Tiffany Hyun-Jin Kim
According to our database1,
Tiffany Hyun-Jin Kim
authored at least 40 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
2023
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers.
Proceedings of the Applied Cryptography and Network Security, 2023
2020
FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Proceedings of the World Wide Web Conference, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Proceedings of the 26th International Conference on World Wide Web, 2017
2016
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016
2015
Secur. Commun. Networks, 2015
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015
2014
Comput. Commun. Rev., 2014
The Effect of Social Influence on Security Sensitivity.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.
Proceedings of the 22nd International World Wide Web Conference, 2013
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
PhD thesis, 2012
Proceedings of the Security Protocols XX, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
J. Commun. Networks, 2011
A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011
2010
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010