default search action
13th AsiaJCIS 2018: Guilin, China
- 13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7380-5
Session 1: Cyber Security
- Taewoong Kwon, Jungsuk Song, Sangsu Choi, Yunsoo Lee, Jinhak Park:
VISNU: A Novel Visualization Methodology of Security Events Optimized for a Centralized SOC. 1-7 - Mariko Fujimoto, Wataru Matsuda, Takuho Mitsunaga:
Protecting Struts 2 from OGNL Related Attacks by Using Servlet Filter. 8-14 - Hironori Imai, Akira Kanaoka:
Time Series Analysis of Copy-and-Paste Impact on Android Application Security. 15-22
Session 2: Cryptographic Protocols
- Hibiki Ono, Yoshifumi Manabe:
Efficient Card-Based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations. 23-28 - Yaqing Liao, Jing Zhou, Yang Yang, Ou Ruan:
An Efficient Oblivious Transfer Protocol with Access Control. 29-34 - Chun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, Jheng-Jia Huang:
Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem. 35-41
Session 3: Social Aspects
- Ming Xu, Yu Cheng, QiXin Yin:
Toward a Resilient System: The Inspiration from Information Security Management Appliance. 42-46 - Tatsuya Midorikawa, Akihiro Tachikawa, Akira Kanaoka:
Helping Johnny to Search: Encrypted Search on Webmail System. 47-53 - Junfeng Tian, Lizheng Xue, Hongyun Cai:
An Algorithm Based on Influence to Predict Invisible Relationship. 54-61 - Ji Hye Kim, Mee Yeon Kim, Heung Youl Youm:
Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial Sector. 62-68
Session 4: Low-Level Security
- Jing Ge, Yifan Xu, Ruiqian Liu, Enze Si, Ning Shang, An Wang:
Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY. 69-74 - Junfeng Tian, Yanwei Ma:
Load Balancing Method Based on a Performance and Power Ratio. 75-82 - Jingyuan Wang, Peidai Xie, Yongjun Wang, Zelin Rong:
A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use. 83-88
Session 5: Analyzing Malicious Activities
- Ryoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue:
Evaluating Disassembly-Code Based Similarity between IoT Malware Samples. 89-94 - Tomohiro Shigemoto, Shota Fujii, Ichiro Kuriama, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi:
Development of White List Based Autonomous Evolution of Defense System for RAT Malware. 95-101 - Yu Tsuda, Junji Nakazato, Yaichiro Takagi, Daisuke Inoue, Koji Nakao, Kenjiro Terada:
A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns. 102-108 - Hiroki Kuzuno, Shun Inagaki, Kenichi Magata:
Constructing a Complete Timeline of a Security Incident by Aggregating Reports. 109-115
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.