Tiffany Hyun-Jin Kim

According to our database1, Tiffany Hyun-Jin Kim authored at least 38 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers.
Proceedings of the Applied Cryptography and Network Security, 2023

FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Bidirectional Blockchain.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

On the Privacy Risks of Compromised Trigger-Action Platforms.
Proceedings of the Computer Security - ESORICS 2020, 2020

An Investigation of Cyber Autonomy on Government Websites.
Proceedings of the World Wide Web Conference, 2019

SSP: Self-Sovereign Privacy for Internet of Things Using Blockchain and MPC.
Proceedings of the IEEE International Conference on Blockchain, 2019

Design, Analysis, and Implementation of ARPKI: An Attack-Resilient Public-Key Infrastructure.
IEEE Trans. Dependable Secur. Comput., 2018

SDNProbe: Lightweight Fault Localization in the Error-Prone Environment.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

BRICS: Blockchain-based Resilient Information Control System.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Authentication Challenges in a Global Environment.
ACM Trans. Priv. Secur., 2017

Security Implications of Redirection Trail in Popular Websites Worldwide.
Proceedings of the 26th International Conference on World Wide Web, 2017

SandUSB: An installation-free sandbox for USB peripherals.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Secure broadcast in distributed networks with strong adversaries.
Secur. Commun. Networks, 2015

Designing a Global Authentication Infrastructure.
CoRR, 2015

A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

XIA: architecting a more trustworthy and evolvable internet.
Comput. Commun. Rev., 2014

The Effect of Social Influence on Security Sensitivity.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Lightweight source authentication and path validation.
Proceedings of the ACM SIGCOMM 2014 Conference, 2014

Mechanized Network Origin and Path Authenticity Proofs.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Challenges of Establishing Trust in Online Entities and Beyond.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

ARPKI: Attack Resilient Public-Key Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure.
Proceedings of the 22nd International World Wide Web Conference, 2013

SafeSlinger: easy-to-use and secure public-key exchange.
Proceedings of the 19th Annual International Conference on Mobile Computing and Networking, 2013

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Proceedings of the Financial Cryptography and Data Security, 2013

Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Proceedings of the Financial Cryptography and Data Security, 2013

STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

All Trust Is Local: Empowering Users' Authentication Decisions on the Internet.
PhD thesis, 2012

Cyber-Physical Security of a Smart Grid Infrastructure.
Proc. IEEE, 2012

Street-Level Trust Semantics for Attribute Authentication.
Proceedings of the Security Protocols XX, 2012

LAP: Lightweight Anonymity and Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

ShortMAC: Efficient Data-Plane Fault Localization.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

GeoPKI: Converting Spatial Trust into Certificate Trust.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

OTO: online trust oracle for user-centric trust establishment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Access right assignment mechanisms for secure home networks.
J. Commun. Networks, 2011

A Picture is Worth a Thousand Words: Improving Usability and Robustness of Online Recommendation Systems.
Proceedings of 20th International Conference on Computer Communications and Networks, 2011

Challenges in Access Right Assignment for Secure Home Networks.
Proceedings of the 5th USENIX Workshop on Hot Topics in Security, 2010

VANET alert endorsement using multi-source filters.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010