default search action
20th WISA 2019: Jeju Island, Korea
- Ilsun You:
Information Security Applications - 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11897, Springer 2020, ISBN 978-3-030-39302-1
Application and Game Security
- Kyung Ho Park, Eunjo Lee, Huy Kang Kim:
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM. 3-13 - Jeongeun Seo, Minhee Joo, Kyungho Lee:
Turn On the Lights: User Behavior in Game Environment Using CPTED. 14-24 - Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim:
QR Code Watermarking for Digital Images. 25-37
Network Security and Blockchain
- Hyuntae Kim, Seongil Wi, Hyunjoo Lee, Sooel Son:
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking. 41-54 - Goksel Simsek, Hakan Bostan, Alper Kaan Sarica, Egemen Sarikaya, Alperen Keles, Pelin Angin, Hande Alemdar, Ertan Onur:
DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN. 55-66 - Gongxian Zeng, Meiqi He, Siu-Ming Yiu:
A Secure and Self-tallying E-voting System Based on Blockchain. 67-76
Cryptography
- SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:
An Extended CTRT for AES-256. 79-91 - Huy Quoc Le, Dung Hoang Duong, Willy Susilo:
A Blind Ring Signature Based on the Short Integer Solution Problem. 92-111 - Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. 112-125 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:
Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR. 126-140 - Hao-Tian Wu, Yiu-ming Cheung, Zhenwei Zhuang, Shaohua Tang:
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing. 141-154 - Miyeon Hong, Ji Won Yoon:
Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression. 155-166 - Gwangbae Choi, Serge Vaudenay:
Timed-Release Encryption with Master Time Bound Key. 167-179 - Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. 180-191 - SeongHan Shin:
Strengthened PAKE Protocols Secure Against Malicious Private Key Generator. 192-205 - Jongkil Kim, Joonsang Baek, Willy Susilo, Yang-Wai Chow:
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof. 206-216
Security With AI and Machine Learning
- Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse:
Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs). 219-233 - Hyun Kwon, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. 234-246 - Sungyup Nam, Seungho Jeon, Jongsub Moon:
A New Password Cracking Model with Generative Adversarial Networks. 247-258 - Taehyuk Kim, Taek-Young Youn, Dooho Choi:
Is It Possible to Hide My Key into Deep Neural Network? 259-272
IoT Security
- Sangjae Lee, Mi-Kyung Oh, Yousung Kang, Dooho Choi:
RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices. 275-285 - Sara Nieves Matheu, Salvador Pérez, José Luis Hernández Ramos, Antonio F. Skarmeta:
On the Automation of Security Testing for IoT Constrained Scenarios. 286-298 - Jeman Park, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla:
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments. 299-312
Hardware Security
- Hwajeong Seo, Hyeokdong Kwon, Yongbeen Kwon, Kyungho Kim, Seungju Choi, Hyunjun Kim, Kyoungbae Jang:
Ring-LWE on 8-Bit AVR Embedded Processor. 315-327 - Youngjoo Ko, Sangwoo Ji, Jong Kim:
Low-Noise LLC Side-Channel Attack with Perf. 328-340 - Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:
Optimized SIKE Round 2 on 64-bit ARM. 341-353
Selected Security Issues
- Jinhee Lee, Younggee Hong, Hyunsoo Kwon, Junbeom Hur:
Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea. 357-369 - Minkyung Park, Jeongnyeo Kim, Youngho Kim, Eunsang Cho, Soobin Park, Sungmin Sohn, Minhyeok Kang, Ted "Taekyoung" Kwon:
An SGX-Based Key Management Framework for Data Centric Networking. 370-382
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.