


default search action
14th AsiaJCIS 2019: Kobe, Japan
- 14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019. IEEE 2019 
- Ryo Ito, Mamoru Mimura  : :
 Detecting Unknown Malware from ASCII Strings with Natural Language Processing Techniques. 1-8
- Bing-Kai Hong, Jr-Wei Huang, Tao Ban, Ryoichi Isawa, Shin-Ming Cheng  , Daisuke Inoue, Koji Nakao: , Daisuke Inoue, Koji Nakao:
 Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices. 9-15
- Nitesh Kumar, Subhasis Mukhopadhyay, Mugdha Gupta, Anand Handa, Sandeep K. Shukla: 
 Malware Classification using Early Stage Behavioral Analysis. 16-23
- Mamoru Mimura  , Yuya Suga: , Yuya Suga:
 Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset. 24-31
- Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji  : :
 String commitment scheme with low output locality. 32-39
- Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang: 
 Privacy and Integrity Protection of Metering Data in Smart Grid. 40-47
- Hiroki Sato, Mamoru Mimura  , Hidema Tanaka: , Hidema Tanaka:
 Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo. 48-55
- Katsunari Shishido, Atsuko Miyaji  : :
 Secure Online-Efficient Interval Test based on Empty-Set Check. 56-63
- Iksoo Shin, Yunsoo Choi, Taewoong Kwon, Hyeakro Lee, Jungsuk Song: 
 Platform Design and Implementation for Flexible Data Processing and Building ML Models of IDS Alerts. 64-71
- Chung-Yi Lin, Chun-Ying Huang  , Chia-Wei Tien: , Chia-Wei Tien:
 Boosting Fuzzing Performance with Differential Seed Scheduling. 72-79
- Shusuke Morimoto, Hajime Kawamukai, Kilho Shin: 
 Prediction of Crime Occurrence using Information Propagation Model and Gaussian Process. 80-87
- Bilhanan Silverajan, Petteri Vistiaho: 
 Enabling Cybersecurity Incident Reporting and Coordinated Handling for Maritime Sector. 88-95
- Masaru Takada, Yuki Osada, Masakatu Morii: 
 Counter Attack Against the Bus-Off Attack on CAN. 96-102
- Hiroki Inayoshi  , Shohei Kakei , Shohei Kakei , Eiji Takimoto , Eiji Takimoto , Koichi Mouri, Shoichi Saito: , Koichi Mouri, Shoichi Saito:
 Prevention of Data Leakage due to Implicit Information Flows in Android Applications. 103-110
- Yuki Ezawa, Makoto Takita, Yoshiaki Shiraishi, Shohei Kakei  , Masanori Hirotomo, Youji Fukuta, Masami Mohri, Masakatu Morii: , Masanori Hirotomo, Youji Fukuta, Masami Mohri, Masakatu Morii:
 Designing Authentication and Authorization System with Blockchain. 111-118
- Kuo-Lung Hung, Chih-Yu Yen: 
 Watermarking Technique Based on Harris-Laplace Feature Point Detector Capable of Resisting Geometric Attacks. 119-126
- Masanori Hirotomo, Haruka Ito, Youji Fukuta, Masami Mohri, Yoshiaki Shiraishi: 
 Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices. 127-133
- Zi-Yuan Liu  , Raylin Tso, Yi-Fan Tseng, Masahiro Mambo: , Raylin Tso, Yi-Fan Tseng, Masahiro Mambo:
 Signcryption from NTRU Lattices Without Random Oracles. 134-141
- Toshiki Tsuchida, Masanori Hirotomo, Haruka Ito, Makoto Takita, Yoshiaki Shiraishi, Kenta Nomura  , Masami Mohri, Youji Fukuta, Masakatu Morii: , Masami Mohri, Youji Fukuta, Masakatu Morii:
 A Signature Scheme Based on the Syndrome Decoding Problem Using LDPC Codes. 142-145
- Bingsen Wang, Zhuoran Zhang, Fangguo Zhang  : :
 Subliminal Channels in the Code-based Ring Signature Scheme. 146-150
- Po-Wen Chi, Pin-Hsin Hsiao: 
 Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services. 151-156
- Taku Sugai, Toshihiro Ohigashi  , Yoshio Kakizaki , Yoshio Kakizaki , Akira Kanaoka: , Akira Kanaoka:
 Password Strength Measurement without Password Disclosure. 157-164
- Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo: 
 Privacy Risk Evaluation of Re-Identification of Pseudonyms. 165-172

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














