default search action
Search dblp for Publications
export results for "stream:conf/asiajcis:"
@inproceedings{DBLP:conf/asiajcis/ChenHCLO24, author = {Chia{-}Mei Chen and Chi{-}Hsuen Hsu and Zheng{-}Xun Cai and Gu{-}Hsin Lai and Ya{-}Hui Ou}, title = {Improving the Performance of IIoT Intrusion Detection System Using Hybrid Synthetic Data}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {62--68}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00020}, doi = {10.1109/ASIAJCIS64263.2024.00020}, timestamp = {Fri, 08 Nov 2024 11:38:39 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenHCLO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChuangCW24, author = {Yun{-}Hsin Chuang and Po{-}Wen Chi and Ming{-}Hung Wang}, title = {{CCADM:} {A} Continuous Collection Scheme for Anonymous Data Management}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {69--74}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00021}, doi = {10.1109/ASIAJCIS64263.2024.00021}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChuangCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Das24, author = {Abhilash Das}, title = {Bit-Based {MILP} Modelling of Non-Bit-Permutation Linear Layers for Linear Cryptanalysis}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00012}, doi = {10.1109/ASIAJCIS64263.2024.00012}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Das24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/DingLYLJL24, author = {Yong Ding and Zhi Li and Changsong Yang and Hai Liang and Siyuan Jia and Zhenyu Li}, title = {Linear Retention Convolutional Network for Few-Shot Network Threat Detection}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {75--82}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00022}, doi = {10.1109/ASIAJCIS64263.2024.00022}, timestamp = {Tue, 07 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/DingLYLJL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FeiXTLPG24, author = {Chao Fei and Nian Xia and Pang{-}Wei Tsai and Yang Lu and Xiaonan Pan and Junli Gong}, title = {An Effective Feature Selection Algorithm for Machine Learning-based Malicious Traffic Detection}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {1--8}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00024}, doi = {10.1109/ASIAJCIS64263.2024.00024}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FeiXTLPG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FujimotoY0M24, author = {Akira Fujimoto and Shintaro Yamashita and Yuntao Wang and Atsuko Miyaji}, title = {Backdoored-input Detection by Trigger Embedding}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {121--128}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00028}, doi = {10.1109/ASIAJCIS64263.2024.00028}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FujimotoY0M24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HayashidaM24, author = {Kodai Hayashida and Atsuko Miyaji}, title = {Pairing Based Multisignature with Message Flexibility}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {113--120}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00027}, doi = {10.1109/ASIAJCIS64263.2024.00027}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HayashidaM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsuLTCH24, author = {Hao{-}Yi Hsu and Hsin{-}Yi Lin and Raylin Tso and Tao{-}Hsiang Chang and Jen{-}Chieh Hsu}, title = {Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authenticated Key Exchange Protocol Using Bi-ISIS}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {9--16}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00013}, doi = {10.1109/ASIAJCIS64263.2024.00013}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HsuLTCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ImuraE24, author = {Yuto Imura and Keita Emura}, title = {An Identity Management System Using Group Signatures with Message-Dependent Opening}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {40--47}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00017}, doi = {10.1109/ASIAJCIS64263.2024.00017}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ImuraE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IppaOH24, author = {Shuhei Ippa and Takao Okubo and Masaki Hashimoto}, title = {The Reality and Feature Analysis of Information Diffusion in Japanese Disinformation Examples}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {137--142}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00030}, doi = {10.1109/ASIAJCIS64263.2024.00030}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/IppaOH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiangCL24, author = {Min{-}Yu Liang and Yun{-}Chieh Chang and Jason Lin}, title = {Color Image Steganography with Authentication via Scalable Index Encoding}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {143--150}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00031}, doi = {10.1109/ASIAJCIS64263.2024.00031}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiangCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LinB24, author = {Iuon{-}Chang Lin and Ling Bo}, title = {A Pull Firmware Update Mechanism for Industrial Control Based on {IOTA} Streams}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {56--61}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00019}, doi = {10.1109/ASIAJCIS64263.2024.00019}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LinB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LinC24, author = {Yu Chi Lin and Po{-}Wen Chi}, title = {Adaptive Machine Learning Model for Dynamic Field Selection}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {151--156}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00032}, doi = {10.1109/ASIAJCIS64263.2024.00032}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LinC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MbowR0S24, author = {Mariama Mbow and Rodrigo Roman and Takeshi Takahashi and Kouichi Sakurai}, title = {Evading IoT Intrusion Detection Systems with {GAN}}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {48--55}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00018}, doi = {10.1109/ASIAJCIS64263.2024.00018}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MbowR0S24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MinetaMM24, author = {Toshiyuki Mineta and Atsuko Miyaji and Hideaki Miyaji}, title = {Proposal for Key-Value Commitments with Offline Batch Update}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {129--136}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00029}, doi = {10.1109/ASIAJCIS64263.2024.00029}, timestamp = {Sat, 30 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MinetaMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ParkYJY24, author = {Junhyung Park and Gunsang You and Yeontae Ji and Heung Youl Youm}, title = {Security Requirements for Fully Automated {AI} Systems to Exercise and Ensure the Rights of Data Subjects}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {107--112}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00026}, doi = {10.1109/ASIAJCIS64263.2024.00026}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ParkYJY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/PhingCCW24, author = {Kenneth Ong Kuan Phing and Bo Yu Chen and Po{-}Wen Chi and Chao Wang}, title = {A Study of Fully Homomorphic Encryption with Evaluation Control}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {17--24}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00014}, doi = {10.1109/ASIAJCIS64263.2024.00014}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/PhingCCW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsengHCWC24, author = {Yi{-}Fan Tseng and Jheng{-}Jia Huang and Guan{-}Yu Chen and Wei{-}Hsueh Wang and Yu{-}Hsuan Chang}, title = {Pairing-Free Identity-Based Encryption with Security Against the {KGC}}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {83--90}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00023}, doi = {10.1109/ASIAJCIS64263.2024.00023}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsengHCWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsengTSLC24, author = {Yi{-}Fan Tseng and Raylin Tso and Shi{-}Sheng Sun and Zi{-}Yuan Liu and You{-}Qian Chen}, title = {ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {33--39}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00016}, doi = {10.1109/ASIAJCIS64263.2024.00016}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsengTSLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YamadaOM24, author = {Rintaro Yamada and Shinya Okumura and Atsuko Miyaji}, title = {Consideration on Defining Field for Efficient Ring-LWE}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {25--32}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00015}, doi = {10.1109/ASIAJCIS64263.2024.00015}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YamadaOM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YuB24, author = {Tianshu Yu and Kunpeng Bai}, title = {Secure and Portable Anonymous Credentials without Tamper-Resistant Hardware}, booktitle = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, pages = {99--106}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024.00025}, doi = {10.1109/ASIAJCIS64263.2024.00025}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YuB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2024, title = {19th Asia Joint Conference on Information Security, AsiaJCIS 2024, Tainan, Taiwan, August 13-14, 2024}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/AsiaJCIS64263.2024}, doi = {10.1109/ASIAJCIS64263.2024}, isbn = {979-8-3503-8014-9}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HagiwaraO23, author = {Kenta Hagiwara and Kazumasa Omote}, title = {{VMI} System with Smart Contracts for Demand Forecasting}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {1--8}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00012}, doi = {10.1109/ASIAJCIS60284.2023.00012}, timestamp = {Mon, 22 Jan 2024 19:57:57 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HagiwaraO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HongXCG23, author = {Sheng{-}Yi Hong and Rui{-}Zhen Xu and Po{-}Wen Chi and Albert Guan}, title = {Privacy Preserving Provable Data Possession: {A} FHE-based Hash Approach}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {47--52}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00018}, doi = {10.1109/ASIAJCIS60284.2023.00018}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HongXCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HuangWTCCDL23, author = {Jheng{-}Jia Huang and Wei{-}Hsueh Wang and Yi{-}Fan Tseng and Guan{-}Yu Chen and Hao{-}Hsiang Chang Chien and Wen{-}Yan Dai and Nai{-}Wei Lo}, title = {Anonymous and Unlinkable Identity Scheme in Open Data Environment}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {73--80}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00022}, doi = {10.1109/ASIAJCIS60284.2023.00022}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HuangWTCCDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HyeonPY23, author = {Da Eun Hyeon and Junhyung Park and Heung Youl Youm}, title = {A secure firmware and software update model based on blockchains for Internet of Things devices using {SBOM}}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {53--58}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00019}, doi = {10.1109/ASIAJCIS60284.2023.00019}, timestamp = {Fri, 08 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HyeonPY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KawaharaMM23, author = {Naoki Kawahara and Atsuko Miyaji and Tomoaki Mimoto}, title = {Privacy-Preserving Frequency Estimation Method}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {102--108}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00026}, doi = {10.1109/ASIAJCIS60284.2023.00026}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KawaharaMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KawanakaKMIHBTT23, author = {Shota Kawanaka and Yoshikatsu Kashiwabara and Kohei Miyamoto and Masazumi Iida and Chansu Han and Tao Ban and Takeshi Takahashi and Jun'ichi Takeuchi}, title = {Packet-Level Intrusion Detection Using {LSTM} Focusing on Personal Information and Payloads}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {88--94}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00024}, doi = {10.1109/ASIAJCIS60284.2023.00024}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KawanakaKMIHBTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LinHL23, author = {Iuon{-}Chang Lin and Jing{-}Yuan Huang and Jason Lin}, title = {A Certificate Management Mechanism Using Distributed Ledger}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {66--72}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00021}, doi = {10.1109/ASIAJCIS60284.2023.00021}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LinHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MyungKKLKS23, author = {Joonwoo Myung and Youngmin Ko and Taewoong Kwon and Jun Lee and Kyuil Kim and Jung{-}suk Song}, title = {Intrusion Detection Systems Based on Machine Learning Using Feature Expansion Methods}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {32--38}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00016}, doi = {10.1109/ASIAJCIS60284.2023.00016}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MyungKKLKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NagaiM23, author = {Atsuki Nagai and Atsuko Miyaji}, title = {Revisited linear approximation formula of ChaCha}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {95--101}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00025}, doi = {10.1109/ASIAJCIS60284.2023.00025}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NagaiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NishihiraIKOWKA23, author = {Yuma Nishihira and Takuya Ishibashi and Yoshio Kakizaki and Toshihiro Ohigashi and Hidenobu Watanabe and Tohru Kondo and Reiji Aibara}, title = {Development of the Edge Computing Platform based on Modular Architecture using Intel {SGX}}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {59--65}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00020}, doi = {10.1109/ASIAJCIS60284.2023.00020}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/NishihiraIKOWKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Peng23, author = {Kun Peng}, title = {Receipt-Freeness By Flexible Usage Of Mix Network}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {9--16}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00013}, doi = {10.1109/ASIAJCIS60284.2023.00013}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Peng23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsengHCWLCK23, author = {Yi{-}Fan Tseng and Jheng{-}Jia Huang and Guan{-}Yu Chen and Wei{-}Hsueh Wang and Yi{-}Hsueh Lu and Wen{-}Yi Chen and Shih{-}Pei Kao}, title = {A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {25--31}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00015}, doi = {10.1109/ASIAJCIS60284.2023.00015}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsengHCWLCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WenWDLYL23, author = {Baodong Wen and Yujue Wang and Yong Ding and Hai Liang and Changsong Yang and Decun Luo}, title = {Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {39--46}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00017}, doi = {10.1109/ASIAJCIS60284.2023.00017}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WenWDLYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WuKY23, author = {Che{-}Yu Wu and Cheng{-}Chung Kuo and Chu{-}Sing Yang}, title = {Phishing Detection with Browser Extension Based on Machine Learning}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {81--87}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00023}, doi = {10.1109/ASIAJCIS60284.2023.00023}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WuKY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/XuHCW23, author = {Rui{-}Zhen Xu and Sheng{-}Yi Hong and Po{-}Wen Chi and Ming{-}Hung Wang}, title = {A Revocation Key-based Approach Towards Efficient Federated Unlearning}, booktitle = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, pages = {17--24}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023.00014}, doi = {10.1109/ASIAJCIS60284.2023.00014}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/XuHCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2023, title = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023, Koganei, Japan, August 15-16, 2023}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/AsiaJCIS60284.2023}, doi = {10.1109/ASIAJCIS60284.2023}, isbn = {979-8-3503-4163-8}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/DingITL22, author = {Yong Ding and Ryoichi Isawa and Raylin Tso and Jun Lee}, title = {Message from the Program Co-Chairs: AsiaJCIS 2022}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {viii}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00006}, doi = {10.1109/ASIAJCIS57030.2022.00006}, timestamp = {Tue, 04 Apr 2023 15:43:16 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/DingITL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/DuJL22, author = {Ruizhong Du and Haoyu Jiang and Mingyue Li}, title = {Lightweight Searchable Encryption with Small Clients on Edge Cloud}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {41--48}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00017}, doi = {10.1109/ASIAJCIS57030.2022.00017}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/DuJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IsawaKFTUAMMI22, author = {Ryoichi Isawa and Nobuyuki Kanaya and Yoshitada Fujiwara and Tatsuya Takehisa and Hayato Ushimaru and Dai Arisue and Daisuke Makita and Satoshi Mimura and Daisuke Inoue}, title = {An {HDL} Simulator with Direct Register Access for Improving Code Coverage}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {49--55}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00018}, doi = {10.1109/ASIAJCIS57030.2022.00018}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/IsawaKFTUAMMI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimK22, author = {Yongsik Kim and Huy Kang Kim}, title = {Bot-pelganger: Predict and Preserve Game Bots' Behavior}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {56--63}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00019}, doi = {10.1109/ASIAJCIS57030.2022.00019}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KimK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MaenoMM22, author = {Yuta Maeno and Atsuko Miyaji and Hideaki Miyaji}, title = {Lattice-Based Accumulator with Efficient Updating}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {33--40}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00016}, doi = {10.1109/ASIAJCIS57030.2022.00016}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/MaenoMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NdichuBTI22, author = {Samuel Ndichu and Tao Ban and Takeshi Takahashi and Daisuke Inoue}, title = {Security-Alert Screening with Oversampling Based on Conditional Generative Adversarial Networks}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00011}, doi = {10.1109/ASIAJCIS57030.2022.00011}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NdichuBTI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/PeiNYF22, author = {Dingyi Pei and Koji Nakao and Heung Youl Youm and Chun{-}I Fan}, title = {Message from the General Co-Chairs: AsiaJCIS 2022}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {vii}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00005}, doi = {10.1109/ASIAJCIS57030.2022.00005}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/PeiNYF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsengHYCW22, author = {Yi{-}Fan Tseng and Jheng{-}Jia Huang and Hao{-}Yu Yang and Tsung{-}Yu Chien and Chieh{-}Han Wu}, title = {Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {24--28}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00014}, doi = {10.1109/ASIAJCIS57030.2022.00014}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/TsengHYCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsengYWCTLH22, author = {Yi{-}Fan Tseng and Hao{-}Yu Yang and Chieh{-}Han Wu and Tsung{-}Yu Chien and Raylin Tso and Zi{-}Yuan Liu and Jen{-}Chieh Hsu}, title = {Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based Encryption}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {29--32}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00015}, doi = {10.1109/ASIAJCIS57030.2022.00015}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/TsengYWCTLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YanoKM22, author = {Tomohiko Yano and Hiroki Kuzuno and Kenichi Magata}, title = {Constructing a Network Graph of File Tracking Results Against Information Leakage}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {8--15}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00012}, doi = {10.1109/ASIAJCIS57030.2022.00012}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/YanoKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YasuiISTYM22, author = {Hiroki Yasui and Takahiro Inoue and Takayuki Sasaki and Rui Tanabe and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {{SPOT:} Analyzing IoT Ransomware Attacks using Bare Metal {NAS} Devices}, booktitle = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, pages = {16--23}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022.00013}, doi = {10.1109/ASIAJCIS57030.2022.00013}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/YasuiISTYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2022, title = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022, Baoding, China, July 15-16, 2022}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/AsiaJCIS57030.2022}, doi = {10.1109/ASIAJCIS57030.2022}, isbn = {978-1-6654-7392-7}, timestamp = {Tue, 04 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenO21, author = {Zhaoheng Chen and Kazumasa Omote}, title = {A Privacy Preserving Scheme with Dimensionality Reduction for Distributed Machine Learning}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {45--50}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00017}, doi = {10.1109/ASIAJCIS53848.2021.00017}, timestamp = {Thu, 14 Oct 2021 16:38:35 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChoiLKKCS21, author = {Ikje Choi and Jun Lee and Taewoong Kwon and Kyuil Kim and Yoonsu Choi and Jungsuk Song}, title = {An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection for In-situ Monitoring}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00011}, doi = {10.1109/ASIAJCIS53848.2021.00011}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChoiLKKCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FujitaniEO21, author = {Tomoki Fujitani and Keita Emura and Kazumasa Omote}, title = {A Privacy-Preserving Enforced Bill Collection System using Smart Contracts}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {51--60}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00018}, doi = {10.1109/ASIAJCIS53848.2021.00018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/FujitaniEO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IshibashiGHBTT21, author = {Ryosuke Ishibashi and Hiroki Goto and Chansu Han and Tao Ban and Takeshi Takahashi and Jun'ichi Takeuchi}, title = {Which Packet Did They Catch? Associating {NIDS} Alerts with Their Communication Sessions}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {9--16}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00012}, doi = {10.1109/ASIAJCIS53848.2021.00012}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/IshibashiGHBTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ShakeelK21, author = {Nabeel Shakeel and Nadeem Kafi Khan}, title = {A framework to protect National Cyber Borders in peace and war}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {17--22}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00013}, doi = {10.1109/ASIAJCIS53848.2021.00013}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ShakeelK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ShibayamaK21, author = {Rina Shibayama and Hiroaki Kikuchi}, title = {Vulnerability Exploiting {SMS} Push Notifications}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {23--30}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00014}, doi = {10.1109/ASIAJCIS53848.2021.00014}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ShibayamaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsengH21, author = {Yi{-}Fan Tseng and Jheng{-}Jia Huang}, title = {Identity-Based Signature from Quadratic Residues and Its Extension to ID-Based Multi-Signature}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {31--36}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00015}, doi = {10.1109/ASIAJCIS53848.2021.00015}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/TsengH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WengC21, author = {Jui{-}Hung Weng and Po{-}Wen Chi}, title = {Multi-Level Privacy Preserving K-Anonymity}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {61--67}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00019}, doi = {10.1109/ASIAJCIS53848.2021.00019}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/WengC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YangTLHT21, author = {Chih{-}Chen Yang and Raylin Tso and Zi{-}Yuan Liu and Jen{-}Chieh Hsu and Yi{-}Fan Tseng}, title = {Improved Proxy Re-encryption Scheme with Equality Test}, booktitle = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, pages = {37--44}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021.00016}, doi = {10.1109/ASIAJCIS53848.2021.00016}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YangTLHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2021, title = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021, Seoul, Republic of Korea, August 19-20, 2021}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/AsiaJCIS53848.2021}, doi = {10.1109/ASIAJCIS53848.2021}, isbn = {978-1-6654-1788-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenCL20, author = {Chia{-}Mei Chen and Tien{-}Ho Chang and Gu Hsin Lai}, title = {The Empirical Study of Passwords Analysis in Access Point with Specific-Rules and Graphic Process Units}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {115--120}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00029}, doi = {10.1109/ASIAJCIS50894.2020.00029}, timestamp = {Tue, 22 Sep 2020 10:17:08 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChuangLS20, author = {Yun{-}Hsin Chuang and Chin{-}Laung Lei and Hung{-}Jr Shiu}, title = {Cryptanalysis of Four Biometric Based Authentication Schemes with Privacy-preserving for Multi-server Environment and Design Guidelines}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {66--73}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00022}, doi = {10.1109/ASIAJCIS50894.2020.00022}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChuangLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FanTH20, author = {Chun{-}I Fan and Yi{-}Fan Tseng and Yen{-}Lin Huang}, title = {Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {9--15}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00014}, doi = {10.1109/ASIAJCIS50894.2020.00014}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/FanTH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FukumitsuH20, author = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Linear Lossy Identification Scheme derives Tightly-Secure Multisignature}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {24--31}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00016}, doi = {10.1109/ASIAJCIS50894.2020.00016}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/FukumitsuH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HougaardM20, author = {Hector B. Hougaard and Atsuko Miyaji}, title = {{SIT:} Supersingular Isogeny Tree-based Group Key Exchange}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {46--53}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00019}, doi = {10.1109/ASIAJCIS50894.2020.00019}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/HougaardM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsuL20, author = {Chien{-}Lung Hsu and Tuan{-}Vinh Le}, title = {A Time Bound Dynamic Group key Distribution Scheme with Anonymous Three-factor Identification for IoT-Based Multi-Server Environments}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {59--65}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00021}, doi = {10.1109/ASIAJCIS50894.2020.00021}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HsuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsuLTC20, author = {Hsiang{-}Chen Hsu and Zi{-}Yuan Liu and Raylin Tso and Kung Chen}, title = {Multi-value Private Information Retrieval using Homomorphic Encryption}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {82--88}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00024}, doi = {10.1109/ASIAJCIS50894.2020.00024}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HsuLTC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsuWFSB0WK20, author = {Ruei{-}Hau Hsu and Yi{-}Cheng Wang and Chun{-}I Fan and Bo Sun and Tao Ban and Takeshi Takahashi and Ting{-}Wei Wu and Shang{-}Wei Kao}, title = {A Privacy-Preserving Federated Learning System for Android Malware Detection Based on Edge Computing}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {128--136}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00031}, doi = {10.1109/ASIAJCIS50894.2020.00031}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/HsuWFSB0WK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/JivanyanM20, author = {Aram Jivanyan and Tigran Mamikonyan}, title = {Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {74--81}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00023}, doi = {10.1109/ASIAJCIS50894.2020.00023}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/JivanyanM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimK20, author = {Younghwan Kim and Huy Kang Kim}, title = {Anomaly Detection using Clustered Deep One-Class Classification}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {151--157}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00034}, doi = {10.1109/ASIAJCIS50894.2020.00034}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KimK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuoKWH20, author = {Wen{-}Chung Kuo and Wan{-}Hsuan Kao and Chun{-}Cheng Wang and Yu{-}Chih Huang}, title = {3D-Playfair Encrypted Message Verification Technology based on {MD5}}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {110--114}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00028}, doi = {10.1109/ASIAJCIS50894.2020.00028}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KuoKWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MiyajiN20, author = {Atsuko Miyaji and Yoshitaka Nagao}, title = {Privacy Preserving Data Integration Protocol}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {89--96}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00025}, doi = {10.1109/ASIAJCIS50894.2020.00025}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/MiyajiN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NaganumaSYTKK20, author = {Ken Naganuma and Takayuki Suzuki and Masayuki Yoshino and Kenta Takahashi and Yosuke Kaga and Noboru Kunihiro}, title = {New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {54--58}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00020}, doi = {10.1109/ASIAJCIS50894.2020.00020}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NaganumaSYTKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NaganumaYIMOK20, author = {Ken Naganuma and Masayuki Yoshino and Atsuo Inoue and Yukinori Matsuoka and Mineaki Okazaki and Noboru Kunihiro}, title = {Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {32--39}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00017}, doi = {10.1109/ASIAJCIS50894.2020.00017}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NaganumaYIMOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NishikawaYHWUHI20, author = {Hiroki Nishikawa and Takumi Yamamoto and Bret A. Harsham and Ye Wang and Kota Uehara and Chiori Hori and Aiko Iwasaki and Kiyoto Kawauchi and Masakatsu Nishigaki}, title = {Analysis of Malicious Email Detection using Cialdini's Principles}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {137--142}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00032}, doi = {10.1109/ASIAJCIS50894.2020.00032}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NishikawaYHWUHI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsaiHL20, author = {Meng{-}Hsuan Tsai and Yu{-}Cheng Hsu and Nai{-}Wei Lo}, title = {An Efficient Blockchain-based Firmware Update Framework for IoT Environment}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {121--127}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00030}, doi = {10.1109/ASIAJCIS50894.2020.00030}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/TsaiHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsengLT20, author = {Yi{-}Fan Tseng and Zi{-}Yuan Liu and Raylin Tso}, title = {A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {1--8}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00013}, doi = {10.1109/ASIAJCIS50894.2020.00013}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsengLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WanBLCI0I20, author = {Tzu{-}Ling Wan and Tao Ban and Yen{-}Ting Lee and Shin{-}Ming Cheng and Ryoichi Isawa and Takeshi Takahashi and Daisuke Inoue}, title = {IoT-Malware Detection Based on Byte Sequences of Executable Files}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {143--150}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00033}, doi = {10.1109/ASIAJCIS50894.2020.00033}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/WanBLCI0I20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangHTT20, author = {Peter Shaojui Wang and Pin{-}Yen Huang and Yu{-}An Tsai and Raylin Tso}, title = {An Enhanced Mondrian Anonymization Model based on Self-Organizing Map}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {97--100}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00026}, doi = {10.1109/ASIAJCIS50894.2020.00026}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/WangHTT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangM20, author = {Chih{-}Hung Wang and Guo{-}Cyuan Mao}, title = {Secure and flexible algorithm for outsourcing of bilinear pairings effectively resisting conspiracy}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {40--45}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00018}, doi = {10.1109/ASIAJCIS50894.2020.00018}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/WangM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YamaguchiGKTIY20, author = {Shuji Yamaguchi and Hidehito Gomi and Ryosuke Kobayashi and Tran Phuong Thao and Mhd Irvan and Rie Shigetomi Yamaguchi}, title = {Effective Classification for Multi-modal Behavioral Authentication on Large-Scale Data}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {101--109}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00027}, doi = {10.1109/ASIAJCIS50894.2020.00027}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/YamaguchiGKTIY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YoshinoNKS20, author = {Masayuki Yoshino and Ken Naganuma and Noboru Kunihiro and Hisayoshi Sato}, title = {Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {16--23}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00015}, doi = {10.1109/ASIAJCIS50894.2020.00015}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/YoshinoNKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2020, title = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/xpl/conhome/9186508/proceeding}, isbn = {978-1-7281-9922-1}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/0005WWZW19, author = {Yong Ding and Bingyao Wang and Yujue Wang and Kun Zhang and Huiyong Wang}, title = {Privacy and Integrity Protection of Metering Data in Smart Grid}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {40--47}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-7}, doi = {10.1109/ASIAJCIS.2019.000-7}, timestamp = {Tue, 22 Sep 2020 10:23:08 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/0005WWZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChiH19, author = {Po{-}Wen Chi and Pin{-}Hsin Hsiao}, title = {Learnable Audio Encryption for Untrusted Outsourcing Machine Learning Services}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {151--156}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00012}, doi = {10.1109/ASIAJCIS.2019.00012}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ChiH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/EzawaTSKHFMM19, author = {Yuki Ezawa and Makoto Takita and Yoshiaki Shiraishi and Shohei Kakei and Masanori Hirotomo and Youji Fukuta and Masami Mohri and Masakatu Morii}, title = {Designing Authentication and Authorization System with Blockchain}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {111--118}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00006}, doi = {10.1109/ASIAJCIS.2019.00006}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/EzawaTSKHFMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HirotomoIFMS19, author = {Masanori Hirotomo and Haruka Ito and Youji Fukuta and Masami Mohri and Yoshiaki Shiraishi}, title = {Identification Scheme Based on the Binary Syndrome Decoding Problem Using High-Density Parity-Check Matrices}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {127--133}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00008}, doi = {10.1109/ASIAJCIS.2019.00008}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/HirotomoIFMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HongHBICIN19, author = {Bing{-}Kai Hong and Jr{-}Wei Huang and Tao Ban and Ryoichi Isawa and Shin{-}Ming Cheng and Daisuke Inoue and Koji Nakao}, title = {Measurement Study Towards a Unified Firmware Updating Scheme for Legacy IoT Devices}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {9--15}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00-11}, doi = {10.1109/ASIAJCIS.2019.00-11}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/HongHBICIN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HungY19, author = {Kuo{-}Lung Hung and Chih{-}Yu Yen}, title = {Watermarking Technique Based on Harris-Laplace Feature Point Detector Capable of Resisting Geometric Attacks}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {119--126}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00007}, doi = {10.1109/ASIAJCIS.2019.00007}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/HungY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/InayoshiKTMS19, author = {Hiroki Inayoshi and Shohei Kakei and Eiji Takimoto and Koichi Mouri and Shoichi Saito}, title = {Prevention of Data Leakage due to Implicit Information Flows in Android Applications}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {103--110}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00005}, doi = {10.1109/ASIAJCIS.2019.00005}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/InayoshiKTMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ItoM19, author = {Ryo Ito and Mamoru Mimura}, title = {Detecting Unknown Malware from {ASCII} Strings with Natural Language Processing Techniques}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00-12}, doi = {10.1109/ASIAJCIS.2019.00-12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ItoM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KumarMGHS19, author = {Nitesh Kumar and Subhasis Mukhopadhyay and Mugdha Gupta and Anand Handa and Sandeep K. Shukla}, title = {Malware Classification using Early Stage Behavioral Analysis}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {16--23}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00-10}, doi = {10.1109/ASIAJCIS.2019.00-10}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KumarMGHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LinHT19, author = {Chung{-}Yi Lin and Chun{-}Ying Huang and Chia{-}Wei Tien}, title = {Boosting Fuzzing Performance with Differential Seed Scheduling}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {72--79}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-3}, doi = {10.1109/ASIAJCIS.2019.000-3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/LinHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiuTTM19, author = {Zi{-}Yuan Liu and Raylin Tso and Yi{-}Fan Tseng and Masahiro Mambo}, title = {Signcryption from {NTRU} Lattices Without Random Oracles}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {134--141}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00009}, doi = {10.1109/ASIAJCIS.2019.00009}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiuTTM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MimuraS19, author = {Mamoru Mimura and Yuya Suga}, title = {Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced Dataset}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {24--31}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-9}, doi = {10.1109/ASIAJCIS.2019.000-9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/MimuraS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MiyajiKM19, author = {Hideaki Miyaji and Akinori Kawachi and Atsuko Miyaji}, title = {String commitment scheme with low output locality}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {32--39}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-8}, doi = {10.1109/ASIAJCIS.2019.000-8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/MiyajiKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MorimotoKS19, author = {Shusuke Morimoto and Hajime Kawamukai and Kilho Shin}, title = {Prediction of Crime Occurrence using Information Propagation Model and Gaussian Process}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {80--87}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-2}, doi = {10.1109/ASIAJCIS.2019.000-2}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/MorimotoKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SatoMT19, author = {Hiroki Sato and Mamoru Mimura and Hidema Tanaka}, title = {Analysis of Division Property using {MILP} Method for Lightweight Blockcipher Piccolo}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {48--55}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-6}, doi = {10.1109/ASIAJCIS.2019.000-6}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/SatoMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ShinCKLS19, author = {Iksoo Shin and Yunsoo Choi and Taewoong Kwon and Hyeakro Lee and Jungsuk Song}, title = {Platform Design and Implementation for Flexible Data Processing and Building {ML} Models of {IDS} Alerts}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {64--71}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-4}, doi = {10.1109/ASIAJCIS.2019.000-4}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ShinCKLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ShishidoM19, author = {Katsunari Shishido and Atsuko Miyaji}, title = {Secure Online-Efficient Interval Test based on Empty-Set Check}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {56--63}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-5}, doi = {10.1109/ASIAJCIS.2019.000-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ShishidoM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SilverajanV19, author = {Bilhanan Silverajan and Petteri Vistiaho}, title = {Enabling Cybersecurity Incident Reporting and Coordinated Handling for Maritime Sector}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {88--95}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.000-1}, doi = {10.1109/ASIAJCIS.2019.000-1}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/SilverajanV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SugaiOKK19, author = {Taku Sugai and Toshihiro Ohigashi and Yoshio Kakizaki and Akira Kanaoka}, title = {Password Strength Measurement without Password Disclosure}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {157--164}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00013}, doi = {10.1109/ASIAJCIS.2019.00013}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/SugaiOKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TakadaOM19, author = {Masaru Takada and Yuki Osada and Masakatu Morii}, title = {Counter Attack Against the Bus-Off Attack on {CAN}}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {96--102}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00004}, doi = {10.1109/ASIAJCIS.2019.00004}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/TakadaOM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TakeuchiKFM19, author = {Yuma Takeuchi and Shogo Kitajima and Kazuya Fukushima and Masahiro Mambo}, title = {Privacy Risk Evaluation of Re-Identification of Pseudonyms}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {165--172}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00014}, doi = {10.1109/ASIAJCIS.2019.00014}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/TakeuchiKFM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsuchidaHITSNMF19, author = {Toshiki Tsuchida and Masanori Hirotomo and Haruka Ito and Makoto Takita and Yoshiaki Shiraishi and Kenta Nomura and Masami Mohri and Youji Fukuta and Masakatu Morii}, title = {A Signature Scheme Based on the Syndrome Decoding Problem Using {LDPC} Codes}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {142--145}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00010}, doi = {10.1109/ASIAJCIS.2019.00010}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsuchidaHITSNMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangZZ19, author = {Bingsen Wang and Zhuoran Zhang and Fangguo Zhang}, title = {Subliminal Channels in the Code-based Ring Signature Scheme}, booktitle = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, pages = {146--150}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/AsiaJCIS.2019.00011}, doi = {10.1109/ASIAJCIS.2019.00011}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2019, title = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/8797685/proceeding}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FanTEH18, author = {Chun{-}I Fan and Yi{-}Fan Tseng and Cheng{-}Yuan E and Jheng{-}Jia Huang}, title = {Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {35--41}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00015}, doi = {10.1109/ASIAJCIS.2018.00015}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FanTEH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FujimotoMM18, author = {Mariko Fujimoto and Wataru Matsuda and Takuho Mitsunaga}, title = {Protecting Struts 2 from {OGNL} Related Attacks by Using Servlet Filter}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {8--14}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00011}, doi = {10.1109/ASIAJCIS.2018.00011}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/FujimotoMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GeXLSSW18, author = {Jing Ge and Yifan Xu and Ruiqian Liu and Enze Si and Ning Shang and An Wang}, title = {Power Attack and Protected Implementation on Lightweight Block Cipher {SKINNY}}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00020}, doi = {10.1109/ASIAJCIS.2018.00020}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/GeXLSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ImaiK18, author = {Hironori Imai and Akira Kanaoka}, title = {Time Series Analysis of Copy-and-Paste Impact on Android Application Security}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00012}, doi = {10.1109/ASIAJCIS.2018.00012}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ImaiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IsawaBTYI18, author = {Ryoichi Isawa and Tao Ban and Ying Tie and Katsunari Yoshioka and Daisuke Inoue}, title = {Evaluating Disassembly-Code Based Similarity between IoT Malware Samples}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {89--94}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00023}, doi = {10.1109/ASIAJCIS.2018.00023}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/IsawaBTYI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimKY18, author = {Ji Hye Kim and Mee Yeon Kim and Heung Youl Youm}, title = {Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial Sector}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {62--68}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00019}, doi = {10.1109/ASIAJCIS.2018.00019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KimKY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuzunoIM18, author = {Hiroki Kuzuno and Shun Inagaki and Kenichi Magata}, title = {Constructing a Complete Timeline of a Security Incident by Aggregating Reports}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {109--115}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00026}, doi = {10.1109/ASIAJCIS.2018.00026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuzunoIM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KwonSCLP18, author = {Taewoong Kwon and Jungsuk Song and Sangsu Choi and Yunsoo Lee and Jinhak Park}, title = {{VISNU:} {A} Novel Visualization Methodology of Security Events Optimized for a Centralized {SOC}}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00010}, doi = {10.1109/ASIAJCIS.2018.00010}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KwonSCLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiaoZYR18, author = {Yaqing Liao and Jing Zhou and Yang Yang and Ou Ruan}, title = {An Efficient Oblivious Transfer Protocol with Access Control}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {29--34}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00014}, doi = {10.1109/ASIAJCIS.2018.00014}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiaoZYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MidorikawaTK18, author = {Tatsuya Midorikawa and Akihiro Tachikawa and Akira Kanaoka}, title = {Helping Johnny to Search: Encrypted Search on Webmail System}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00017}, doi = {10.1109/ASIAJCIS.2018.00017}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MidorikawaTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/OnoM18, author = {Hibiki Ono and Yoshifumi Manabe}, title = {Efficient Card-Based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {23--28}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00013}, doi = {10.1109/ASIAJCIS.2018.00013}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/OnoM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ShigemotoFKKNFK18, author = {Tomohiro Shigemoto and Shota Fujii and Ichiro Kuriama and Tetsuro Kito and Hirofumi Nakakoji and Yasuhiro Fujii and Hiroaki Kikuchi}, title = {Development of White List Based Autonomous Evolution of Defense System for {RAT} Malware}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {95--101}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00024}, doi = {10.1109/ASIAJCIS.2018.00024}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ShigemotoFKKNFK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TianM18, author = {Junfeng Tian and Yanwei Ma}, title = {Load Balancing Method Based on a Performance and Power Ratio}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00021}, doi = {10.1109/ASIAJCIS.2018.00021}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TianM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TianXC18, author = {Junfeng Tian and Lizheng Xue and Hongyun Cai}, title = {An Algorithm Based on Influence to Predict Invisible Relationship}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {54--61}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00018}, doi = {10.1109/ASIAJCIS.2018.00018}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TianXC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsudaNTINT18, author = {Yu Tsuda and Junji Nakazato and Yaichiro Takagi and Daisuke Inoue and Koji Nakao and Kenjiro Terada}, title = {A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {102--108}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00025}, doi = {10.1109/ASIAJCIS.2018.00025}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsudaNTINT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangXWR18, author = {Jingyuan Wang and Peidai Xie and Yongjun Wang and Zelin Rong}, title = {A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {83--88}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00022}, doi = {10.1109/ASIAJCIS.2018.00022}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangXWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/XuCY18, author = {Ming Xu and Yu Cheng and QiXin Yin}, title = {Toward a Resilient System: The Inspiration from Information Security Management Appliance}, booktitle = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, pages = {42--46}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/AsiaJCIS.2018.00016}, doi = {10.1109/ASIAJCIS.2018.00016}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/XuCY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2018, title = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8453224/proceeding}, isbn = {978-1-5386-7380-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/AndoOK17, author = {Masahito Ando and Masayuki Okada and Akira Kanaoka}, title = {Simulation Study of {BGP} Origin Validation Effect against Mis-Origination with Internet Topology}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.17}, doi = {10.1109/ASIAJCIS.2017.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/AndoOK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Chang17, author = {Hung{-}Chang Chang}, title = {Based on Standard Descriptors and Dynamic Key Features to Detect Malicious {USB} Storage Devices in {APT}}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {65--68}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.22}, doi = {10.1109/ASIAJCIS.2017.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Chang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenLL17, author = {Chia{-}Mei Chen and Gu Hsin Lai and Je{-}Ming Lin}, title = {Identifying Threat Patterns of Android Applications}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.23}, doi = {10.1109/ASIAJCIS.2017.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GuanZCL17, author = {D. J. Guan and Er{-}Shuo Zhuang and I. C. Chung and Yu{-}Shen Lin}, title = {Performance Analysis of Some Batch Verification Methods of Digital Signatures}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {10--14}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.14}, doi = {10.1109/ASIAJCIS.2017.14}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/GuanZCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HirotomoNKFMS17, author = {Masanori Hirotomo and Yuya Nishio and Masaki Kamizono and Youji Fukuta and Masami Mohri and Yoshiaki Shiraishi}, title = {Efficient Method for Analyzing Malicious Websites by Using Multi-Environment Analysis System}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {48--54}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.21}, doi = {10.1109/ASIAJCIS.2017.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HirotomoNKFMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LeeCCS17, author = {Younsu Lee and Sang{-}Soo Choi and Jangwon Choi and Jungsuk Song}, title = {A Lightweight Malware Classification Method Based on Detection Results of Anti-Virus Software}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {5--9}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.20}, doi = {10.1109/ASIAJCIS.2017.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LeeCCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MimuraOTT17, author = {Mamoru Mimura and Yuhei Otsubo and Hidehiko Tanaka and Hidema Tanaka}, title = {A Practical Experiment of the HTTP-Based {RAT} Detection Method in Proxy Server Logs}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {31--37}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.13}, doi = {10.1109/ASIAJCIS.2017.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MimuraOTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NdibwileKF17, author = {Jema David Ndibwile and Youki Kadobayashi and Doudou Fall}, title = {UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation through an Android Mobile App}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {38--47}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.19}, doi = {10.1109/ASIAJCIS.2017.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/NdibwileKF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SakumotoK17, author = {Soushirou Sakumoto and Akira Kanaoka}, title = {Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure Multi-Party Computation}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {15--22}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.18}, doi = {10.1109/ASIAJCIS.2017.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/SakumotoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TamaPR17, author = {Bayu Adhi Tama and Akash Suresh Patil and Kyung Hyune Rhee}, title = {An Improved Model of Anomaly Detection Using Two-Level Classifier Ensemble}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {1--4}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.9}, doi = {10.1109/ASIAJCIS.2017.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TamaPR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YangL17, author = {Ling Yang and Xianhui Lu}, title = {An Efficient Dispersal Storage Scheme Based on Ring-LWE and {NTT}}, booktitle = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, pages = {23--30}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/AsiaJCIS.2017.12}, doi = {10.1109/ASIAJCIS.2017.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YangL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2017, title = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017, Seoul, South Korea, August 10-11, 2017}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://ieeexplore.ieee.org/xpl/conhome/8025185/proceeding}, isbn = {978-1-5386-2132-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/AhujaMS16, author = {Rohit Ahuja and Sraban Kumar Mohanty and Kouichi Sakurai}, title = {An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {39--47}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.23}, doi = {10.1109/ASIAJCIS.2016.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/AhujaMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/BanTGIN16, author = {Tao Ban and Takeshi Takahashi and Shanqing Guo and Daisuke Inoue and Koji Nakao}, title = {Integration of Multi-modal Features for Android Malware Detection Using Linear {SVM}}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {141--146}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.29}, doi = {10.1109/ASIAJCIS.2016.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/BanTGIN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/BarkaHS16, author = {Ezedin Barka and Nedaa Al Hussien and Khaled Shuaib}, title = {Securing Smart Meters Data for {AMI} Using {RBAC}}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.16}, doi = {10.1109/ASIAJCIS.2016.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/BarkaHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenLY16, author = {Chia{-}Mei Chen and Gu Hsin Lai and Pong{-}Yu Young}, title = {Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly Detection}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {74--79}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.18}, doi = {10.1109/ASIAJCIS.2016.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenLY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenT16, author = {Shang{-}Wen Chen and Raylin Tso}, title = {NFC-based Mobile Payment Protocol with User Anonymity}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {24--30}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.30}, doi = {10.1109/ASIAJCIS.2016.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChiWLGLH16, author = {Po{-}Wen Chi and Ming{-}Hung Wang and Che{-}Wei Lin and Jing{-}Wei Guo and Chin{-}Laung Lei and Nen{-}Fu Huang}, title = {SDNort: {A} Software Defined Network Testing Framework Using Openflow}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {100--107}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.12}, doi = {10.1109/ASIAJCIS.2016.12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ChiWLGLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GaoFKS16, author = {Yuxuan Gao and Yaokai Feng and Junpei Kawamoto and Kouichi Sakurai}, title = {A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {80--86}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.24}, doi = {10.1109/ASIAJCIS.2016.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/GaoFKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/IsawaMI16, author = {Ryoichi Isawa and Masakatu Morii and Daisuke Inoue}, title = {Comparing Malware Samples for Unpacking: {A} Feasibility Study}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {155--160}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.28}, doi = {10.1109/ASIAJCIS.2016.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/IsawaMI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KikuchiYMF16, author = {Hiroaki Kikuchi and Hideo Yasunaga and Hiroki Matsui and Chun{-}I Fan}, title = {Efficient Privacy-Preserving Logistic Regression with Iteratively Re-weighted Least Squares}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {48--54}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.21}, doi = {10.1109/ASIAJCIS.2016.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KikuchiYMF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuoLWWH16, author = {Wen{-}Chung Kuo and Jyun{-}Jia Li and Chun{-}Cheng Wang and Lih{-}Chyau Wuu and Yu{-}Chih Huang}, title = {An Improvement Data Hiding Scheme Based on Formula Fully Exploiting Modification Directions and Pixel Value Differencing Method}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {136--140}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.20}, doi = {10.1109/ASIAJCIS.2016.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuoLWWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MimuraOT16, author = {Mamoru Mimura and Yuhei Otsubo and Hidehiko Tanaka}, title = {Evaluation of a Brute Forcing Tool that Extracts the {RAT} from a Malicious Document File}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {147--154}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.17}, doi = {10.1109/ASIAJCIS.2016.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MimuraOT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NurmiKV16, author = {Juha Nurmi and Joona Kannisto and Markku Vajaranta}, title = {Observing Hidden Service Directory Spying with a Private Hidden Service Honeynet}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {55--59}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.31}, doi = {10.1109/ASIAJCIS.2016.31}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NurmiKV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ParkCS16, author = {Jinhak Park and Jang Won Choi and Jung{-}suk Song}, title = {How to Design Practical Client Honeypots Based on Virtual Environment}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {67--73}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.19}, doi = {10.1109/ASIAJCIS.2016.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ParkCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SaitoTYM16, author = {Satomi Saito and Satoru Torii and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Wamber: Defending Web Sites on Hosting Services with Self-Learning Honeypots}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {60--66}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.32}, doi = {10.1109/ASIAJCIS.2016.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/SaitoTYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ShimaD16, author = {Koji Shima and Hiroshi Doi}, title = {(\{1, 3\}, n) Hierarchical Secret Sharing Scheme Based on {XOR} Operations for a Small Number of Indispensable Participants}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {108--114}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.11}, doi = {10.1109/ASIAJCIS.2016.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ShimaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SilverajanVK16, author = {Bilhanan Silverajan and Markku Vajaranta and Antti Kolehmainen}, title = {Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {9--16}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.10}, doi = {10.1109/ASIAJCIS.2016.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/SilverajanVK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TamaR16, author = {Bayu Adhi Tama and Kyung Hyune Rhee}, title = {Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of {IDS} in Wireless Network}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {87--91}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.13}, doi = {10.1109/ASIAJCIS.2016.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TamaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/VajarantaKH16, author = {Markku Vajaranta and Joona Kannisto and Jarmo Harju}, title = {Implementation Experiences and Design Challenges for Resilient {SDN} Based Secure {WAN} Overlays}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {17--23}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.25}, doi = {10.1109/ASIAJCIS.2016.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/VajarantaKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/VannetK16, author = {Thomas Vannet and Noboru Kunihiro}, title = {Partial Server Side Parameter Selection in Private Information Retrieval}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.27}, doi = {10.1109/ASIAJCIS.2016.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/VannetK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangW16, author = {Chih{-}Hung Wang and Chien{-}Ming Wang}, title = {Novel Design of Fair Exchange Protocol for Semi-trusted Server and Its Application in Cloud Environment}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {130--135}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.22}, doi = {10.1109/ASIAJCIS.2016.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WatanabeTM16, author = {Yuhei Watanabe and Yosuke Todo and Masakatu Morii}, title = {New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {115--123}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.26}, doi = {10.1109/ASIAJCIS.2016.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WatanabeTM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YehHP16, author = {Jia{-}Rung Yeh and Hsu{-}Chun Hsiao and Ai{-}Chun Pang}, title = {Migrant Attack: {A} Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {92--99}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.14}, doi = {10.1109/ASIAJCIS.2016.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YehHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2016, title = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7781470/proceeding}, isbn = {978-1-5090-2285-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/AdachiO15, author = {Takashi Adachi and Kazumasa Omote}, title = {An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {145--151}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.17}, doi = {10.1109/ASIAJCIS.2015.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/AdachiO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/BaekY15, author = {Jonghyun Baek and Heung Youl Youm}, title = {Secure and Lightweight Authentication Protocol for {NFC} Tag Based Services}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {63--68}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.35}, doi = {10.1109/ASIAJCIS.2015.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/BaekY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChangLC15, author = {Chin{-}Chen Chang and Iuon{-}Chang Lin and Yi{-}Lun Chi}, title = {Secure Electronic Coupons}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {104--109}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.10}, doi = {10.1109/ASIAJCIS.2015.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChangLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenC15, author = {Chia{-}Mei Chen and Tien{-}Ho Chang}, title = {The Cryptanalysis of {WPA} {\&} {WPA2} in the Rule-Based Brute Force Attack, an Advanced and Efficient Method}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {37--41}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.14}, doi = {10.1109/ASIAJCIS.2015.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Chien15, author = {Hung{-}Yu Chien}, title = {De-synchronization Attack on Quadratic Residues-Based {RFID} Ownership Transfer}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {42--47}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.13}, doi = {10.1109/ASIAJCIS.2015.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Chien15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FanHH15, author = {Chun{-}I Fan and Shi{-}Yuan Huang and Wen{-}Che Hsu}, title = {Encrypted Data Deduplication in Cloud Storage}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {18--25}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.12}, doi = {10.1109/ASIAJCIS.2015.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FanHH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FanWCTF15, author = {Chun{-}I Fan and Chien{-}Nan Wu and Chun{-}Hung Chen and Yi{-}Fan Tseng and Cheng{-}Chun Feng}, title = {Attribute-Based Proxy Re-encryption with Dynamic Membership}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {26--32}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.21}, doi = {10.1109/ASIAJCIS.2015.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FanWCTF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FengHS15, author = {Yaokai Feng and Yoshiaki Hori and Kouichi Sakurai}, title = {A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {152--159}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.22}, doi = {10.1109/ASIAJCIS.2015.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FengHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsiehSLW15, author = {Chih{-}Hung Hsieh and Yu{-}Siang Shen and Chao{-}Wen Li and Jain{-}Shing Wu}, title = {iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised Malicious Activity Monitoring}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {130--137}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.19}, doi = {10.1109/ASIAJCIS.2015.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HsiehSLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsuL15, author = {Chien{-}Lung Hsu and Tzu{-}Wei Lin}, title = {Privacy-Preserved Key Agreement with User Authentication}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {12--17}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.18}, doi = {10.1109/ASIAJCIS.2015.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HsuL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HsuLC15, author = {Chen{-}Ming Hsu and Jen{-}Chun Lee and Wei{-}Kuei Chen}, title = {An Efficient Detection Algorithm for Copy-Move Forgery}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {33--36}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.16}, doi = {10.1109/ASIAJCIS.2015.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HsuLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HuangJF15, author = {Jheng{-}Jia Huang and Wen{-}Shenq Juang and Chun{-}I Fan}, title = {A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {91--96}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.20}, doi = {10.1109/ASIAJCIS.2015.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HuangJF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KawaguchiO15, author = {Naoto Kawaguchi and Kazumasa Omote}, title = {Malware Function Classification Using APIs in Initial Behavior}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {138--144}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.15}, doi = {10.1109/ASIAJCIS.2015.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KawaguchiO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KikuchiHY15, author = {Hiroaki Kikuchi and Hideki Hashimoto and Hideo Yasunaga}, title = {Privacy-Preserving Epidemiological Analysis for a Distributed Database of Hospitals}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {85--90}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.31}, doi = {10.1109/ASIAJCIS.2015.31}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/KikuchiHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KimK15, author = {Hakju Kim and Kwangjo Kim}, title = {Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {110--111}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.24}, doi = {10.1109/ASIAJCIS.2015.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KimK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KitajimaYNHO15, author = {Nobuaki Kitajima and Naoto Yanai and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Constructions of Fail-Stop Signatures for Multi-signer Setting}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {112--123}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.26}, doi = {10.1109/ASIAJCIS.2015.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KitajimaYNHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KosugiHM15, author = {Tomoaki Kosugi and Tomoki Hayafuji and Masahiro Mambo}, title = {On the Traceability of the Accountable Anonymous Channel}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {6--11}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.29}, doi = {10.1109/ASIAJCIS.2015.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KosugiHM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuoWCC15, author = {Wen{-}Chung Kuo and Hong{-}Ji Wei and Yu{-}Hui Chen and Jiin{-}Chiou Cheng}, title = {An Enhanced Secure Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.11}, doi = {10.1109/ASIAJCIS.2015.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuoWCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiuGKO15, author = {Yu Liu and Nasato Goto and Akira Kanaoka and Eiji Okamoto}, title = {Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party Computation}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {77--84}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.32}, doi = {10.1109/ASIAJCIS.2015.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiuGKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LoCH15, author = {Nai{-}Wei Lo and Meng{-}Chih Chiang and Chao Yang Hsu}, title = {Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {55--62}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.27}, doi = {10.1109/ASIAJCIS.2015.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LoCH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LoYH15, author = {Nai{-}Wei Lo and Chi{-}Kai Yu and Chao Yang Hsu}, title = {Intelligent Display Auto-Lock Scheme for Mobile Devices}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {48--54}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.30}, doi = {10.1109/ASIAJCIS.2015.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LoYH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/RuanTHLL15, author = {He{-}Ming Ruan and Ming{-}Hwa Tsai and Yennun Huang and Yen{-}Hua Liao and Chin{-}Laung Lei}, title = {Discovery of De-identification Policies Considering Re-identification Risks and Information Loss}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.23}, doi = {10.1109/ASIAJCIS.2015.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/RuanTHLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TingHWL15, author = {Pei{-}Yih Ting and Shao{-}Da Huang and Tzong{-}Sun Wu and Han{-}Yu Lin}, title = {A Provable Watermark-Based Copyright Protection Scheme}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {124--129}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.28}, doi = {10.1109/ASIAJCIS.2015.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TingHWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangS15, author = {Chih Hung Wang and Hsiao Chien Sung}, title = {Delegation-Based Roaming Payment Protocol with Location and Purchasing Privacy Protection}, booktitle = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, pages = {97--103}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AsiaJCIS.2015.25}, doi = {10.1109/ASIAJCIS.2015.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2015, title = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015, Kaohsiung City, Taiwan, May 24-26, 2015}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://ieeexplore.ieee.org/xpl/conhome/7153314/proceeding}, isbn = {978-1-4799-1989-5}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FanSHJH14, author = {Chun{-}I Fan and Wei{-}Zhe Sun and Shih{-}Wei Huang and Wen{-}Shenq Juang and Jheng{-}Jia Huang}, title = {Strongly Privacy-Preserving Communication Protocol for VANETs}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.24}, doi = {10.1109/ASIAJCIS.2014.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FanSHJH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FanWHTC14, author = {Chun{-}I Fan and Chien{-}Nan Wu and Jen{-}Chun Hsu and Yi{-}Fan Tseng and Wen{-}Tsuen Chen}, title = {Anonymous Credential Scheme Supporting Active Revocation}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {127--132}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.17}, doi = {10.1109/ASIAJCIS.2014.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FanWHTC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FurutaniBNSKO14, author = {Nobuaki Furutani and Tao Ban and Junji Nakazato and Jumpei Shimamura and Jun Kitazono and Seiichi Ozawa}, title = {Detection of DDoS Backscatter Based on Traffic Features of Darknet {TCP} Packets}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {39--43}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.23}, doi = {10.1109/ASIAJCIS.2014.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FurutaniBNSKO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GotoKOO14, author = {Nasato Goto and Akira Kanaoka and Masayuki Okada and Eiji Okamoto}, title = {{METRO:} Measurement of End-to-End Route Trust}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.16}, doi = {10.1109/ASIAJCIS.2014.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/GotoKOO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GuanC14, author = {D. J. Guan and Yu{-}Shan Cheng}, title = {Parity Detection for Some Three-Modulus Residue Number System}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {76--81}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.13}, doi = {10.1109/ASIAJCIS.2014.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/GuanC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HuangC14, author = {Teng Yu Huang and Hung{-}Yu Chien}, title = {Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {141--147}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.31}, doi = {10.1109/ASIAJCIS.2014.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HuangC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HuangKY14, author = {Yu{-}Chih Huang and Wen{-}Chung Kuo and Ching{-}Nung Yang}, title = {Data Hiding Based on Radix-2}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {170--174}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.22}, doi = {10.1109/ASIAJCIS.2014.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HuangKY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KikuchiIUYO14, author = {Hiroaki Kikuchi and Kouichi Itoh and Mebae Ushida and Yuji Yamaoka and Takanori Oikawa}, title = {Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {164--169}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.33}, doi = {10.1109/ASIAJCIS.2014.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KikuchiIUYO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Kim14, author = {Jihong Kim}, title = {On the False Positive Rate of the Bloom Filter in Case of Using Multiple Hash Functions}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {26--30}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.32}, doi = {10.1109/ASIAJCIS.2014.32}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuriharaK14, author = {Keiichirou Kurihara and Kazuki Katagishi}, title = {A Simple Detection Method for DoS Attacks Based on {IP} Packets Entropy Values}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {44--51}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.20}, doi = {10.1109/ASIAJCIS.2014.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuriharaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuzunoM14, author = {Hiroki Kuzuno and Kenichi Magata}, title = {Detecting Advertisement Module Network Behavior with Graph Modeling}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.26}, doi = {10.1109/ASIAJCIS.2014.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuzunoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiLZ14, author = {Juanjuan Li and Zhenhua Liu and Longhui Zu}, title = {Chosen-Ciphertext Secure Multi-use Unidirectional Attribute-Based Proxy Re-Encryptions}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {96--103}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.15}, doi = {10.1109/ASIAJCIS.2014.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LinLLC14, author = {Chu{-}Hsing Lin and Jung{-}Chun Liu and Cheng{-}Chieh Li and Po{-}Wei Chu}, title = {Parallel Modulus Operations in {RSA} Encryption by {CPU/GPU} Hybrid Computation}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {71--75}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.25}, doi = {10.1109/ASIAJCIS.2014.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LinLLC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiuYL14, author = {Zengguang Liu and Xiaochun Yin and Hoonjae Lee}, title = {An Efficient Defense Scheme against {SIP} DoS Attack in {SDN} Using Cloud {SFW}}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {52--55}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.12}, doi = {10.1109/ASIAJCIS.2014.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiuYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MatsumotoS14, author = {Shinichi Matsumoto and Kouichi Sakurai}, title = {Acquisition of Evidence of Web Storage in {HTML5} Web Browsers from Memory Image}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {148--155}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.30}, doi = {10.1109/ASIAJCIS.2014.30}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MatsumotoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MatsunakaKK14, author = {Takashi Matsunaka and Ayumu Kubota and Takahiro Kasama}, title = {An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {19--25}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.21}, doi = {10.1109/ASIAJCIS.2014.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MatsunakaKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MiyajiRS14, author = {Atsuko Miyaji and Mazumder Rashed and Tsuyoshi Sawada}, title = {A New (n, n) Blockcipher Hash Function: Apposite for Short Messages}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {56--63}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.27}, doi = {10.1109/ASIAJCIS.2014.27}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/MiyajiRS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/PengRZC14, author = {Shengbo Peng and Ou Ruan and Jing Zhou and Zaixing Chen}, title = {A New Identity-Based Authentication Scheme for {SIP}}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {90--95}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.14}, doi = {10.1109/ASIAJCIS.2014.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/PengRZC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/QiuHL14, author = {Junjie Qiu and Gi{-}Hyun Hwang and Hoonjae Lee}, title = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {104--110}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.11}, doi = {10.1109/ASIAJCIS.2014.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/QiuHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/RenL14, author = {Si{-}Wei Ren and Ke{-}Wei Lu}, title = {Bit Security for Lucas-Based One-Way Function}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {111--118}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.9}, doi = {10.1109/ASIAJCIS.2014.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/RenL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/RuanL14, author = {He{-}Ming Ruan and Chin{-}Laung Lei}, title = {Fine-Grained Audit Privilege Control for Integrity Audit on Cloud Storage}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {156--163}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.28}, doi = {10.1109/ASIAJCIS.2014.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/RuanL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangFKHS14, author = {Can Wang and Yaokai Feng and Junpei Kawamoto and Yoshiaki Hori and Kouichi Sakurai}, title = {A Parameterless Learning Algorithm for Behavior-Based Detection}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {11--18}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.29}, doi = {10.1109/ASIAJCIS.2014.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangFKHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangX14, author = {Yufeng Wang and Jing Xu}, title = {Overview on Privacy-Preserving Profile-Matching Mechanisms in Mobile Social Networks in Proximity {(MSNP)}}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {133--140}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.18}, doi = {10.1109/ASIAJCIS.2014.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YuanHGQ14, author = {Yuheng Yuan and Zhenzhong He and Zheng Gong and Weidong Qiu}, title = {Acceleration of {AES} Encryption with OpenCL}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {64--70}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.19}, doi = {10.1109/ASIAJCIS.2014.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YuanHGQ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Zhou14, author = {Caixue Zhou}, title = {Provably Secure and Efficient Multi-receiver Identity-Based Generalized Signcryption Scheme}, booktitle = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, pages = {82--88}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AsiaJCIS.2014.10}, doi = {10.1109/ASIAJCIS.2014.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Zhou14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2014, title = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/7001440/proceeding}, isbn = {978-1-4799-5733-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/BanIGIN13, author = {Tao Ban and Ryoichi Isawa and Shanqing Guo and Daisuke Inoue and Koji Nakao}, title = {Efficient Malware Packer Identification Using Support Vector Machines with Spectrum Kernel}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {69--76}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.18}, doi = {10.1109/ASIAJCIS.2013.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/BanIGIN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChangCLHW13, author = {Ya{-}Ting Chang and Min{-}Ju Chung and Chin{-}Feng Lee and Cheng{-}Ta Huang and Shiuh{-}Jeng Wang}, title = {Memory Forensics for Key Evidence Investigations in Case Illustrations}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {96--101}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.22}, doi = {10.1109/ASIAJCIS.2013.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChangCLHW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenHLW13, author = {Kung Chen and Tsan{-}sheng Hsu and Churn{-}Jung Liau and Da{-}Wei Wang}, title = {A Scripting Language for Automating Secure Multiparty Computation}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {127--134}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.27}, doi = {10.1109/ASIAJCIS.2013.27}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenHLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenTY13, author = {Chung{-}Nan Chen and Raylin Tso and Chung{-}Huang Yang}, title = {Design and Implementation of Digital Forensic Software for iPhone}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {90--95}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.21}, doi = {10.1109/ASIAJCIS.2013.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Chien13, author = {Hung Yu Chien}, title = {Cryptanalysis on {RFID} Authentications Using Minimum Disclosure Approach}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {33--40}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.13}, doi = {10.1109/ASIAJCIS.2013.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Chien13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChinBHP13, author = {Ji{-}Jian Chin and Rouzbeh Behnia and Swee{-}Huay Heng and Raphael Chung{-}Wei Phan}, title = {An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {27--32}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.12}, doi = {10.1109/ASIAJCIS.2013.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChinBHP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/FanHHT13, author = {Chun{-}I Fan and Pei{-}Hsiu Ho and Jheng{-}Jia Huang and Yi{-}Fan Tseng}, title = {Secure Certificateless Signature Scheme Supporting Batch Verification}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {8--11}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.9}, doi = {10.1109/ASIAJCIS.2013.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/FanHHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/GuanTZ13, author = {D. J. Guan and Chen{-}Yu Tsai and Er{-}Shuo Zhuang}, title = {Detect Zero by Using Symmetric Homomorphic Encryption}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.8}, doi = {10.1109/ASIAJCIS.2013.8}, timestamp = {Thu, 26 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/GuanTZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HuMT13, author = {Rong Hu and Kirill Morozov and Tsuyoshi Takagi}, title = {On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {12--18}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.10}, doi = {10.1109/ASIAJCIS.2013.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HuMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Juang13, author = {Wen{-}Shenq Juang}, title = {An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using Bilinear Pairings}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {19--26}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.11}, doi = {10.1109/ASIAJCIS.2013.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Juang13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KaoKP13, author = {Ming{-}Chih Kao and Wen{-}Chung Kuo and Yu{-}Hsuan Pan}, title = {Automatic Adding License Management Functionality for Android Applications}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {122--126}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.26}, doi = {10.1109/ASIAJCIS.2013.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KaoKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/MatsunakaUK13, author = {Takashi Matsunaka and Junpei Urakawa and Ayumu Kubota}, title = {Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {48--55}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.15}, doi = {10.1109/ASIAJCIS.2013.15}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/MatsunakaUK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Mawudor13, author = {Bright Gameli Mawudor}, title = {Present Cyber Threat Management (Methodologies to Mitigate Evolving Cyber-Attacks)}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {115--121}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.24}, doi = {10.1109/ASIAJCIS.2013.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Mawudor13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/PaYM13, author = {Yin Minn Pa Pa and Katsunari Yoshioka and Tsutomu Matsumoto}, title = {Search Engine Based Investigation on Misconfiguration of Zone Transfer}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {56--62}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.16}, doi = {10.1109/ASIAJCIS.2013.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/PaYM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SuWLW13, author = {Ke{-}Wei Su and Kuo{-}Ping Wu and Hahn{-}Ming Lee and Te{-}En Wei}, title = {Suspicious {URL} Filtering Based on Logistic Regression with Multi-view Analysis}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {77--84}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.19}, doi = {10.1109/ASIAJCIS.2013.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/SuWLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TakahashiYMKY13, author = {Hiroya Takahashi and Kenji Yasunaga and Masahiro Mambo and Kwangjo Kim and Heung Youl Youm}, title = {Preventing Abuse of Cookies Stolen by {XSS}}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {85--89}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.20}, doi = {10.1109/ASIAJCIS.2013.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TakahashiYMKY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WangY13, author = {Chih{-}Hung Wang and Ji{-}Min Yang}, title = {Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud Environment}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {41--47}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.14}, doi = {10.1109/ASIAJCIS.2013.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WangY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WengYFLS13, author = {Chi{-}Yao Weng and Cheng{-}Hsing Yang and Chun{-}I Fan and Kuan{-}Liang Liu and Hung{-}Min Sun}, title = {Histogram-Based Reversible Information Hiding Improved by Prediction with the Variance to Enhance Image Quality}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {102--107}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.23}, doi = {10.1109/ASIAJCIS.2013.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WengYFLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YamauchiHS13, author = {Kazumasa Yamauchi and Yoshiaki Hori and Kouichi Sakurai}, title = {Detecting HTTP-Based Botnet Based on Characteristic of the {C} {\&} {C} Session Using by {SVM}}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {63--68}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.17}, doi = {10.1109/ASIAJCIS.2013.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YamauchiHS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ZiauddinM13, author = {Sheikh Ziauddin and Bruno Martin}, title = {Formal Analysis of {ISO/IEC} 9798-2 Authentication Standard Using {AVISPA}}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {108--114}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.25}, doi = {10.1109/ASIAJCIS.2013.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ZiauddinM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2013, title = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://ieeexplore.ieee.org/xpl/conhome/6621628/proceeding}, isbn = {978-0-7695-5075-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Ando12, author = {Ruo Ando}, title = {Flaw and Configuration Analysis of Cloud Component Using First Order Logic}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {104--108}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.25}, doi = {10.1109/ASIAJCIS.2012.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Ando12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChangHL12, author = {Chin{-}Chen Chang and Ngoc{-}Tu Huynh and Chia{-}Chun Lin}, title = {Strong Tamper-Localization, Visual Secret Sharing Scheme Based on Exploiting Modification Direction}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {10--16}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.9}, doi = {10.1109/ASIAJCIS.2012.9}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChangHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChangLC12, author = {Chin{-}Chen Chang and Hai{-}Duong Le and Ching{-}Hsiang Chang}, title = {Mobile Friendly and Highly Efficient Remote User Authenticated Key Agreement Protocol Featuring Untraceability}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {38--43}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.14}, doi = {10.1109/ASIAJCIS.2012.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChangLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenGHO12, author = {Chia{-}Mei Chen and D. J. Guan and Yu{-}Zhi Huang and Ya{-}Hui Ou}, title = {Attack Sequence Detection in Cloud Using Hidden Markov Model}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {100--103}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.24}, doi = {10.1109/ASIAJCIS.2012.24}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenGHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/ChenWTC12, author = {Chung{-}Wei Chen and Shiuh{-}Jeng Wang and Yuh{-}Ren Tsai and Hsing{-}Chung Chen}, title = {Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {51--58}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.16}, doi = {10.1109/ASIAJCIS.2012.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/ChenWTC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/EtoISN12, author = {Masashi Eto and Daisuke Inoue and Mio Suzuki and Koji Nakao}, title = {Multipurpose Network Monitoring Platform Using Dynamic Address Assignment}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {79--84}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.21}, doi = {10.1109/ASIAJCIS.2012.21}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/EtoISN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HiroguchiKSK12, author = {N. Hiroguchi and Hiroaki Kikuchi and Khamphao Sisaat and Surin Kittitornkun}, title = {Geographical Visualization of Malware Download for Anomaly Detection}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {74--78}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.20}, doi = {10.1109/ASIAJCIS.2012.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HiroguchiKSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/JeongW12, author = {Hanjae Jeong and Dongho Won}, title = {A Study on Method to Analyze Application on Bada Using {GUI} without Source Code}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {70--73}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.19}, doi = {10.1109/ASIAJCIS.2012.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/JeongW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuoK12, author = {Wen{-}Chung Kuo and Shao{-}Hung Kuo}, title = {Reversible Data Hiding for {JPEG} Based on {EMD}}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.7}, doi = {10.1109/ASIAJCIS.2012.7}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/KuoRCL12, author = {Chien{-}Ting Kuo and He{-}Ming Ruan and Shih{-}Jen Chen and Chin{-}Laung Lei}, title = {An Analysis of Security Patch Lifecycle Using Google Trend Tool}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {31--34}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.12}, doi = {10.1109/ASIAJCIS.2012.12}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/KuoRCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LeeSH12, author = {Chin{-}Feng Lee and Ming{-}Chi Shih and Cheng{-}Ta Huang}, title = {An Efficient Lossless Data Hiding Scheme on {VQ} Index Coding}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {6--9}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.8}, doi = {10.1109/ASIAJCIS.2012.8}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LeeSH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/LiOOH12, author = {Ruidong Li and Masaaki Ohnishi and Yasunori Owada and Hiroaki Harai}, title = {{PDAF:} Proactive Distributed Authentication Framework for Regional Network}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {44--50}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.15}, doi = {10.1109/ASIAJCIS.2012.15}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/LiOOH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/RuanCL12, author = {He{-}Ming Ruan and Yu{-}Shian Chen and Chin{-}Laung Lei}, title = {Data Integrity on Remote Storage for On-line Co-working}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {92--99}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.23}, doi = {10.1109/ASIAJCIS.2012.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/RuanCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/SatoK12, author = {Tomoki Sato and Hiroaki Kikuchi}, title = {Synthesis of Secure Passwords}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {35--37}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.13}, doi = {10.1109/ASIAJCIS.2012.13}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/SatoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/Suga12, author = {Yuji Suga}, title = {{SSL/TLS} Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short {RSA} Key Length Problem}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {17--24}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.10}, doi = {10.1109/ASIAJCIS.2012.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/Suga12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/TsukauneTM12, author = {T. Tsukaune and Yosuke Todo and Masakatu Morii}, title = {Proposal of a Secure {WEP} Operation against Existing Key Recovery Attacks and its Evaluation}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {25--30}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.11}, doi = {10.1109/ASIAJCIS.2012.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/TsukauneTM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WorkuTQ12, author = {S. G. Worku and Zhong Ting and Zhiguang Qin}, title = {Survey on Cloud Data Integrity Proof Techniques}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {85--91}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.22}, doi = {10.1109/ASIAJCIS.2012.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WorkuTQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/WuMWLW12, author = {Dong{-}Jie Wu and Ching{-}Hao Mao and Te{-}En Wei and Hahn{-}Ming Lee and Kuo{-}Ping Wu}, title = {DroidMat: Android Malware Detection through Manifest and {API} Calls Tracing}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {62--69}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.18}, doi = {10.1109/ASIAJCIS.2012.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/WuMWLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YehLWYL12, author = {Kuo{-}Hui Yeh and Nai{-}Wei Lo and Tzong{-}Chen Wu and Ta{-}Chi Yang and Horng{-}Twu Liaw}, title = {Analysis of an eHealth Care System with Smart Card Based Authentication}, booktitle = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, pages = {59--61}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/AsiaJCIS.2012.17}, doi = {10.1109/ASIAJCIS.2012.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/YehLWYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiajcis/2012, title = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012, Kaohsiung, Taiwan, August 9-10, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6296578/proceeding}, isbn = {978-0-7695-4776-3}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.