Jihye Kim
Jihye Kim
Verified email at kookmin.ac.kr
Title
Cited by
Cited by
Year
Linear-complexity private set intersection protocols secure in malicious model
E De Cristofaro, J Kim, G Tsudik
International Conference on the Theory and Application of Cryptology and …, 2010
2012010
SRDP: Secure route discovery for dynamic source routing in MANETs
J Kim, G Tsudik
Ad Hoc Networks 7 (6), 1097-1109, 2009
562009
Privacy-preserving policy-based information transfer
E De Cristofaro, S Jarecki, J Kim, G Tsudik
International Symposium on Privacy Enhancing Technologies Symposium, 164-184, 2009
552009
Beyond secret handshakes: Affiliation-hiding authenticated key exchange
S Jarecki, J Kim, G Tsudik
Cryptographers’ Track at the RSA Conference, 352-369, 2008
542008
Srdp: Securing route discovery in dsr
J Kim, G Tsudik
The Second Annual International Conference on Mobile and Ubiquitous Systems …, 2005
502005
Authentication for paranoids: Multi-party secret handshakes
S Jarecki, J Kim, G Tsudik
International Conference on Applied Cryptography and Network Security, 325-339, 2006
332006
Flexible robust group key agreement
S Jarecki, J Kim, G Tsudik
IEEE Transactions on Parallel and Distributed Systems 22 (5), 879-886, 2010
322010
Group secret handshakes or affiliation-hiding authenticated group key agreement
S Jarecki, J Kim, G Tsudik
Cryptographers’ Track at the RSA Conference, 287-308, 2007
322007
Constant-round privacy preserving multiset union
J Hong, JW Kim, J Kim, K Park, JH Cheon
Bull. Korean Math. Soc 50 (6), 1799-1816, 2013
232013
Secure acknowledgment aggregation and multisignatures with limited robustness
C Castelluccia, S Jarecki, J Kim, G Tsudik
Computer Networks 50 (10), 1639-1652, 2006
222006
Robust group key agreement using short broadcasts
S Jarecki, J Kim, G Tsudik
Proceedings of the 14th ACM conference on Computer and communications …, 2007
192007
Threshold signature schemes for ElGamal variants
S Kim, J Kim, JH Cheon, S Ju
Computer Standards & Interfaces 33 (4), 432-437, 2011
102011
Survival in the wild: Robust group key agreement in wide-area networks
J Kim, G Tsudik
International Conference on Information Security and Cryptology, 66-83, 2008
102008
A robust multisignature scheme with applications to acknowledgement aggregation
C Castelluccia, S Jarecki, J Kim, G Tsudik
International Conference on Security in Communication Networks, 193-207, 2004
92004
Compress multiple ciphertexts using elgamal encryption schemes
M Kim, J Kim, JH Cheon
J. Korean Math. Soc 50 (2), 361-377, 2013
72013
Forward-secure ID based digital signature scheme with forward-secure private key generator
H Oh, J Kim, JS Shin
Information Sciences 454, 96-109, 2018
52018
Some like it private: sharing confidential information based on oblivious authorization
E De Cristofaro, J Kim
IEEE Security & Privacy 8 (4), 18-24, 2010
52010
PASS: Privacy aware secure signature scheme for surveillance systems
J Kim, S Lee, J Yoon, H Ko, S Kim, H Oh
2017 14th IEEE International Conference on Advanced Video and Signal Based …, 2017
42017
Forward-secure digital signature schemes with optimal computation and storage of signers
J Kim, H Oh
IFIP International Conference on ICT Systems Security and Privacy Protection …, 2017
42017
FAS: Forward secure sequential aggregate signatures for secure logging
J Kim, H Oh
Information Sciences 471, 115-131, 2019
32019
The system can't perform the operation now. Try again later.
Articles 1–20