default search action
17. WISA 2016: Jeju Island, Korea
- Dooho Choi, Sylvain Guilley:
Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10144, 2017, ISBN 978-3-319-56548-4 - Aziz Mohaisen, Ah Reum Kang, Kui Ren:
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment. 1-14 - An Wang, Aziz Mohaisen, Wentao Chang, Songqing Chen:
Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks. 15-28 - Xinyu Liu, Beumjin Cho, Jong Kim:
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN. 29-41 - Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim:
Slowloris DoS Countermeasure over WebSocket. 42-53 - Seunghun Cha, Hyoungshick Kim:
Detecting Encrypted Traffic: A Machine Learning Approach. 54-65 - Ivan Homoliak, Ladislav Sulak, Petr Hanácek:
Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. 66-78 - Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks. 79-89 - Su-kyung Kown, Bongsoo Jang, Byoung-Dai Lee, Younghae Do, Hunki Baek, Yoon-Ho Choi:
Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate. 90-101 - Jeong Yoon Yang, So-Jeong Kim, Il Seok Oh(Luke):
Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities. 102-111 - Jongmin Jeong, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur:
A Practical Analysis of TLS Vulnerabilities in Korea Web Environment. 112-123 - Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim:
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack. 124-135 - Muhamad Erza Aminanto, Kwangjo Kim:
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. 136-147 - Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, Yongdae Kim:
Pay as You Want: Bypassing Charging System in Operational Cellular Networks. 148-160 - Matthew Ruffell, Jin B. Hong, Hyoungshick Kim, Dong Seong Kim:
Towards Automated Exploit Generation for Embedded Systems. 161-173 - Sanghak Oh, Eunsoo Kim, Hyoungshick Kim:
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares? 174-185 - Eun Oh, Tae-Sung Kim, Tae-Hee Cho:
Development of Information Security Management Assessment Model for the Financial Sector. 186-197 - Jisoo Jung, Joo-Im Kim, Ji Won Yoon:
A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness. 198-209 - Pham Ngoc Giao, Suk-Hwan Lee, Kwang-Seok Moon, Ki-Ryong Kwon:
GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects. 210-220 - Md. Al-Amin Khandaker, Yasuyuki Nogami, Hwajeong Seo, Sylvain Duquesne:
Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18. 221-232 - Xiaoqi Yu, Nairen Cao, Gongxian Zeng, Ruoqing Zhang, Siu-Ming Yiu:
LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation). 233-244 - Shahidatul Sadiah, Toru Nakanishi:
Revocable Group Signatures with Compact Revocation List Using Vector Commitments. 245-257 - Jean-Charles Faugère, Ludovic Perret:
The Quantum-Safe Revolution. 258-266 - Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi:
New Integral Characteristics of KASUMI Derived by Division Property. 267-279 - Maciej Skorski:
On Pseudorandomness in Stateless Sources. 280-291 - Haruhisa Kosuge, Hidema Tanaka:
Algebraic Degree Estimation for Integral Attack by Randomized Algorithm. 292-304 - Stjepan Picek:
Applications of Soft Computing in Cryptology. 305-317 - Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim:
Parallel Implementations of LEA, Revisited. 318-330 - Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward. 331-340 - Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah, Ramlan Mahmod:
A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation. 341-352 - Simon S. Woo, Jingul Kim, Duoduo Yu, Beomjun Kim:
Exploration of 3D Texture and Projection for New CAPTCHA Design. 353-365 - Sung-Hoon Lee, Jong-Hyuk Roh, Soo-Hyung Kim, Seung-Hun Jin:
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment. 366-375 - Donghyeok Lee, Namje Park:
Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud. 376-387 - Seung-Hee Oh, Byung-Gil Lee, Byungho Chung:
The Vessel Trajectory Mechanism for Marine Accidents Analysis. 388-396
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.