Recent advances in smart contracts: A technical overview and state of the art VY Kemmoe, W Stone, J Kim, D Kim, J Son IEEE Access 8, 117782-117801, 2020 | 92 | 2020 |
Seeing is believing: Sharing real-time visual traffic information via vehicular clouds D Kwak, R Liu, D Kim, B Nath, L Iftode IEEE access 4, 3617-3631, 2016 | 57 | 2016 |
Regulating arm trustzone devices in restricted spaces F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 55 | 2016 |
Detecting plagiarized mobile apps using API birthmarks D Kim, A Gokhale, V Ganapathy, A Srivastava Automated Software Engineering 23, 591-618, 2016 | 23 | 2016 |
DoppelDriver: Counterfactual Actual Travel Times for Alternative Routes D Kwak, D Kim, R Liu, B Nath, L Iftode PerCom, 2015 | 14 | 2015 |
Tweeting traffic image reports on the road D Kwak, D Kim, R Liu, L Iftode, B Nath 6th International Conference on Mobile Computing, Applications and Services …, 2014 | 14 | 2014 |
A privacy protecting UMTS AKA protocol providing perfect forward secrecy D Kim, Y Cui, S Kim, H Oh Computational Science and Its Applications–ICCSA 2007, 987-995, 2007 | 6 | 2007 |
Rethinking the weakness of stream ciphers and its application to encrypted malware detection W Stone, D Kim, VY Kemmoe, M Kang, J Son IEEE Access 8, 191602-191616, 2020 | 4 | 2020 |
Data-driven inference of API mappings A Gokhale, D Kim, V Ganapathy Proceedings of the 2nd Workshop on Programming for Mobile & Touch, 29-32, 2014 | 4 | 2014 |
Regulating smart personal devices in restricted spaces F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi Rutgers University, 2015 | 2 | 2015 |
Simulation of an inter-block arc-welding robot for shipbuilding using a weaving motion algorithm based on a Bezier spline WJ Chung, KJ Kim, TJ Song, DY Kim, JL Kim, MH Park, KS Shin Proceedings of the Fourth IASTED International Conference on Modelling …, 2004 | 2 | 2004 |
A practical way to provide perfect forward secrecy for secure e-mail protocols S Kim, C Lee, D Kim, H Oh Distributed Computing and Internet Technology, 327-335, 2007 | 1 | 2007 |
Regulating smart devices in restricted spaces D Kim Rutgers University-School of Graduate Studies, 2019 | | 2019 |
Practical Secure E-mail Protocols Providing Perfect Forward Secrecy CY Lee, DY Kim, DH Shim, SJ Kim, HK Oh Journal of the Korea Institute of Information Security & Cryptology 17 (5 …, 2007 | | 2007 |
A New Algorithm of Weaving Motion Using Bezier Spline WJ Chung, DS Hong, DY Kim, YK Seo, HP Hong 제어로봇시스템학회: 학술대회논문집, 2743-2746, 2003 | | 2003 |
A New Planning Algorithm of Weaving Trajectory Control using Bezier Spline WJ Chung, DY Kim, CK Park, YH Choi, YK Seo, HP Hong IEEE Trans. on Industrial Electronics 3 (299), 30, 1983 | | 1983 |