default search action
16. WISA 2015: Jeju Island, Korea
- Howon Kim, Dooho Choi:
Information Security Applications - 16th International Workshop, WISA 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9503, Springer 2016, ISBN 978-3-319-31874-5
Hardware Security
- Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin:
M-ORAM: A Matrix ORAM with Log N Bandwidth Cost. 3-15 - Wei He, Dirmanto Jap, Alexander Herrmann:
Process Variation Evaluation Using RO PUF for Enhancing SCA-Resistant Dual-Rail Implementation. 16-27 - Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. 28-40 - Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Compact Implementations of LSH. 41-53 - Hyeokchan Kwon, Kwangil Lee, Gaeil An, Byung-Ho Chung, Jeong-Nyeo Kim:
Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the Device. 54-61
Cryptography
- You Sung Kang, Elizabeth O'Sullivan, Dooho Choi, Máire O'Neill:
Security Analysis on RFID Mutual Authentication Protocol. 65-74 - Maciej Skorski:
How Much Randomness Can Be Extracted from Memoryless Shannon Entropy Sources? 75-86 - Renzhang Liu, Yanbin Pan:
Two Types of Special Bases for Integral Lattices. 87-95 - Hyun Sook Rhee, Dong Hoon Lee:
Keyword Updatable PEKS. 96-109 - Seira Hidano, Shinsaku Kiyomoto:
On Partitioning Secret Data Based on Concept of Functional Safety. 110-121 - Geumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong Hoon Lee:
Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation. 122-133 - Binh P. Nguyen, Hoa Ngo, Jihun Kim, Jong Kim:
Publishing Graph Data with Subgraph Differential Privacy. 134-145 - Maoning Wang:
An Improved Analysis of Broadcast Attacks on the GGH Cryptosystem. 146-158
Side Channel Attacks and Countermeasures
- Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. 161-173 - Hyunjin Ahn, Neil Hanley, Máire O'Neill, Dong-Guk Han:
An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected AES -. 174-186 - Eunchong Lee, Hyunsoo Kim, Ji Won Yoon:
Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack. 187-199 - Sungjun Ahn, Dooho Choi:
An Improved Masking Scheme for S-Box Software Implementations. 200-212
Security and Threat Analysis
- Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim:
Open Sesame! Hacking the Password. 215-226 - Dongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim:
BurnFit: Analyzing and Exploiting Wearable Devices. 227-239 - Hocheol Shin, Kibum Choi, Young-Seok Park, Jaeyeong Choi, Yongdae Kim:
Security Analysis of FHSS-type Drone Controller. 240-253 - Kyungwon Park, Hyoungshick Kim:
Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis. 254-265
IoT Security
- Hyeokjin Kwon, Jiye Park, Namhi Kang:
Challenges in Deploying CoAP Over DTLS in Resource Constrained Environments. 269-280 - Jungsoo Park, Jinouk Kim, Minho Park, Souhwan Jung:
A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server. 281-287 - Kwangho Kim:
Cyber Security Considerations for Designing IoT-Based Control Systems. 288-299 - Kibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim:
Frying PAN: Dissecting Customized Protocol for Personal Area Network. 300-312 - Mahmoud T. El-Hadidi, Hany El-Sayed, Heba Kamal Aslan, Karim Osama:
Structured Design Approach for an Optimal Programmable Synchronous Security Processor. 313-325 - Guifang Huang, Hongda Li:
On Zero Knowledge Argument with PQT Soundness. 326-335
Network Security
- Bayu Adhi Tama, Kyung Hyune Rhee:
Performance Analysis of Multiple Classifier System in DoS Attack Detection. 339-347 - Kwangho Kim, Sangdon Park, Jongin Lim:
Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan. 348-356 - Jihyun Kim, Howon Kim:
Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization. 357-369
Application Security
- Hiroya Susuki, Rie Shigetomi Yamaguchi:
Cost-Effective Modeling for Authentication and Its Application to Activity Tracker. 373-385 - Se Hwan Kim, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon:
Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree. 386-398 - Paal E. Engelstad, Hugo Hammer, Kyrre Wahl Kongsgård, Anis Yazidi, Nils Agne Nordbotten, Aleksander Bai:
Automatic Security Classification with Lasso. 399-410 - Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. 411-422 - Yunhui Zhuang, Gerhard P. Hancke, Duncan S. Wong:
How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol. 423-435
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.