You are here

Bibliography

Export 4 results:
Author Title Type [ Year(Asc)]
Filters: Author is Yongdae Kim  [Clear All Filters]
2009
Tran A, Hopper NJ, Kim Y. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655199
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
McLachlan J, Tran A, Hopper NJ, Kim Y. Scalable onion routing with Torsk. In: Proceedings of CCS 2009. Proceedings of CCS 2009. ACM New York, NY, USA; 2009. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653733
2006
Shaneck M, Kim Y, Kumar V. Privacy Preserving Nearest Neighbor Search. In: Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. ; 2006.