default search action
19th WISA 2018: Jeju Island, Korea
- Brent ByungHoon Kang, Jin Soo Jang:
Information Security Applications - 19th International Conference, WISA 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11402, Springer 2019, ISBN 978-3-030-17981-6
Short Papers
- Sanghak Lee, Sangwoo Ji, Jong Kim:
Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors. 3-15 - Trust Ratchasan, Rungrat Wiangsripanawan:
HapticPoints: The Extended PassPoints Graphical Password. 16-28 - Sooyeon Lee, Huy Kang Kim:
ADSaS: Comprehensive Real-Time Anomaly Detection System. 29-41 - Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi:
One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks. 42-54 - Yuki Nanjo, Md. Al-Amin Khandaker, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
Efficient Ate-Based Pairing over the Attractive Classes of BN Curves. 55-67 - SungCheol Kim, IeckChae Euom, ChangHyun Ha, JooHyoung Lee, BongNam Noh:
A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power Plant. 68-80 - Jong-Kwan Lee:
IP Address Mutation Scheme Using Vector Projection for Tactical Wireless Networks. 81-92 - Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim:
Parallel Implementations of CHAM. 93-104 - Joon Soo Yoo, Baek Kyung Song, Ji Won Yoon:
Logarithm Design on Encrypted Data with Bitwise Operation. 105-116 - Mitsuyoshi Imamura, Kazumasa Omote:
Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor. 117-128
Systems Security
- Jae-Yung Lee, Jae Hyuk Suk, Dong Hoon Lee:
VODKA: Virtualization Obfuscation Using Dynamic Key Approach. 131-145 - Saeyoung Oh, Jong Kim:
Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms. 146-158 - Kunwoo Kim, Jungduk Kim:
A Study on Analyzing Risk Scenarios About Vulnerabilities of Security Monitoring System: Focused on Information Leakage by Insider. 159-170
Analysis and Visualization of Threats
- Jina Hong, JinKi Lee, HyunKyu Lee, YoonHa Chang, KwangHo Choi, Sang Kil Cha:
AlertVision: Visualizing Security Alerts. 173-184 - Shinwoo Shim, Ji Won Yoon:
A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack. 185-196 - Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo:
Threat Modeling and Analysis of Voice Assistant Applications. 197-209
Applied Crypto
- Takumi Kobayashi, Keisuke Hakuta:
Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits. 213-228 - Hyeongcheol An, Rakyong Choi, Kwangjo Kim:
Blockchain-Based Decentralized Key Management System with Quantum Resistance. 229-240 - Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher. 241-252 - Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon:
Compact LEA and HIGHT Implementations on 8-Bit AVR and 16-Bit MSP Processors. 253-265
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.