


default search action
20th WISA 2019: Jeju Island, Korea
- Ilsun You

:
Information Security Applications - 20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11897, Springer 2020, ISBN 978-3-030-39302-1
Application and Game Security
- Kyung Ho Park, Eunjo Lee, Huy Kang Kim:

Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM. 3-13 - Jeongeun Seo

, Minhee Joo
, Kyungho Lee
:
Turn On the Lights: User Behavior in Game Environment Using CPTED. 14-24 - Yang-Wai Chow

, Willy Susilo
, Joonsang Baek
, Jongkil Kim
:
QR Code Watermarking for Digital Images. 25-37
Network Security and Blockchain
- Hyuntae Kim, Seongil Wi

, Hyunjoo Lee, Sooel Son:
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking. 41-54 - Goksel Simsek

, Hakan Bostan, Alper Kaan Sarica, Egemen Sarikaya, Alperen Keles, Pelin Angin, Hande Alemdar, Ertan Onur:
DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN. 55-66 - Gongxian Zeng, Meiqi He, Siu-Ming Yiu:

A Secure and Self-tallying E-voting System Based on Blockchain. 67-76
Cryptography
- SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:

An Extended CTRT for AES-256. 79-91 - Huy Quoc Le

, Dung Hoang Duong
, Willy Susilo
:
A Blind Ring Signature Based on the Short Integer Solution Problem. 92-111 - Jia-Ch'ng Loh

, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. 112-125 - Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama:

Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR. 126-140 - Hao-Tian Wu

, Yiu-ming Cheung
, Zhenwei Zhuang, Shaohua Tang:
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing. 141-154 - Miyeon Hong, Ji Won Yoon:

Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression. 155-166 - Gwangbae Choi, Serge Vaudenay:

Timed-Release Encryption with Master Time Bound Key. 167-179 - Sabyasachi Dutta

, Partha Sarathi Roy
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. 180-191 - SeongHan Shin:

Strengthened PAKE Protocols Secure Against Malicious Private Key Generator. 192-205 - Jongkil Kim

, Joonsang Baek
, Willy Susilo
, Yang-Wai Chow
:
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof. 206-216
Security With AI and Machine Learning
- Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse:

Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs). 219-233 - Hyun Kwon

, Hyunsoo Yoon, Ki-Woong Park:
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network. 234-246 - Sungyup Nam, Seungho Jeon, Jongsub Moon:

A New Password Cracking Model with Generative Adversarial Networks. 247-258 - Taehyuk Kim, Taek-Young Youn, Dooho Choi

:
Is It Possible to Hide My Key into Deep Neural Network? 259-272
IoT Security
- Sangjae Lee, Mi-Kyung Oh, Yousung Kang, Dooho Choi

:
RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices. 275-285 - Sara Nieves Matheu

, Salvador Pérez, José Luis Hernández-Ramos
, Antonio F. Skarmeta:
On the Automation of Security Testing for IoT Constrained Scenarios. 286-298 - Jeman Park

, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla:
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments. 299-312
Hardware Security
- Hwajeong Seo, Hyeokdong Kwon, Yongbeen Kwon, Kyungho Kim, Seungju Choi, Hyunjun Kim, Kyoungbae Jang:

Ring-LWE on 8-Bit AVR Embedded Processor. 315-327 - Youngjoo Ko, Sangwoo Ji, Jong Kim:

Low-Noise LLC Side-Channel Attack with Perf. 328-340 - Hwajeong Seo, Amir Jalali, Reza Azarderakhsh:

Optimized SIKE Round 2 on 64-bit ARM. 341-353
Selected Security Issues
- Jinhee Lee, Younggee Hong, Hyunsoo Kwon, Junbeom Hur:

Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea. 357-369 - Minkyung Park

, Jeongnyeo Kim, Youngho Kim, Eunsang Cho
, Soobin Park, Sungmin Sohn, Minhyeok Kang, Ted "Taekyoung" Kwon:
An SGX-Based Key Management Framework for Data Centric Networking. 370-382

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














