<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://yongdaek.github.io/courses/hugo-blox/getting-started/</loc><lastmod>2024-02-17T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/reference/customization/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/project-structure/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/</loc><lastmod>2023-10-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/configuration/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/teaching/</loc><lastmod>2026-01-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/academic/</loc><lastmod>2030-06-01T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/events/example/</loc><lastmod>2030-06-01T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/markdown/</loc><lastmod>2030-06-01T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/open-science/</loc><lastmod>2030-06-01T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/presentations/</loc><lastmod>2030-06-01T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/events/</loc><lastmod>2030-06-01T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/</loc><lastmod>2030-06-01T13:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/</loc><lastmod>2025-12-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/course/</loc><lastmod>2025-09-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/</loc><lastmod>2025-09-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/</loc><lastmod>2025-09-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/hugo-blox/</loc><lastmod>2025-09-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/research/01_cellular_security/</loc><lastmod>2025-01-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/research/</loc><lastmod>2025-01-04T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/research/02_cps_security/</loc><lastmod>2025-01-03T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publication_types/1/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publication_types/2/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/citesting-systematic-testing-of-context-integrity-violations/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/citesting-systematic-testing-of-context-integrity-violations/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/citesting-systematic-testing-of-context-integrity-violations/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2024-20076/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2024-20077/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2024-23385/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2024-27870/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2025-20659/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2025-21477/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2025-26780/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/firmstate-bringing-cellular-protocol-states-to-shannon-baseb/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/firmstate-bringing-cellular-protocol-states-to-shannon-baseb/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/firmstate-bringing-cellular-protocol-states-to-shannon-baseb/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/llfuzz-an-over-the-air-dynamic-testing-framework-for-cellula/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/llfuzz-an-over-the-air-dynamic-testing-framework-for-cellula/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/llfuzz-an-over-the-air-dynamic-testing-framework-for-cellula/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/passive-3-d-user-equipment-tracking-using-long-term-evolutio/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/passive-3-d-user-equipment-tracking-using-long-term-evolutio/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/passive-3-d-user-equipment-tracking-using-long-term-evolutio/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publication_types/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/revisiting-gps-spoofing-in-phasor-measurement-real-world-exp/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/revisiting-gps-spoofing-in-phasor-measurement-real-world-exp/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/revisiting-gps-spoofing-in-phasor-measurement-real-world-exp/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/too-much-of-a-good-thing-in-security-of-mandatory-security-s/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/too-much-of-a-good-thing-in-security-of-mandatory-security-s/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/too-much-of-a-good-thing-in-security-of-mandatory-security-s/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/xdac-xai-driven-detection-and-attribution-of-llm-generated-n/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/xdac-xai-driven-detection-and-attribution-of-llm-generated-n/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/xdac-xai-driven-detection-and-attribution-of-llm-generated-n/</loc><lastmod>2025-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/blog/notebook-onboarding/</loc><lastmod>2024-07-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/blog/</loc><lastmod>2024-07-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/jupyter/</loc><lastmod>2024-07-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/tutorials/</loc><lastmod>2024-07-15T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/projects/</loc><lastmod>2024-05-19T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/a-systematic-study-of-physical-sensor-attack-hardness/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/a-systematic-study-of-physical-sensor-attack-hardness/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/a-systematic-study-of-physical-sensor-attack-hardness/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/enabling-physical-localization-of-uncooperative-cellular-dev/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/enabling-physical-localization-of-uncooperative-cellular-dev/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/enabling-physical-localization-of-uncooperative-cellular-dev/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/slides/example/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/slides/</loc><lastmod>2024-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/blog/get-started/</loc><lastmod>2023-10-27T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/hugo/</loc><lastmod>2023-10-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/hugoblox/</loc><lastmod>2023-10-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/projects/pandas/</loc><lastmod>2023-10-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/projects/pytorch/</loc><lastmod>2023-10-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/projects/scikit/</loc><lastmod>2023-10-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/second-brain/</loc><lastmod>2023-10-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/blog/second-brain/</loc><lastmod>2023-10-26T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/blog/data-visualization/</loc><lastmod>2023-10-25T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/blog/teach-courses/</loc><lastmod>2023-10-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/formatting/media/</loc><lastmod>2023-10-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/experience/</loc><lastmod>2023-10-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/formatting/</loc><lastmod>2023-10-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/hugo-blox-builder/</loc><lastmod>2023-10-24T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/blog/project-management/</loc><lastmod>2023-10-23T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/basecomp-a-comparative-analysis-for-integrity-protection-in-/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/basecomp-a-comparative-analysis-for-integrity-protection-in-/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/basecomp-a-comparative-analysis-for-integrity-protection-in-/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/delegation-of-tls-authentication-to-cdns-using-revocable-del/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/delegation-of-tls-authentication-to-cdns-using-revocable-del/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/delegation-of-tls-authentication-to-cdns-using-revocable-del/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/lightbox-sensor-attack-detection-for-photoelectric-sensors-v/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/lightbox-sensor-attack-detection-for-photoelectric-sensors-v/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/lightbox-sensor-attack-detection-for-photoelectric-sensors-v/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/ltesniffer-an-open-source-lte-downlink-uplink-eavesdropper/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/ltesniffer-an-open-source-lte-downlink-uplink-eavesdropper/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/ltesniffer-an-open-source-lte-downlink-uplink-eavesdropper/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/paralyzing-drones-via-emi-signal-injection-on-sensory-commun/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/paralyzing-drones-via-emi-signal-injection-on-sensory-commun/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/paralyzing-drones-via-emi-signal-injection-on-sensory-commun/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/preventing-sim-box-fraud-using-device-model-fingerprinting/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/preventing-sim-box-fraud-using-device-model-fingerprinting/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/preventing-sim-box-fraud-using-device-model-fingerprinting/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/revisiting-binary-code-similarity-analysis-using-interpretab/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/un-rocking-drones-foundations-of-acoustic-injection-attacks-/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/un-rocking-drones-foundations-of-acoustic-injection-attacks-/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/un-rocking-drones-foundations-of-acoustic-injection-attacks-/</loc><lastmod>2023-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/are-there-wireless-hidden-cameras-spying-on-me/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/are-there-wireless-hidden-cameras-spying-on-me/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/are-there-wireless-hidden-cameras-spying-on-me/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/attack-of-the-clones-measuring-the-maintainability-originali/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/attack-of-the-clones-measuring-the-maintainability-originali/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/attack-of-the-clones-measuring-the-maintainability-originali/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/cellular-security-why-is-it-difficult/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/cellular-security-why-is-it-difficult/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/cellular-security-why-is-it-difficult/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-2289/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2021-25516/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2021-30826/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/doltest-in-depth-downlink-negative-testing-framework-for-lte/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/doltest-in-depth-downlink-negative-testing-framework-for-lte/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/doltest-in-depth-downlink-negative-testing-framework-for-lte/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/hearmeout-detecting-voice-phishing-activities-in-android/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/hearmeout-detecting-voice-phishing-activities-in-android/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/hearmeout-detecting-voice-phishing-activities-in-android/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/watching-the-watchers-practical-video-identification-attack-/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/watching-the-watchers-practical-video-identification-attack-/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/watching-the-watchers-practical-video-identification-attack-/</loc><lastmod>2022-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/amnesiac-dram-a-proactive-defense-mechanism-against-cold-boo/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/amnesiac-dram-a-proactive-defense-mechanism-against-cold-boo/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/amnesiac-dram-a-proactive-defense-mechanism-against-cold-boo/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/basespec-comparative-analysis-of-baseband-software-and-cellu/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/basespec-comparative-analysis-of-baseband-software-and-cellu/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/basespec-comparative-analysis-of-baseband-software-and-cellu/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/enabling-the-large-scale-emulation-of-internet-of-things-fir/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/enabling-the-large-scale-emulation-of-internet-of-things-fir/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/enabling-the-large-scale-emulation-of-internet-of-things-fir/</loc><lastmod>2021-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/analysis-of-lft2/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/analysis-of-lft2/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/analysis-of-lft2/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2018-19986/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2018-19987/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2018-19988/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2018-19989/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2018-19990/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2018-20114/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-11399/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-11400/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-20082/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-20084/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-6258/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/firmae-towards-large-scale-emulation-of-iot-firmware-for-dyn/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/firmae-towards-large-scale-emulation-of-iot-firmware-for-dyn/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/firmae-towards-large-scale-emulation-of-iot-firmware-for-dyn/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/revisiting-binary-code-similarity-analysis-using-interpretab/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/revisiting-binary-code-similarity-analysis-using-interpretab/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/sok-a-minimalist-approach-to-formalizing-analog-sensor-secur/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/sok-a-minimalist-approach-to-formalizing-analog-sensor-secur/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/sok-a-minimalist-approach-to-formalizing-analog-sensor-secur/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/the-system-that-cried-wolf-sensor-security-analysis-of-wide-/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/the-system-that-cried-wolf-sensor-security-analysis-of-wide-/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/the-system-that-cried-wolf-sensor-security-analysis-of-wide-/</loc><lastmod>2020-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/an-eye-for-an-eye-economics-of-retaliation-in-mining-pools/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/an-eye-for-an-eye-economics-of-retaliation-in-mining-pools/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/an-eye-for-an-eye-economics-of-retaliation-in-mining-pools/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/bitcoin-vs-bitcoin-cash-coexistence-or-downfall-of-bitcoin-c/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/bitcoin-vs-bitcoin-cash-coexistence-or-downfall-of-bitcoin-c/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/bitcoin-vs-bitcoin-cash-coexistence-or-downfall-of-bitcoin-c/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-20783/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2019-5307/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/cybercriminal-minds-an-investigative-study-of-cryptocurrency/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/cybercriminal-minds-an-investigative-study-of-cryptocurrency/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/cybercriminal-minds-an-investigative-study-of-cryptocurrency/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/doppelg-angers-on-the-dark-web-a-large-scale-assessment-on-p/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/doppelg-angers-on-the-dark-web-a-large-scale-assessment-on-p/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/doppelg-angers-on-the-dark-web-a-large-scale-assessment-on-p/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/hidden-figures-comparative-latency-analysis-of-cellular-netw/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/hidden-figures-comparative-latency-analysis-of-cellular-netw/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/hidden-figures-comparative-latency-analysis-of-cellular-netw/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/hiding-in-plain-signal-physical-signal-overshadowing-attack-/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/hiding-in-plain-signal-physical-signal-overshadowing-attack-/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/hiding-in-plain-signal-physical-signal-overshadowing-attack-/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/impossibility-of-full-decentralization-in-permissionless-blo/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/impossibility-of-full-decentralization-in-permissionless-blo/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/impossibility-of-full-decentralization-in-permissionless-blo/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/is-stellar-as-secure-as-you-think/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/is-stellar-as-secure-as-you-think/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/is-stellar-as-secure-as-you-think/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/touching-the-untouchables-dynamic-security-analysis-of-the-l/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/touching-the-untouchables-dynamic-security-analysis-of-the-l/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/touching-the-untouchables-dynamic-security-analysis-of-the-l/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/tractor-beam-safe-hijacking-of-consumer-drones-with-adaptive/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/tractor-beam-safe-hijacking-of-consumer-drones-with-adaptive/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/tractor-beam-safe-hijacking-of-consumer-drones-with-adaptive/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/who-spent-my-eos-on-the-in-security-of-resource-management-o/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/who-spent-my-eos-on-the-in-security-of-resource-management-o/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/who-spent-my-eos-on-the-in-security-of-resource-management-o/</loc><lastmod>2019-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/guti-reallocation-demystified-cellular-location-tracking-wit/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/guti-reallocation-demystified-cellular-location-tracking-wit/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/guti-reallocation-demystified-cellular-location-tracking-wit/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/gyrosfinger-fingerprinting-drones-for-location-tracking-base/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/gyrosfinger-fingerprinting-drones-for-location-tracking-base/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/gyrosfinger-fingerprinting-drones-for-location-tracking-base/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/large-scale-analysis-of-remote-code-injection-attacks-in-and/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/large-scale-analysis-of-remote-code-injection-attacks-in-and/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/large-scale-analysis-of-remote-code-injection-attacks-in-and/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/peeking-over-the-cellular-walled-gardens-a-method-for-closed/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/peeking-over-the-cellular-walled-gardens-a-method-for-closed/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/peeking-over-the-cellular-walled-gardens-a-method-for-closed/</loc><lastmod>2018-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/be-selfish-and-avoid-dilemmas-fork-after-withholding-faw-att/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/be-selfish-and-avoid-dilemmas-fork-after-withholding-faw-att/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/be-selfish-and-avoid-dilemmas-fork-after-withholding-faw-att/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/crime-scene-reconstruction-online-gold-farming-network-analy/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/crime-scene-reconstruction-online-gold-farming-network-analy/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/crime-scene-reconstruction-online-gold-farming-network-analy/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/illusion-and-dazzle-adversarial-optical-channel-exploits-aga/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/illusion-and-dazzle-adversarial-optical-channel-exploits-aga/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/illusion-and-dazzle-adversarial-optical-channel-exploits-aga/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/when-cellular-networks-met-ipv6-security-problems-of-middleb/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/when-cellular-networks-met-ipv6-security-problems-of-middleb/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/when-cellular-networks-met-ipv6-security-problems-of-middleb/</loc><lastmod>2017-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/decoder-free-sino-korean-shellcode/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/decoder-free-sino-korean-shellcode/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/decoder-free-sino-korean-shellcode/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/dissecting-customized-protocols-automatic-analysis-for-custo/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/dissecting-customized-protocols-automatic-analysis-for-custo/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/dissecting-customized-protocols-automatic-analysis-for-custo/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/doppelganger-in-bitcoin-mining-pools-an-analysis-of-the-dupl/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/doppelganger-in-bitcoin-mining-pools-an-analysis-of-the-dupl/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/doppelganger-in-bitcoin-mining-pools-an-analysis-of-the-dupl/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/enabling-automatic-protocol-behavior-analysis-for-android-ap/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/enabling-automatic-protocol-behavior-analysis-for-android-ap/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/enabling-automatic-protocol-behavior-analysis-for-android-ap/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/pay-as-you-want-bypassing-charging-system-in-operational-cel/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/pay-as-you-want-bypassing-charging-system-in-operational-cel/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/pay-as-you-want-bypassing-charging-system-in-operational-cel/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/pikit-a-new-kernel-independent-processor-interconnect-rootki/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/pikit-a-new-kernel-independent-processor-interconnect-rootki/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/pikit-a-new-kernel-independent-processor-interconnect-rootki/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/private-over-threshold-aggregation-protocols-over-distribute/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/private-over-threshold-aggregation-protocols-over-distribute/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/private-over-threshold-aggregation-protocols-over-distribute/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/sampling-race-bypassing-timing-based-analog-active-sensor-sp/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/sampling-race-bypassing-timing-based-analog-active-sensor-sp/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/sampling-race-bypassing-timing-based-analog-active-sensor-sp/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/supply-chain-security-for-cyberinfrastructure-guest-editors-/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/supply-chain-security-for-cyberinfrastructure-guest-editors-/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/supply-chain-security-for-cyberinfrastructure-guest-editors-/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/this-ain-t-your-dose-sensor-spoofing-attack-on-medical-infus/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/this-ain-t-your-dose-sensor-spoofing-attack-on-medical-infus/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/this-ain-t-your-dose-sensor-spoofing-attack-on-medical-infus/</loc><lastmod>2016-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/bittersweet-adb-attacks-and-defenses/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/bittersweet-adb-attacks-and-defenses/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/bittersweet-adb-attacks-and-defenses/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/breaking-and-fixing-volte-exploiting-hidden-data-channels-an/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/breaking-and-fixing-volte-exploiting-hidden-data-channels-an/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/breaking-and-fixing-volte-exploiting-hidden-data-channels-an/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/burnfit-analyzing-and-exploiting-wearable-devices/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/burnfit-analyzing-and-exploiting-wearable-devices/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/burnfit-analyzing-and-exploiting-wearable-devices/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/tags/cve-2015-6614/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/extractocol-autoatic-extraction-of-application-level-protoco/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/extractocol-autoatic-extraction-of-application-level-protoco/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/extractocol-autoatic-extraction-of-application-level-protoco/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/frying-pan-dissecting-customized-protocol-for-personal-area-/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/frying-pan-dissecting-customized-protocol-for-personal-area-/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/frying-pan-dissecting-customized-protocol-for-personal-area-/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/hijacking-the-vuze-bittorrent-network-all-your-hop-are-belon/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/hijacking-the-vuze-bittorrent-network-all-your-hop-are-belon/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/hijacking-the-vuze-bittorrent-network-all-your-hop-are-belon/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/rocking-drones-with-intentional-sound-noise-on-gyroscopic-se/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/rocking-drones-with-intentional-sound-noise-on-gyroscopic-se/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/rocking-drones-with-intentional-sound-noise-on-gyroscopic-se/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/security-analysis-of-fhss-type-drone-controller/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/security-analysis-of-fhss-type-drone-controller/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/security-analysis-of-fhss-type-drone-controller/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/timing-attacks-on-access-privacy-in-information-centric-netw/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/timing-attacks-on-access-privacy-in-information-centric-netw/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/timing-attacks-on-access-privacy-in-information-centric-netw/</loc><lastmod>2015-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/analyzing-security-of-korean-usim-based-pki-certificate-serv/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/analyzing-security-of-korean-usim-based-pki-certificate-serv/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/analyzing-security-of-korean-usim-based-pki-certificate-serv/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/first-experimental-result-of-power-analysis-attacks-on-a-fpg/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/first-experimental-result-of-power-analysis-attacks-on-a-fpg/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/first-experimental-result-of-power-analysis-attacks-on-a-fpg/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/gaining-control-of-cellular-traffic-accounting-by-spurious-t/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/gaining-control-of-cellular-traffic-accounting-by-spurious-t/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/gaining-control-of-cellular-traffic-accounting-by-spurious-t/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/revisiting-security-of-proportional-fair-scheduler-in-wirele/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/revisiting-security-of-proportional-fair-scheduler-in-wirele/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/revisiting-security-of-proportional-fair-scheduler-in-wirele/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/run-away-if-you-can-persistent-jamming-attacks-against-chann/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/run-away-if-you-can-persistent-jamming-attacks-against-chann/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/run-away-if-you-can-persistent-jamming-attacks-against-chann/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/successful-profiling-attacks-with-different-measurement-envi/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/successful-profiling-attacks-with-different-measurement-envi/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/successful-profiling-attacks-with-different-measurement-envi/</loc><lastmod>2014-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/attacking-the-kad-network-real-world-evaluation-and-high-fid/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/attacking-the-kad-network-real-world-evaluation-and-high-fid/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/attacking-the-kad-network-real-world-evaluation-and-high-fid/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/dynamix-anonymity-on-dynamic-social-structures/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/dynamix-anonymity-on-dynamic-social-structures/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/dynamix-anonymity-on-dynamic-social-structures/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/ghost-talk-mitigating-emi-signal-injection-attacks-against-a/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/ghost-talk-mitigating-emi-signal-injection-attacks-against-a/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/ghost-talk-mitigating-emi-signal-injection-attacks-against-a/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/peer-pressure-exerting-malicious-influence-on-routers-at-a-d/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/peer-pressure-exerting-malicious-influence-on-routers-at-a-d/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/peer-pressure-exerting-malicious-influence-on-routers-at-a-d/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/protecting-access-privacy-of-cached-contents-in-information-/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/secure-encounter-based-mobile-social-networks-requirements-d/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/secure-encounter-based-mobile-social-networks-requirements-d/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/secure-encounter-based-mobile-social-networks-requirements-d/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/towards-accurate-accounting-of-cellular-data-for-tcp-retrans/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/towards-accurate-accounting-of-cellular-data-for-tcp-retrans/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/towards-accurate-accounting-of-cellular-data-for-tcp-retrans/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/trustworthy-distributed-computing-on-social-networks/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/trustworthy-distributed-computing-on-social-networks/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/trustworthy-distributed-computing-on-social-networks/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/using-principal-component-analysis-for-practical-biasing-of-/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/using-principal-component-analysis-for-practical-biasing-of-/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/using-principal-component-analysis-for-practical-biasing-of-/</loc><lastmod>2013-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/location-leaks-over-the-gsm-air-interface/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/location-leaks-over-the-gsm-air-interface/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/location-leaks-over-the-gsm-air-interface/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/measuring-bias-in-the-mixing-time-of-social-graphs-due-to-gr/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/measuring-bias-in-the-mixing-time-of-social-graphs-due-to-gr/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/measuring-bias-in-the-mixing-time-of-social-graphs-due-to-gr/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/on-the-mixing-time-of-directed-social-graphs-and-security-im/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/on-the-mixing-time-of-directed-social-graphs-and-security-im/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/on-the-mixing-time-of-directed-social-graphs-and-security-im/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/one-way-indexing-for-plausible-deniability-in-censorship-res/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/one-way-indexing-for-plausible-deniability-in-censorship-res/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/one-way-indexing-for-plausible-deniability-in-censorship-res/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/private-over-threshold-aggregation-protocols/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/private-over-threshold-aggregation-protocols/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/private-over-threshold-aggregation-protocols/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/private-top-k-aggregation-protocols/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/private-top-k-aggregation-protocols/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/private-top-k-aggregation-protocols/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/protecting-access-privacy-of-cached-contents-in-information-/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/protecting-access-privacy-of-cached-contents-in-information-/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/security-evaluation-of-cryptographic-modules-against-profili/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/security-evaluation-of-cryptographic-modules-against-profili/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/security-evaluation-of-cryptographic-modules-against-profili/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/taking-routers-off-their-meds-why-assumptions-of-router-stab/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/taking-routers-off-their-meds-why-assumptions-of-router-stab/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/taking-routers-off-their-meds-why-assumptions-of-router-stab/</loc><lastmod>2012-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/keep-your-friends-close-incorporating-trust-into-social-netw/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/keep-your-friends-close-incorporating-trust-into-social-netw/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/keep-your-friends-close-incorporating-trust-into-social-netw/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/losing-control-of-the-internet-using-the-data-plane-to-attac/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/mistaking-friends-for-foes-an-analysis-of-a-social-network-b/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/mistaking-friends-for-foes-an-analysis-of-a-social-network-b/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/mistaking-friends-for-foes-an-analysis-of-a-social-network-b/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/security-requirements-of-certificate-validation-in-web-secur/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/security-requirements-of-certificate-validation-in-web-secur/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/security-requirements-of-certificate-validation-in-web-secur/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/socialcloud-using-social-networks-for-building-distributed-c/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/socialcloud-using-social-networks-for-building-distributed-c/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/socialcloud-using-social-networks-for-building-distributed-c/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/the-frog-boiling-attack-limitations-of-secure-network-coordi/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/the-frog-boiling-attack-limitations-of-secure-network-coordi/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/the-frog-boiling-attack-limitations-of-secure-network-coordi/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/understanding-social-networks-properties-for-trustworthy-com/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/understanding-social-networks-properties-for-trustworthy-com/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/understanding-social-networks-properties-for-trustworthy-com/</loc><lastmod>2011-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/balancing-the-shadows/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/balancing-the-shadows/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/balancing-the-shadows/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/designs-to-account-for-trust-in-social-network-based-sybil-d/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/designs-to-account-for-trust-in-social-network-based-sybil-d/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/designs-to-account-for-trust-in-social-network-based-sybil-d/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/efficient-cryptographic-primitives-for-private-data-mining/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/efficient-cryptographic-primitives-for-private-data-mining/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/efficient-cryptographic-primitives-for-private-data-mining/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/losing-control-of-the-internet-using-the-data-plane-to-attac/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/losing-control-of-the-internet-using-the-data-plane-to-attac/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/measuring-the-mixing-time-of-social-graphs/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/measuring-the-mixing-time-of-social-graphs/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/measuring-the-mixing-time-of-social-graphs/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/on-homomorphic-signatures-for-network-coding/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/on-homomorphic-signatures-for-network-coding/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/on-homomorphic-signatures-for-network-coding/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/recruiting-new-tor-relays-with-braids/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/recruiting-new-tor-relays-with-braids/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/recruiting-new-tor-relays-with-braids/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/secure-encounter-based-social-networks-requirements-challeng/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/secure-encounter-based-social-networks-requirements-challeng/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/secure-encounter-based-social-networks-requirements-challeng/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/timing-attacks-on-pin-input-devices/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/timing-attacks-on-pin-input-devices/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/timing-attacks-on-pin-input-devices/</loc><lastmod>2010-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/hashing-it-out-in-public-common-failure-modes-of-dht-based-a/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/hashing-it-out-in-public-common-failure-modes-of-dht-based-a/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/hashing-it-out-in-public-common-failure-modes-of-dht-based-a/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/membership-concealing-overlay-networks/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/membership-concealing-overlay-networks/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/membership-concealing-overlay-networks/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/on-protecting-integrity-and-confidentiality-of-cryptographic/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/on-protecting-integrity-and-confidentiality-of-cryptographic/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/on-protecting-integrity-and-confidentiality-of-cryptographic/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/scalable-onion-routing-with-torsk/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/scalable-onion-routing-with-torsk/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/scalable-onion-routing-with-torsk/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/the-frog-boiling-attack-limitations-of-anomaly-detection-for/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/the-frog-boiling-attack-limitations-of-anomaly-detection-for/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/the-frog-boiling-attack-limitations-of-anomaly-detection-for/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/towards-complete-node-enumeration-in-a-peer-to-peer-botnet/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/towards-complete-node-enumeration-in-a-peer-to-peer-botnet/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/towards-complete-node-enumeration-in-a-peer-to-peer-botnet/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/why-kad-lookup-fails/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/why-kad-lookup-fails/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/why-kad-lookup-fails/</loc><lastmod>2009-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/attacking-the-kad-network/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/attacking-the-kad-network/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/attacking-the-kad-network/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/provably-secure-timed-release-public-key-encryption/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/provably-secure-timed-release-public-key-encryption/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/provably-secure-timed-release-public-key-encryption/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/secure-localization-with-phantom-node-detection/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/secure-localization-with-phantom-node-detection/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/secure-localization-with-phantom-node-detection/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/voice-coil-motor-nano-stage-with-an-eddy-current-damper/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/voice-coil-motor-nano-stage-with-an-eddy-current-damper/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/voice-coil-motor-nano-stage-with-an-eddy-current-damper/</loc><lastmod>2008-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/building-trust-in-storage-outsourcing-secure-accounting-of-u/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/building-trust-in-storage-outsourcing-secure-accounting-of-u/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/building-trust-in-storage-outsourcing-secure-accounting-of-u/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/combating-double-spending-using-cooperative-p2p-systems/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/combating-double-spending-using-cooperative-p2p-systems/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/combating-double-spending-using-cooperative-p2p-systems/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/detecting-phantom-nodes-in-wireless-sensor-networks/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/detecting-phantom-nodes-in-wireless-sensor-networks/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/detecting-phantom-nodes-in-wireless-sensor-networks/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/exploring-in-situ-sensing-irregularity-in-wireless-sensor-ne/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/exploring-in-situ-sensing-irregularity-in-wireless-sensor-ne/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/exploring-in-situ-sensing-irregularity-in-wireless-sensor-ne/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/realistic-sensing-area-modeling/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/realistic-sensing-area-modeling/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/realistic-sensing-area-modeling/</loc><lastmod>2007-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/achieving-realistic-sensing-area-modeling/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/achieving-realistic-sensing-area-modeling/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/achieving-realistic-sensing-area-modeling/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/integrating-an-eclipse-based-scenario-modeling-environment-w/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/integrating-an-eclipse-based-scenario-modeling-environment-w/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/integrating-an-eclipse-based-scenario-modeling-environment-w/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/privacy-preserving-nearest-neighbor-search/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/privacy-preserving-nearest-neighbor-search/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/privacy-preserving-nearest-neighbor-search/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/privacy-protection-in-pkis-a-separation-of-authority-approac/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/privacy-protection-in-pkis-a-separation-of-authority-approac/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/privacy-protection-in-pkis-a-separation-of-authority-approac/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/timed-release-and-key-insulated-public-key-encryption/</loc><lastmod>2006-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/remote-software-based-attestation-for-wireless-sensors/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/remote-software-based-attestation-for-wireless-sensors/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/remote-software-based-attestation-for-wireless-sensors/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/securing-distributed-storage-challenges-techniques-and-syste/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/securing-distributed-storage-challenges-techniques-and-syste/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/securing-distributed-storage-challenges-techniques-and-syste/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/strengthening-password-based-authentication-protocols-agains/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/strengthening-password-based-authentication-protocols-agains/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/strengthening-password-based-authentication-protocols-agains/</loc><lastmod>2005-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/a-new-id-based-signature-with-batch-verification/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/a-new-id-based-signature-with-batch-verification/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/a-new-id-based-signature-with-batch-verification/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/batch-verifications-with-id-based-signatures/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/batch-verifications-with-id-based-signatures/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/batch-verifications-with-id-based-signatures/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/design-and-implementation-of-a-secure-multi-agent-marketplac/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/design-and-implementation-of-a-secure-multi-agent-marketplac/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/design-and-implementation-of-a-secure-multi-agent-marketplac/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/group-key-agreement-efficient-in-communication/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/group-key-agreement-efficient-in-communication/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/group-key-agreement-efficient-in-communication/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/revisiting-random-key-pre-distribution-schemes-for-wireless-/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/revisiting-random-key-pre-distribution-schemes-for-wireless-/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/revisiting-random-key-pre-distribution-schemes-for-wireless-/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/secure-group-communication-using-robust-contributory-key-agr/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/secure-group-communication-using-robust-contributory-key-agr/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/secure-group-communication-using-robust-contributory-key-agr/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/timed-release-and-key-insulated-public-key-encryption/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/timed-release-and-key-insulated-public-key-encryption/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/tree-based-group-key-agreement/</loc><lastmod>2004-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/admission-control-in-peer-groups/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/admission-control-in-peer-groups/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/admission-control-in-peer-groups/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/an-efficient-tree-based-group-key-agreement-using-bilinear-m/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/an-efficient-tree-based-group-key-agreement-using-bilinear-m/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/an-efficient-tree-based-group-key-agreement-using-bilinear-m/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/decentralized-authentication-mechanisms-for-object-based-sto/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/decentralized-authentication-mechanisms-for-object-based-sto/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/decentralized-authentication-mechanisms-for-object-based-sto/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/secure-group-key-management-for-storage-area-networks/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/secure-group-key-management-for-storage-area-networks/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/secure-group-key-management-for-storage-area-networks/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/security-model-for-a-multi-agent-marketplace/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/security-model-for-a-multi-agent-marketplace/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/security-model-for-a-multi-agent-marketplace/</loc><lastmod>2003-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/on-the-performance-of-group-key-agreement-protocols/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/on-the-performance-of-group-key-agreement-protocols/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/on-the-performance-of-group-key-agreement-protocols/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/secure-group-services-for-storage-area-networks/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/secure-group-services-for-storage-area-networks/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/secure-group-services-for-storage-area-networks/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/tree-based-group-key-agreement/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/tree-based-group-key-agreement/</loc><lastmod>2002-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/communication-efficient-group-key-agreement/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/communication-efficient-group-key-agreement/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/communication-efficient-group-key-agreement/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/design-and-control-of-a-two-degree-of-freedom-haptic-device-/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/design-and-control-of-a-two-degree-of-freedom-haptic-device-/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/design-and-control-of-a-two-degree-of-freedom-haptic-device-/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/exploring-robustness-in-group-key-agreement/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/exploring-robustness-in-group-key-agreement/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/exploring-robustness-in-group-key-agreement/</loc><lastmod>2001-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/secure-group-communication-in-asynchronous-networks-with-fai/</loc><lastmod>2000-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/secure-group-communication-in-asynchronous-networks-with-fai/</loc><lastmod>2000-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/secure-group-communication-in-asynchronous-networks-with-fai/</loc><lastmod>2000-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/simple-and-fault-tolerant-key-agreement-for-dynamic-collabor/</loc><lastmod>2000-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/simple-and-fault-tolerant-key-agreement-for-dynamic-collabor/</loc><lastmod>2000-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/simple-and-fault-tolerant-key-agreement-for-dynamic-collabor/</loc><lastmod>2000-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.backup.20260103/on-the-design-of-a-stream-cipher-and-a-hash-function-suitabl/</loc><lastmod>1996-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications.old/on-the-design-of-a-stream-cipher-and-a-hash-function-suitabl/</loc><lastmod>1996-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/publications/on-the-design-of-a-stream-cipher-and-a-hash-function-suitabl/</loc><lastmod>1996-01-01T00:00:00+00:00</lastmod><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/formatting/button/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/formatting/callout/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/formatting/cards/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/contact/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/reference/i18n/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/reference/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/formatting/toggle/</loc><changefreq>weekly</changefreq></url><url><loc>https://yongdaek.github.io/courses/hugo-blox/guide/formatting/steps/</loc><changefreq>weekly</changefreq></url></urlset>