default search action
Search dblp for Publications
export results for "toc:db/conf/wisa/wisa2018.bht:"
@proceedings{DBLP:conf/wisa/2018, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17982-3}, doi = {10.1007/978-3-030-17982-3}, isbn = {978-3-030-17981-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AnCK18, author = {Hyeongcheol An and Rakyong Choi and Kwangjo Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Blockchain-Based Decentralized Key Management System with Quantum Resistance}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {229--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_18}, doi = {10.1007/978-3-030-17982-3\_18}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AnCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoCKHR18, author = {Geumhwan Cho and Jusop Choi and Hyoungshick Kim and Sangwon Hyun and Jungwoo Ryoo}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Threat Modeling and Analysis of Voice Assistant Applications}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {197--209}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_16}, doi = {10.1007/978-3-030-17982-3\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoCKHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongLLCCC18, author = {Jina Hong and JinKi Lee and HyunKyu Lee and YoonHa Chang and KwangHo Choi and Sang Kil Cha}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {AlertVision: Visualizing Security Alerts}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {173--184}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_14}, doi = {10.1007/978-3-030-17982-3\_14}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongLLCCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ImamuraO18, author = {Mitsuyoshi Imamura and Kazumasa Omote}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {117--128}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_10}, doi = {10.1007/978-3-030-17982-3\_10}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ImamuraO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimEHLN18, author = {SungCheol Kim and IeckChae Euom and ChangHyun Ha and JooHyoung Lee and BongNam Noh}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A Study on the Vulnerability Assessment for Digital I{\&}C System in Nuclear Power Plant}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {68--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_6}, doi = {10.1007/978-3-030-17982-3\_6}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimEHLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimK18, author = {Kunwoo Kim and Jungduk Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A Study on Analyzing Risk Scenarios About Vulnerabilities of Security Monitoring System: Focused on Information Leakage by Insider}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {159--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_13}, doi = {10.1007/978-3-030-17982-3\_13}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KobayashiH18, author = {Takumi Kobayashi and Keisuke Hakuta}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {213--228}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_17}, doi = {10.1007/978-3-030-17982-3\_17}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KobayashiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KoderaKKN18, author = {Yuta Kodera and Minoru Kuribayashi and Takuya Kusaka and Yasuyuki Nogami}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {241--252}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_19}, doi = {10.1007/978-3-030-17982-3\_19}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KoderaKKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonKYC18, author = {Hyun Kwon and Yongchul Kim and Hyunsoo Yoon and Daeseon Choi}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {42--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_4}, doi = {10.1007/978-3-030-17982-3\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonKYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Lee18, author = {Jong{-}Kwan Lee}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {{IP} Address Mutation Scheme Using Vector Projection for Tactical Wireless Networks}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {81--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_7}, doi = {10.1007/978-3-030-17982-3\_7}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Lee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeJK18, author = {Sanghak Lee and Sangwoo Ji and Jong Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {3--15}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_1}, doi = {10.1007/978-3-030-17982-3\_1}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeK18, author = {Sooyeon Lee and Huy Kang Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {ADSaS: Comprehensive Real-Time Anomaly Detection System}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {29--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_3}, doi = {10.1007/978-3-030-17982-3\_3}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeSL18, author = {Jae{-}Yung Lee and Jae Hyuk Suk and Dong Hoon Lee}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {{VODKA:} Virtualization Obfuscation Using Dynamic Key Approach}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {131--145}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_11}, doi = {10.1007/978-3-030-17982-3\_11}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NanjoKSKN18, author = {Yuki Nanjo and Md. Al{-}Amin Khandaker and Masaaki Shirase and Takuya Kusaka and Yasuyuki Nogami}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Efficient Ate-Based Pairing over the Attractive Classes of {BN} Curves}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {55--67}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_5}, doi = {10.1007/978-3-030-17982-3\_5}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NanjoKSKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhK18, author = {Saeyoung Oh and Jong Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {146--158}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_12}, doi = {10.1007/978-3-030-17982-3\_12}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RatchasanW18, author = {Trust Ratchasan and Rungrat Wiangsripanawan}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {HapticPoints: The Extended PassPoints Graphical Password}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {16--28}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_2}, doi = {10.1007/978-3-030-17982-3\_2}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/RatchasanW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoAK18, author = {Hwajeong Seo and Kyuhwang An and Hyeokdong Kwon}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Compact {LEA} and {HIGHT} Implementations on 8-Bit {AVR} and 16-Bit {MSP} Processors}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {253--265}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_20}, doi = {10.1007/978-3-030-17982-3\_20}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SeoAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoAKPHK18, author = {Hwajeong Seo and Kyuhwang An and Hyeokdong Kwon and Taehwan Park and Zhi Hu and Howon Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Parallel Implementations of {CHAM}}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {93--104}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_8}, doi = {10.1007/978-3-030-17982-3\_8}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoAKPHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShimY18, author = {Shinwoo Shim and Ji Won Yoon}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {185--196}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_15}, doi = {10.1007/978-3-030-17982-3\_15}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShimY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YooSY18, author = {Joon Soo Yoo and Baek Kyung Song and Ji Won Yoon}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Logarithm Design on Encrypted Data with Bitwise Operation}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {105--116}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_9}, doi = {10.1007/978-3-030-17982-3\_9}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YooSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.