Follow
Daeyoung Kim
Daeyoung Kim
Verified email at montclair.edu - Homepage
Title
Cited by
Cited by
Year
Recent advances in smart contracts: A technical overview and state of the art
VY Kemmoe, W Stone, J Kim, D Kim, J Son
IEEE Access 8, 117782-117801, 2020
892020
Seeing is believing: Sharing real-time visual traffic information via vehicular clouds
D Kwak, R Liu, D Kim, B Nath, L Iftode
IEEE access 4, 3617-3631, 2016
562016
Regulating arm trustzone devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
552016
Detecting plagiarized mobile apps using API birthmarks
D Kim, A Gokhale, V Ganapathy, A Srivastava
Automated Software Engineering 23, 591-618, 2016
232016
DoppelDriver: Counterfactual Actual Travel Times for Alternative Routes
D Kwak, D Kim, R Liu, B Nath, L Iftode
PerCom, 2015
142015
Tweeting traffic image reports on the road
D Kwak, D Kim, R Liu, L Iftode, B Nath
6th International Conference on Mobile Computing, Applications and Services …, 2014
142014
A privacy protecting UMTS AKA protocol providing perfect forward secrecy
D Kim, Y Cui, S Kim, H Oh
Computational Science and Its Applications–ICCSA 2007, 987-995, 2007
62007
Rethinking the weakness of stream ciphers and its application to encrypted malware detection
W Stone, D Kim, VY Kemmoe, M Kang, J Son
IEEE Access 8, 191602-191616, 2020
42020
Data-driven inference of API mappings
A Gokhale, D Kim, V Ganapathy
Proceedings of the 2nd Workshop on Programming for Mobile & Touch, 29-32, 2014
42014
Regulating smart personal devices in restricted spaces
F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi
Rutgers University, 2015
22015
Simulation of an inter-block arc-welding robot for shipbuilding using a weaving motion algorithm based on a Bezier spline
WJ Chung, KJ Kim, TJ Song, DY Kim, JL Kim, MH Park, KS Shin
Proceedings of the Fourth IASTED International Conference on Modelling …, 2004
22004
A practical way to provide perfect forward secrecy for secure e-mail protocols
S Kim, C Lee, D Kim, H Oh
Distributed Computing and Internet Technology, 327-335, 2007
12007
Regulating smart devices in restricted spaces
D Kim
Rutgers University-School of Graduate Studies, 2019
2019
Practical Secure E-mail Protocols Providing Perfect Forward Secrecy
CY Lee, DY Kim, DH Shim, SJ Kim, HK Oh
Journal of the Korea Institute of Information Security & Cryptology 17 (5 …, 2007
2007
A New Algorithm of Weaving Motion Using Bezier Spline
WJ Chung, DS Hong, DY Kim, YK Seo, HP Hong
제어로봇시스템학회: 학술대회논문집, 2743-2746, 2003
2003
A New Planning Algorithm of Weaving Trajectory Control using Bezier Spline
WJ Chung, DY Kim, CK Park, YH Choi, YK Seo, HP Hong
IEEE Trans. on Industrial Electronics 3 (299), 30, 1983
1983
The system can't perform the operation now. Try again later.
Articles 1–16