scispace - formally typeset
T

Tiffany Hyun-Jin Kim

Researcher at HRL Laboratories

Publications -  46
Citations -  2790

Tiffany Hyun-Jin Kim is an academic researcher from HRL Laboratories. The author has contributed to research in topics: The Internet & Authentication. The author has an hindex of 17, co-authored 45 publications receiving 2529 citations. Previous affiliations of Tiffany Hyun-Jin Kim include Carnegie Mellon University.

Papers
More filters
Journal ArticleDOI

Cyber–Physical Security of a Smart Grid Infrastructure

TL;DR: It is argued that the “smart” grid, replacing its incredibly successful and reliable predecessor, poses a series of new security challenges, among others, that require novel approaches to the field of cyber security.

Cyber-Physical Security of a Smart Grid Infrastructure The authors of this paper discuss the limitations of advances, measures to make the smart grid secure, and also to assure continuous power flows and dynamic power pricing.

TL;DR: In this paper, the authors argue that existing security approaches are either inapplicable, not viable, insufficiently scalable, incom- patible, or simply inadequate to address the challenges posed by highly complex environments such as the smart grid.
Proceedings ArticleDOI

Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure

TL;DR: This paper proposes AKI as a new public-key validation infrastructure, to reduce the level of trust in CAs, and proposes an architecture for key revocation of all entities through checks-and-balances.
Proceedings ArticleDOI

ARPKI: Attack Resilient Public-Key Infrastructure

TL;DR: ARPKI is the first such infrastructure that systematically takes into account requirements identified by previous research, and it is co-designed with a formal model, and its core security property is verified using the Tamarin prover.
Proceedings Article

The Effect of Social Influence on Security Sensitivity

TL;DR: It was found that social processes played a major role in a large number of privacy and security-related behavior changes reported by the sample, probably because these processes were effective at raising security sensitivity.