What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tiffany Hyun-Jin Kim
Google Scholar
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Bots can Snoop: Uncovering and Mitigating Privacy Risks of Bots in Group Chats.
Kai-Hsiang Chou
Yi-Min Lin
Yi-An Wang
Jonathan Weiping Li
Tiffany Hyun-Jin Kim
Hsu-Chun Hsiao
2023
conf/acns
Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers.
Ping-Lun Wang
Kai-Hsiang Chou
Shou-Ching Hsiao
Ann Tene Low
Tiffany Hyun-Jin Kim
Hsu-Chun Hsiao
2020
conf/esorics
On the Privacy Risks of Compromised Trigger-Action Platforms.
Yu-Hsi Chiang
Hsu-Chun Hsiao
Chia-Mu Yu
Tiffany Hyun-Jin Kim
2014
conf/ccs
YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Tiffany Hyun-Jin Kim
H. Colleen Stuart
Hsu-Chun Hsiao
Yue-Hsun Lin
Leon Zhang
Laura Dabbish
Sara B. Kiesler
2014
conf/ccs
Mechanized Network Origin and Path Authenticity Proofs.
Fuyuan Zhang
Limin Jia
Cristina Basescu
Tiffany Hyun-Jin Kim
Yih-Chun Hu
Adrian Perrig
2014
conf/ccs
ARPKI: Attack Resilient Public-Key Infrastructure.
David A. Basin
Cas Cremers
Tiffany Hyun-Jin Kim
Adrian Perrig
Ralf Sasse
Pawel Szalachowski
2014
conf/ccs
Challenges of Establishing Trust in Online Entities and Beyond.
Tiffany Hyun-Jin Kim
2014
conf/soups
The Effect of Social Influence on Security Sensitivity.
Sauvik Das
Tiffany Hyun-Jin Kim
Laura A. Dabbish
Jason I. Hong
2013
conf/ccs
STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Sangjae Yoo
Xin Zhang
Soo Bum Lee
Virgil D. Gligor
Adrian Perrig
2013
conf/fc
Soulmate or Acquaintance? Visualizing Tie Strength for Trust Inference.
Tiffany Hyun-Jin Kim
Virgil D. Gligor
Jorge Guajardo
Jason I. Hong
Adrian Perrig
2013
conf/fc
RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication.
Tiffany Hyun-Jin Kim
Akira Yamada
Virgil D. Gligor
Jason I. Hong
Adrian Perrig
2012
conf/ccs
OTO: online trust oracle for user-centric trust establishment.
Tiffany Hyun-Jin Kim
Payas Gupta
Jun Han
Emmanuel Owusu
Jason I. Hong
Adrian Perrig
Debin Gao
2012
conf/sp
LAP: Lightweight Anonymity and Privacy.
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Adrian Perrig
Akira Yamada
Samuel C. Nelson
Marco Gruteser
Wei Meng
2012
conf/ndss
ShortMAC: Efficient Data-Plane Fault Localization.
Xin Zhang
Zongwei Zhou
Hsu-Chun Hsiao
Tiffany Hyun-Jin Kim
Adrian Perrig
Patrick Tague
2010
conf/uss
Challenges in Access Right Assignment for Secure Home Networks.
Tiffany Hyun-Jin Kim
Lujo Bauer
James Newsome
Adrian Perrig
Jesse Walker
Coauthors
Adrian Perrig
(9)
Akira Yamada
(2)
Ann Tene Low
(1)
Cas Cremers
(1)
Chia-Mu Yu
(1)
Cristina Basescu
(1)
David A. Basin
(1)
Debin Gao
(1)
Emmanuel Owusu
(1)
Fuyuan Zhang
(1)
H. Colleen Stuart
(1)
Hsu-Chun Hsiao
(7)
James Newsome
(1)
Jason I. Hong
(4)
Jesse Walker
(1)
Jonathan Weiping Li
(1)
Jorge Guajardo
(1)
Jun Han
(1)
Kai-Hsiang Chou
(2)
Laura A. Dabbish
(1)
Laura Dabbish
(1)
Leon Zhang
(1)
Limin Jia
(1)
Lujo Bauer
(1)
Marco Gruteser
(1)
Patrick Tague
(1)
Pawel Szalachowski
(1)
Payas Gupta
(1)
Ping-Lun Wang
(1)
Ralf Sasse
(1)
Samuel C. Nelson
(1)
Sangjae Yoo
(1)
Sara B. Kiesler
(1)
Sauvik Das
(1)
Shou-Ching Hsiao
(1)
Soo Bum Lee
(1)
Tiffany Hyun-Jin Kim
(15)
Virgil D. Gligor
(3)
Wei Meng
(1)
Xin Zhang
(2)
Yi-An Wang
(1)
Yi-Min Lin
(1)
Yih-Chun Hu
(1)
Yu-Hsi Chiang
(1)
Yue-Hsun Lin
(1)
Zongwei Zhou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to