Follow
Yueh-Hsun Lin
Yueh-Hsun Lin
Apple Inc.
Verified email at andrew.cmu.edu
Title
Cited by
Cited by
Year
SmartAuth: User-Centered Authorization for the Internet of Things
Y Tian, N Zhang, YH Lin, X Wang, B Ur, X Guo, P Tague
USENIX Security 17, 2017
2822017
oPass: A user authentication protocol resistant to password stealing and password reuse attacks
HM Sun, YH Chen, YH Lin
IEEE transactions on information forensics and security 7 (2), 651-663, 2011
2112011
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
CM Chen, YH Lin, YC Lin, HM Sun
IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011
2042011
Spate: small-group pki-less authenticated trust establishment
YH Lin, A Studer, HC Hsiao, JM McCune, KH Wang, M Krohn, PL Lin, ...
Proceedings of the 7th international conference on Mobile systems …, 2009
1262009
CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks
YH Lin, SY Chang, HM Sun
IEEE Transactions on Knowledge and Data Engineering 25 (7), 1471-1483, 2012
992012
Safeslinger: easy-to-use and secure public-key exchange
M Farb, YH Lin, THJ Kim, J McCune, A Perrig
Proceedings of the 19th annual international conference on Mobile computing …, 2013
762013
XIA: architecting a more trustworthy and evolvable internet
D Naylor, MK Mukerjee, P Agyapong, R Grandl, R Kang, M Machado, ...
ACM SIGCOMM Computer Communication Review 44 (3), 50-57, 2014
752014
Understanding IoT security through the data crystal ball: Where we are now and where we are going to be
N Zhang, S Demetriou, X Mi, W Diao, K Yuan, P Zong, F Qian, XF Wang, ...
arXiv preprint arXiv:1703.09809, 2017
742017
A study of user-friendly hash comparison schemes
HC Hsiao, YH Lin, A Studer, C Studer, KH Wang, H Kikuchi, A Perrig, ...
2009 Annual Computer Security Applications Conference, 105-114, 2009
712009
{PARTEMU}: Enabling Dynamic Analysis of {Real-World}{TrustZone} Software Using Emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
29th USENIX Security Symposium (USENIX Security 20), 789-806, 2020
582020
Secure and fast handover scheme based on pre-authentication method for 802.16/WiMAX infrastructure networks
HM Sun, YH Lin, SM Chen, YC Shen
TENCON 2007-2007 IEEE Region 10 Conference, 1-4, 2007
542007
Coca: Computation offload to clouds using aop
HY Chen, YH Lin, CM Cheng
2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid …, 2012
512012
An efficient and verifiable concealed data aggregation scheme in wireless sensor networks
HM Sun, YC Hsiao, YH Lin, CM Chen
2008 International Conference on Embedded Software and Systems, 19-26, 2008
432008
API monitoring system for defeating worms and exploits in MS-Windows system
HM Sun, YH Lin, MF Wu
Information Security and Privacy: 11th Australasian Conference, ACISP 2006 …, 2006
402006
DepenDNS: Dependable mechanism against DNS cache poisoning
HM Sun, WH Chang, SY Chang, YH Lin
Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009
352009
Eliminating rouge femtocells based on distance bounding protocol and geographic information
CM Chen, YH Chen, YH Lin, HM Sun
Expert Systems with Applications 41 (2), 426-433, 2014
332014
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android
Y Chen, Y Li, L Lu, YH Lin, H Vijayakumar, Z Wang, X Ou
Network and Distributed System Security Symposium (NDSS'18), 2018
272018
KISS:“key it simple and secure” corporate key management
Z Zhou, J Han, YH Lin, A Perrig, V Gligor
Trust and Trustworthy Computing: 6th International Conference, TRUST 2013 …, 2013
272013
Short paper: MVSec: secure and easy-to-use pairing of mobile devices with vehicles
J Han, YH Lin, A Perrig, F Bai
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
262014
High-speed inter-domain fault localization
C Basescu, YH Lin, H Zhang, A Perrig
2016 IEEE Symposium on Security and Privacy (SP), 859-877, 2016
242016
The system can't perform the operation now. Try again later.
Articles 1–20