default search action
18th WISA 2017: Jeju Island, Korea
- Brent ByungHoon Kang, Taesoo Kim:
Information Security Applications - 18th International Conference, WISA 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10763, Springer 2018, ISBN 978-3-319-93562-1
Attack and Defense I
- Hwajeong Seo, Taehwan Park, Janghyun Ji, Howon Kim:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited. 3-15 - Jong-Uk Hou, Han-Ul Jang, Jin-Seok Park, Heung-Kyu Lee:
Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks. 16-24 - Jong-Uk Hou, In-Jae Yu, Hyun-Ji Song, Heung-Kyu Lee:
Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Code. 25-35
Theory in Security
- Haoyu Li, Yanbin Pan:
The Search Successive Minima Problem Is Equivalent to Its Optimization Version. 39-50 - Jingguo Bi, Mingqiang Wang, Wei Wei:
An Improved Algorithm to Solve the Systems of Univariate Modular Equations. 51-60 - Mahdi Daghmehchi Firoozjaei, Sangmin Lee, Hyoungshick Kim:
O2TR: Offline Off-the-Record (OTR) Messaging. 61-71 - Hwajeong Seo, Taehwan Park, Janghyun Ji, Zhi Hu, Howon Kim:
ARM/NEON Co-design of Multiplication/Squaring. 72-84
Web Security and Emerging Technologies
- Joon Young Park, Jong Pil Yun, Dong Hoon Lee:
WheelLogger: Driver Tracing Using Smart Watch. 87-100 - Minsu Lee, Hyun-Gu Lee, Ji Sun Shin:
Evolution of Spamming Attacks on Facebook. 101-111
Systems Security and Authentication
- Saetbyeol Lee, Jiwon Yoon:
Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images. 115-126 - Jae Hyeon Woo, Moosung Park, Kyungho Lee:
Breaking Text CAPTCHA by Repeated Information. 127-136 - Jonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, Manpyo Hong:
Automatic Mitigation of Kernel Rootkits in Cloud Environments. 137-149 - Jungwoo Joh, Yezee Seo, Hoon-Kyu Kim, Taekyoung Kwon:
Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic Circuits. 150-161 - Kwon-Jin Yoon, Jaehyeon Yoon, Souhwan Jung:
Design and Implementation of Android Container Monitoring Server and Agent. 162-172 - Momoka Kasuya, Kazuo Sakiyama:
Improved EM Side-Channel Authentication Using Profile-Based XOR Model. 173-183 - Vanesco A. J. Boehm, Jong Kim, James Won-Ki Hong:
Holistic Tracking of Products on the Blockchain Using NFC and Verified Users. 184-195
Attack and Defense II and Network Security
- Son Duc Nguyen, Mamoru Mimura, Hidema Tanaka:
Abusing TCP Retransmission for DoS Attack Inside Virtual Network. 199-211 - Muhamad Erza Aminanto, Kwangjo Kim:
Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning. 212-223 - Mookyu Park, Moosung Park, Kyungho Lee:
Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident. 224-235 - Insu Oh, Kyungroul Lee, Kangbin Yim:
A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function. 236-245
Crypto Protocols
- Sha Ma, Yunhao Ling:
A General Two-Server Cryptosystem Supporting Complex Queries. 249-260 - Eito Miyamoto, Takeshi Sugawara, Kazuo Sakiyama:
Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678. 261-273 - Hyunki Kim, Jae-Hoon Lee, Okyeon Yi:
Key Managements of Underwater Acoustic Communication Environments. 274-282 - Taehwan Park, Hwajeong Seo, Garam Lee, Md. Al-Amin Khandaker, Yasuyuki Nogami, Howon Kim:
Parallel Implementations of SIMON and SPECK, Revisited. 283-294
Attact Detections and Legal Aspects
- Namsup Lee, Hyunsoo Yoon, Daeseon Choi:
Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network. 297-309 - Da Mi Hwang, In Seok Kim:
The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture. 310-322 - Keun Young Lee, Hun Yeong Kwon, Jong In Lim:
Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors. 323-335
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.