Search dblp for Publications

export results for "toc:db/conf/wisa/wisa2018.bht:"

 download as .bib file

@proceedings{DBLP:conf/wisa/2018,
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17982-3},
  doi          = {10.1007/978-3-030-17982-3},
  isbn         = {978-3-030-17981-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AnCK18,
  author       = {Hyeongcheol An and
                  Rakyong Choi and
                  Kwangjo Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Blockchain-Based Decentralized Key Management System with Quantum
                  Resistance},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_18},
  doi          = {10.1007/978-3-030-17982-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AnCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoCKHR18,
  author       = {Geumhwan Cho and
                  Jusop Choi and
                  Hyoungshick Kim and
                  Sangwon Hyun and
                  Jungwoo Ryoo},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Threat Modeling and Analysis of Voice Assistant Applications},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {197--209},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_16},
  doi          = {10.1007/978-3-030-17982-3\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoCKHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongLLCCC18,
  author       = {Jina Hong and
                  JinKi Lee and
                  HyunKyu Lee and
                  YoonHa Chang and
                  KwangHo Choi and
                  Sang Kil Cha},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {AlertVision: Visualizing Security Alerts},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {173--184},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_14},
  doi          = {10.1007/978-3-030-17982-3\_14},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HongLLCCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ImamuraO18,
  author       = {Mitsuyoshi Imamura and
                  Kazumasa Omote},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Network Deployments of Bitcoin Peers and Malicious Nodes Based on
                  Darknet Sensor},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_10},
  doi          = {10.1007/978-3-030-17982-3\_10},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ImamuraO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimEHLN18,
  author       = {SungCheol Kim and
                  IeckChae Euom and
                  ChangHyun Ha and
                  JooHyoung Lee and
                  BongNam Noh},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A Study on the Vulnerability Assessment for Digital I{\&}C System
                  in Nuclear Power Plant},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {68--80},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_6},
  doi          = {10.1007/978-3-030-17982-3\_6},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimEHLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimK18,
  author       = {Kunwoo Kim and
                  Jungduk Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A Study on Analyzing Risk Scenarios About Vulnerabilities of Security
                  Monitoring System: Focused on Information Leakage by Insider},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {159--170},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_13},
  doi          = {10.1007/978-3-030-17982-3\_13},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KobayashiH18,
  author       = {Takumi Kobayashi and
                  Keisuke Hakuta},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Secure Comparison Protocol with Encrypted Output and the Computation
                  for Proceeding 2 Bits-by-2 Bits},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_17},
  doi          = {10.1007/978-3-030-17982-3\_17},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KobayashiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KoderaKKN18,
  author       = {Yuta Kodera and
                  Minoru Kuribayashi and
                  Takuya Kusaka and
                  Yasuyuki Nogami},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A Construction of a Keyword Search to Allow Partial Matching with
                  a Block Cipher},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_19},
  doi          = {10.1007/978-3-030-17982-3\_19},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KoderaKKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonKYC18,
  author       = {Hyun Kwon and
                  Yongchul Kim and
                  Hyunsoo Yoon and
                  Daeseon Choi},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural
                  Networks},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {42--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_4},
  doi          = {10.1007/978-3-030-17982-3\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonKYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Lee18,
  author       = {Jong{-}Kwan Lee},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {{IP} Address Mutation Scheme Using Vector Projection for Tactical
                  Wireless Networks},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {81--92},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_7},
  doi          = {10.1007/978-3-030-17982-3\_7},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Lee18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeJK18,
  author       = {Sanghak Lee and
                  Sangwoo Ji and
                  Jong Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Security Analysis of Mobile Web Browser Hardware Accessibility: Study
                  with Ambient Light Sensors},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_1},
  doi          = {10.1007/978-3-030-17982-3\_1},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeK18,
  author       = {Sooyeon Lee and
                  Huy Kang Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {ADSaS: Comprehensive Real-Time Anomaly Detection System},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_3},
  doi          = {10.1007/978-3-030-17982-3\_3},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeSL18,
  author       = {Jae{-}Yung Lee and
                  Jae Hyuk Suk and
                  Dong Hoon Lee},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {{VODKA:} Virtualization Obfuscation Using Dynamic Key Approach},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_11},
  doi          = {10.1007/978-3-030-17982-3\_11},
  timestamp    = {Tue, 11 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NanjoKSKN18,
  author       = {Yuki Nanjo and
                  Md. Al{-}Amin Khandaker and
                  Masaaki Shirase and
                  Takuya Kusaka and
                  Yasuyuki Nogami},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Efficient Ate-Based Pairing over the Attractive Classes of {BN} Curves},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_5},
  doi          = {10.1007/978-3-030-17982-3\_5},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NanjoKSKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhK18,
  author       = {Saeyoung Oh and
                  Jong Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering
                  Memory Address Mapping Algorithms},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {146--158},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_12},
  doi          = {10.1007/978-3-030-17982-3\_12},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RatchasanW18,
  author       = {Trust Ratchasan and
                  Rungrat Wiangsripanawan},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {HapticPoints: The Extended PassPoints Graphical Password},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_2},
  doi          = {10.1007/978-3-030-17982-3\_2},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/RatchasanW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoAK18,
  author       = {Hwajeong Seo and
                  Kyuhwang An and
                  Hyeokdong Kwon},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Compact {LEA} and {HIGHT} Implementations on 8-Bit {AVR} and 16-Bit
                  {MSP} Processors},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {253--265},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_20},
  doi          = {10.1007/978-3-030-17982-3\_20},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoAKPHK18,
  author       = {Hwajeong Seo and
                  Kyuhwang An and
                  Hyeokdong Kwon and
                  Taehwan Park and
                  Zhi Hu and
                  Howon Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Parallel Implementations of {CHAM}},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {93--104},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_8},
  doi          = {10.1007/978-3-030-17982-3\_8},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoAKPHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShimY18,
  author       = {Shinwoo Shim and
                  Ji Won Yoon},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A New Bayesian Approach to Exploring Damaged Assets by Monitoring
                  Mission Failures Caused by Undetected Attack},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {185--196},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_15},
  doi          = {10.1007/978-3-030-17982-3\_15},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShimY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YooSY18,
  author       = {Joon Soo Yoo and
                  Baek Kyung Song and
                  Ji Won Yoon},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Logarithm Design on Encrypted Data with Bitwise Operation},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {105--116},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_9},
  doi          = {10.1007/978-3-030-17982-3\_9},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YooSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}