Li, Kai Wang, Hui Li, Seon-Min Rhee, Seungju Han, Jihye Kim, Min Yang, Ran Yang, Feng Zhu:
CORE: Co-planarity Regularized Monocular Geometry Estimation with Weak Supervision. ICCV 2023: 8762-8771 - [c45]Jihye Kim, Aristide Baratin, Yan Zhang, Simon Lacoste-Julien:
CrossSplit: Mitigating Label Noise Memorization through Data Splitting. ICML 2023: 16377-16392 - [c44]Jeong-Hoon Park, Jihye Kim, Seong-Cheol Kim:
Radar Signal Decomposition of Multi-Human Respiration Signs with Reduced Antenna Array. WF-IoT 2023: 1-6 - 2022
- [j33]Kyung-Gook Park, Jihye Kim, Hongbum Kim:
How exhibitionism and voyeurism contribute to engagement in SNS use: The mediating effects of content production and consumption. Telematics Informatics 69: 101798 (2022) - [c43]Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. CCS 2022: 455-469 - [c42]Seong-Hwan Hyun, Jihye Kim, Keunwoo Kim, Wanjei Cho, Seong-Cheol Kim:
Joint Estimation of Vehicle's Position and Velocity With Distributed RSUs for OFDM Radar System. GLOBECOM 2022: 741-746 - [c41]Sohee Lim, Jaehoon Jung, Jihye Kim, Seong-Cheol Kim, Jeongsik Choi:
Enhanced Velocity Estimation Based on Joint Doppler Frequency and Range Rate Measurements. ICUFN 2022: 217-221 - [c40]Jihye Kim, Hayoung Lee, Jongho Park, Sungho Kang:
ZOS: Zero Overhead Scan for Systolic Array-based AI accelerator. ISOCC 2022: 360-361 - [c39]Jaehoon Jung, Sohee Lim, Jihye Kim, Jeong-Hoon Park, Seong-Cheol Kim:
Correction of I/Q Imbalance in FMCW Radar System Using Geometric Sequence Decomposition. VTC Spring 2022: 1-5 - [i18]Jihye Kim, Aristide Baratin, Yan Zhang, Simon Lacoste-Julien:
CrossSplit: Mitigating Label Noise Memorization through Data Splitting. CoRR abs/2212.01674 (2022) - [i17]Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts. IACR Cryptol. ePrint Arch. 2022: 211 (2022) - 2021
- [j32]Jeonghyuk Lee, Jihye Kim, Hyunok Oh:
Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs. IEEE Access 9: 97705-97717 (2021) - [j31]Jihye Kim, Ok-Ran Jeong:
Mirroring Vector Space Embedding for New Words. IEEE Access 9: 99954-99967 (2021) - [j30]Seokjun Jang, Jihye Kim, Sungho Kang:
Reconfigurable Scan Architecture for High Diagnostic Resolution. IEEE Access 9: 120537-120550 (2021) - [j29]Jihye Kim, Hyung-Min Kim, Minseong Kim:
The impact of a sense of virtual community on online community: does online privacy concern matter? Internet Res. 31(2): 519-539 (2021) - [j28]Ki Chul Chun, Yong-Ki Kim, Yesin Ryu, Jaewon Park, Chi Sung Oh, Young-Yong Byun, So-Young Kim, Dong-Hak Shin, Jun Gyu Lee, Byung-Kyu Ho, Min-Sang Park, Seong-Jin Cho, Seunghan Woo, Byoung-Mo Moon, Beomyong Kil, Sungoh Ahn, Jae Hoon Lee, Sooyoung Kim, Seouk-Kyu Choi, Jae-Seung Jeong, Sung-Gi Ahn, Jihye Kim, Jun Jin Kong, Kyomin Sohn, Nam Sung Kim, Jung-Bae Lee:
A 16-GB 640-GB/s HBM2E DRAM With a Data-Bus Window Extension Technique and a Synergetic On-Die ECC Scheme. IEEE J. Solid State Circuits 56(1): 199-211 (2021) - [j27]Sangjun Lee, Kyunghwan Cho, Jihye Kim, Jongho Park, Inhwan Lee, Sungho Kang:
Low-Power Scan Correlation-Aware Scan Cluster Reordering for Wireless Sensor Networks. Sensors 21(18): 6111 (2021) - [c38]Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. AsiaCCS 2021: 213-226 - [c37]Jihye Kim, Insook Cho:
Pattern Analysis of Inpatient Falls in a Tertiary Hospital. Nursing Informatics 2021: 71-73 - [c36]Jihye Kim, John V. Monaco:
User Identification in Dynamic Web Traffic via Deep Temporal Features. SP (Workshops) 2021: 282-290 - [i16]Jeonghyuk Lee, Jihye Kim, Hyunok Oh:
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs. IACR Cryptol. ePrint Arch. 2021: 567 (2021) - [i15]Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim:
Privacy-preserving Identity Management System. IACR Cryptol. ePrint Arch. 2021: 1459 (2021) - [i14]Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. IACR Cryptol. ePrint Arch. 2021: 1672 (2021) - 2020
- [j26]Jihye Kim, Jiwon Lee, Hyunok Oh:
Simulation-Extractable zk-SNARK With a Single Verification. IEEE Access 8: 156569-156581 (2020) - [j25]Jihye Kim, Hayoung Lee, Seokjun Jang, Sungho Kang:
Fine-Grained Defect Diagnosis for CMOL FPGA Circuits. IEEE Access 8: 163140-163151 (2020) - [j24]Junghee Lee, Chrysostomos Nicopoulos, Gweonho Jeong, Jihye Kim, Hyunok Oh:
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment. IEEE Access 8: 216689-216706 (2020) - [j23]Minseong Kim, Jihye Kim:
How does a celebrity make fans happy? Interaction between celebrities and fans in the social media context. Comput. Hum. Behav. 111: 106419 (2020) - [j22]Jiwon Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption. Sensors 20(11): 3140 (2020) - [c35]Jihye Kim, Hayoung Lee, Seokjun Jang, Hogyeong Kim, Sungho Kang:
Memory-like Defect Diagnosis for CMOL FPGAs. ISOCC 2020: 139-140 - [i13]Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh:
vCNN: Verifiable Convolutional Neural Network. IACR Cryptol. ePrint Arch. 2020: 584 (2020) - [i12]Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. IACR Cryptol. ePrint Arch. 2020: 1579 (2020)
2010 – 2019
- 2019
- [j21]Minjae Yoo, Jimin Shin, Hyunmin Kim, Jihye Kim, Jaewoo Kang, Aik Choon Tan:
Exploring the molecular mechanisms of Traditional Chinese Medicine components using gene expression signatures and connectivity map. Comput. Methods Programs Biomed. 174: 33-40 (2019) - [j20]Jihye Kim, Hyunok Oh:
FAS: Forward secure sequential aggregate signatures for secure logging. Inf. Sci. 471: 115-131 (2019) - [j19]Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Gwonho Jeong, Hyunok Oh:
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems. ACM Trans. Embed. Comput. Syst. 18(5s): 62:1-62:17 (2019) - [j18]Jihye Kim, Sangjun Lee, Sungho Kang:
Test-Friendly Data-Selectable Self-Gating (DSSG). IEEE Trans. Very Large Scale Integr. Syst. 27(8): 1972-1976 (2019) - [c34]Jihye Kim, Sangjun Lee, Minho Moon, Sungho Kang:
Transition-delay Test Methodology for Designs with Self-gating. ISOCC 2019: 93-94 - [c33]Kyunghwan Cho, Jihye Kim, Hyunggoy Oh, Sangjun Lee, Sungho Kang:
A New Scan Chain Reordering Method for Low Power Consumption based on Care Bit Density. ISOCC 2019: 134-135 - [c32]Thomas Haywood Dadzie, Jiwon Lee, Jihye Kim, Hyunok Oh:
SA-SPM: an efficient compiler for security aware scratchpad memory (invited paper). LCTES 2019: 57-69 - [c31]Jihye Kim, Hankyung Ko, Hyunok Oh:
AILocker: authenticated image locker for video. SAC 2019: 1508-1511 - [c30]Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh:
Forward Secure Identity-Based Signature Scheme with RSA. SEC 2019: 314-327 - [i11]Jihye Kim, Jiwon Lee, Hyunok Oh:
QAP-based Simulation-Extractable SNARK with a Single Verification. IACR Cryptol. ePrint Arch. 2019: 586 (2019) - [i10]Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim:
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain. IACR Cryptol. ePrint Arch. 2019: 1241 (2019) - [i9]Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh:
SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization. IACR Cryptol. ePrint Arch. 2019: 1270 (2019) - [i8]Jiwon Lee, Jihye Kim, Hyunok Oh:
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments. IACR Cryptol. ePrint Arch. 2019: 1311 (2019) - [i7]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2019: 1342 (2019) - 2018
- [j17]Min-Seong Kim, Jihye Kim:
The effects of perceived online justice on relational bonds and engagement intention: Evidence from an online game community. Comput. Hum. Behav. 84: 410-419 (2018) - [j16]Woong Lim, Ji-Won Son, Susan Gregson, Jihye Kim:
An Examination of High School Students' Online Engagement in Mathematics Problems. Int. J. Web Based Learn. Teach. Technol. 13(2): 1-15 (2018) - [j15]Hyunok Oh, Jihye Kim, Ji Sun Shin:
Forward-secure ID based digital signature scheme with forward-secure private key generator. Inf. Sci. 454-455: 96-109 (2018) - [c29]Thomas Haywood Dadzie, Jihye Kim, Hyunok Oh:
Secure non-volatile memory with scratch pad memory using dual encryption mode: work-in-progress. CODES+ISSS 2018: 6 - [c28]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. ESORICS (2) 2018: 269-287 - [c27]Jihye Kim, Insook Cho, Ahra Yoo, Jisun Chae, Miran Jung:
Information Completeness and Consistency of Inpatient Fall-Event Reports. Nursing Informatics 2018: 78 - [c26]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial subset difference public key broadcast encryption scheme for secure multicast. SAC 2018: 1593-1600 - [i6]Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh:
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems. IACR Cryptol. ePrint Arch. 2018: 1202 (2018) - 2017
- [j14]Dong-gook Kim, Jihye Kim:
Creating Online Quizzes with Multiple Attempts with Microsoft Excel and Word. INFORMS Trans. Educ. 18(1): 14-27 (2017) - [c25]Jihye Kim, Seunghwa Lee, Jungjun Yoon, Hankyung Ko, Seungri Kim, Hyunok Oh:
PASS: Privacy aware secure signature scheme for surveillance systems. AVSS 2017: 1-6 - [c24]Miran Jung, Insook Cho, Jisun Chae, Jihye Kim, Yeunhee Kim:
Comparing Inpatient Falls Guidelines to Develop an ICNP®-Based Nursing Catalogue for ENRs. MedInfo 2017: 1365 - [c23]Jihye Kim, Hyunok Oh:
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers. SEC 2017: 523-537 - [i5]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast. IACR Cryptol. ePrint Arch. 2017: 408 (2017) - 2016
- [j13]Jihye Kim, Jeongjin Lee, Jin-Wook Chung, Yeong-Gil Shin:
Locally adaptive 2D-3D registration using vascular structure model for liver catheterization. Comput. Biol. Medicine 70: 119-130 (2016) - [j12]Jennifer Hintzsche, Jihye Kim, Vinod Kumar Yadav, Carol Amato, Steven E. Robinson, Eric Seelenfreund, Yiqun Shellman, Joshua Wisell, Allison Applegate, Martin McCarter, Neil Box, John Tentler, Subhajyoti De, William A. Robinson, Aik Choon Tan:
IMPACT: a whole-exome sequencing analysis pipeline for integrating molecular profiles with actionable therapeutics in clinical samples. J. Am. Medical Informatics Assoc. 23(4): 721-730 (2016) - 2015
- [j11]Minjae Yoo, Jimin Shin, Jihye Kim, Karen A. Ryall, Kyubum Lee, Sunwon Lee, Minji Jeon, Jaewoo Kang, Aik Choon Tan:
DSigDB: drug signatures database for gene set analysis. Bioinform. 31(18): 3069-3071 (2015) - [j10]Karen A. Ryall, Jimin Shin, Minjae Yoo, Trista K. Hinz, Jihye Kim, Jaewoo Kang, Lynn E. Heasley, Aik Choon Tan:
Identifying kinase dependency in cancer cells by integrating high-throughput drug screening and kinase inhibition data. Bioinform. 31(23): 3799-3806 (2015) - [c22]Insu Hwang, Jihye Kim, Youngwoo Kim, Jonghyun Cho, Joungho Kim:
Noise coupling modeling and analysis of through glass via(TGV). 3DIC 2015: TS8.34.1-TS8.34.5 - [c21]Jihye Kim, Wonwoo Yang, Seunghwa Lee, Wonjoon Hwang:
Mediated aggregate signature schemes in wireless sensor networks. SECON Workshops 2015: 7-12 - [c20]Jeman Park, Jihye Kim, Seungho Kuk, Yongtae Park, Hyogon Kim:
Exploring Smartphones as WAVE Devices. VTC Fall 2015: 1-5 - 2014
- [j9]Jihye Kim, Vihas T. Vasu, Rangnath Mishra, Katherine R. Singleton, Minjae Yoo, Sonia M. Leach, Eveline Farias-Hesson, Robert J. Mason, Jaewoo Kang, Preveen Ramamoorthy, Jeffrey A. Kern, Lynn E. Heasley, James H. Finigan, Aik Choon Tan:
Bioinformatics-driven discovery of rational combination for overcoming EGFR-mutant lung cancer resistance to EGFR therapy. Bioinform. 30(17): 2393-2398 (2014) - [j8]Hyunok Oh, Jihye Kim:
An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory. IEEE Trans. Computers 63(4): 820-832 (2014) - [c19]Yu Huang, Mark Kassab, Jay Jahangiri, Janusz Rajski, Wu-Tung Cheng, Dongkwan Han, Jihye Kim, Kun Young Chung:
Test Compression Improvement with EDT Channel Sharing in SoC Designs. NATW 2014: 22-31 - 2012
- [c18]Myungsun Kim, Jihye Kim:
Privacy-preserving web search. ICUFN 2012: 480-481 - [i4]Myungsun Kim, Jihye Kim, Jung Hee Cheon:
Compress Multiple Ciphertexts Using ElGamal Encryption Schemes. IACR Cryptol. ePrint Arch. 2012: 243 (2012) - 2011
- [j7]Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju:
Threshold signature schemes for ElGamal variants. Comput. Stand. Interfaces 33(4): 432-437 (2011) - [j6]Jihye Kim, YouAn Kwon, Kichun Nam:
The Syllable Frequency Effect in Semantic Categorization Tasks in Korean. KSII Trans. Internet Inf. Syst. 5(10): 1879-1890 (2011) - [j5]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Flexible Robust Group Key Agreement. IEEE Trans. Parallel Distributed Syst. 22(5): 879-886 (2011) - [i3]Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon:
Constant-Round Privacy Preserving Multiset Union. IACR Cryptol. ePrint Arch. 2011: 138 (2011) - 2010
- [j4]Emiliano De Cristofaro, Jihye Kim:
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Secur. Priv. 8(4): 18-24 (2010) - [j3]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair threshold decryption with semi-trusted third parties. Int. J. Appl. Cryptogr. 2(2): 139-153 (2010) - [c17]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. ASIACRYPT 2010: 213-231 - [i2]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. IACR Cryptol. ePrint Arch. 2010: 469 (2010)
2000 – 2009
- 2009
- [j2]Jihye Kim, Gene Tsudik:
SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks 7(6): 1097-1109 (2009) - [c16]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair Threshold Decryption with Semi-Trusted Third Parties. ACISP 2009: 309-326 - [c15]Jihye Kim, Sihui Zhao, Brian E. Howard, Steffen Heber:
Mining of cis-Regulatory Motifs Associated with Tissue-Specific Alternative Splicing. ISBRA 2009: 260-271 - [c14]Sihui Zhao, Jihye Kim, Steffen Heber:
Analysis of Cis-Regulatory Motifs in Cassette Exons by Incorporating Exon Skipping Rates. ISBRA 2009: 272-283 - [c13]Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 - 2008
- [c12]Jihye Kim, Gengsheng Qin:
Logit-transformation Based Confidence Intervals for the Sensitivity of a Continuous-scale Diagnostic Test. BMEI (2) 2008: 768-772 - [c11]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 - [c10]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83 - [i1]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. IACR Cryptol. ePrint Arch. 2008: 282 (2008) - 2007
- [c9]Jihye Kim, Sihui Zhao, Steffen Heber:
Finding association rules of cis-regulatory elements involved in alternative splicing. ACM Southeast Regional Conference 2007: 232-237 - [c8]Sihui Zhao, Jihye Kim, Steffen Heber:
Large-scale Discovery of Regulatory Motifs Involved in Alternative Splicing. BIBE 2007: 1399-1403 - [c7]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Robust group key agreement using short broadcasts. CCS 2007: 411-420 - [c6]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 - 2006
- [j1]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [c5]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 - 2005
- [c4]Jihye Kim, Gene Tsudik:
SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260 - 2004
- [c3]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 - 2002
- [c2]Sangmin Bae, DongSup Song, Jihye Kim, Sungho Kang:
An Efficient On-Line Monitoring BIST for Remote Service System. AISA 2002: 205-214 - [c1]Hyunmin Kim, Jihye Kim, Chang Wook Ahn, Rudrapatna S. Ramakrishna:
Efficient Dynamic Load Balancing for Association Rule Mining. PDPTA 2002: 886-894
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint