


default search action
22nd WISA 2021: Jeju Island, Korea
- Hyoungshick Kim

:
Information Security Applications - 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13009, Springer 2021, ISBN 978-3-030-89431-3
Machine Learning Security
- Jeongwoo Kim, Seoyeon Kang, Eun-Sun Cho, Joon-Young Paik:

LOM: Lightweight Classifier for Obfuscation Methods. 3-15 - Samuel De La Motte, Jin B. Hong

:
A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection. 16-27 - Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim:

Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks. 28-38 - Jeongseok Choi, Hyoungshick Kim:

On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks. 39-50 - Raymond Mogg, Simon Yusuf Enoch

, Dong Seong Kim
:
A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems. 51-63 - Chang-Bae Seo

, Gyuseop Lee
, Yeonjoon Lee
, Seung-Hyun Seo
:
Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments. 64-75 - Sungho Bae, Chanwoong Hwang, Taejin Lee:

Research on Improvement of Anomaly Detection Performance in Industrial Control Systems. 76-87
Cryptography
- Harashta Tatimma Larasati

, Howon Kim
:
Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem. 91-104 - Hyun Sook Rhee

, Dong Hoon Lee
:
Anonymous IBE from PEKS: A Generic Construction. 105-118 - Xin Liu

, Willy Susilo
, Joonsang Baek
:
Secure Computation of Shared Secrets and Its Applications. 119-131 - Jongkil Kim, Willy Susilo

, Yang-Wai Chow
, Joonsang Baek
, Intae Kim
:
Pattern Matching over Encrypted Data with a Short Ciphertext. 132-143 - KangHoon Lee, Ji Won Yoon:

Efficient Adaptation of TFHE for High End-to-End Throughput. 144-156 - Asep Muhamad Awaludin

, Derry Pratama
, Howon Kim
:
AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling. 157-168
Hardware Security
- Hyunjun Kim, Minjoo Sim, Siwoo Eum, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo

:
Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers. 171-182 - YuJin Kwak, YoungBeom Kim, Seog Chung Seo:

Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor. 183-193 - Hwajeong Seo

, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh:
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms. 194-205 - Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Siwoo Eum, Wai-Kong Lee, Hwajeong Seo

:
ARMed Frodo - FrodoKEM on 64-Bit ARMv8 Processors. 206-217 - Seokmin Lee, Taehun Kim, Youngjoo Shin:

Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks. 218-228
Application Security
- Priyatham Ganta, Kicho Yu

, Dharma Dheeraj Chintala, Younghee Park
:
Adaptive Network Security Service Orchestration Based on SDN/NFV. 231-242 - Jinghang Wen

, Jia-Nan Liu, Axin Wu, Jiasi Weng:
A General Framework for Matching Pattern Hiding in Deep Packet Inspection. 243-254 - Jane Kim

, Soojin Lee
, Seung-Hyun Seo
:
A Privacy-Preserving Payment Model for EV Charging. 255-264 - Mohammed Alkinoon, Sung J. Choi, David Mohaisen

:
Measuring Healthcare Data Breaches. 265-277 - Daehee Jang:

BadASLR: Exceptional Cases of ASLR Aiding Exploitation. 278-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














