Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/wisa/wisa2021.bht:"
@inproceedings{DBLP:conf/wisa/AlkinoonCM21, author = {Mohammed Alkinoon and Sung J. Choi and David Mohaisen}, editor = {Hyoungshick Kim}, title = {Measuring Healthcare Data Breaches}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {265--277}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_22}, doi = {10.1007/978-3-030-89432-0\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AlkinoonCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AwaludinPK21, author = {Asep Muhamad Awaludin and Derry Pratama and Howon Kim}, editor = {Hyoungshick Kim}, title = {AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {157--168}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_13}, doi = {10.1007/978-3-030-89432-0\_13}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AwaludinPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BaeHL21, author = {Sungho Bae and Chanwoong Hwang and Taejin Lee}, editor = {Hyoungshick Kim}, title = {Research on Improvement of Anomaly Detection Performance in Industrial Control Systems}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {76--87}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_7}, doi = {10.1007/978-3-030-89432-0\_7}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/BaeHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiK21, author = {Jeongseok Choi and Hyoungshick Kim}, editor = {Hyoungshick Kim}, title = {On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {39--50}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_4}, doi = {10.1007/978-3-030-89432-0\_4}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiPPK21, author = {Young Ah Choi and Kyung Ho Park and Eunji Park and Huy Kang Kim}, editor = {Hyoungshick Kim}, title = {Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {28--38}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_3}, doi = {10.1007/978-3-030-89432-0\_3}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiPPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GantaYCP21, author = {Priyatham Ganta and Kicho Yu and Dharma Dheeraj Chintala and Younghee Park}, editor = {Hyoungshick Kim}, title = {Adaptive Network Security Service Orchestration Based on {SDN/NFV}}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {231--242}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_19}, doi = {10.1007/978-3-030-89432-0\_19}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GantaYCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Jang21, author = {Daehee Jang}, editor = {Hyoungshick Kim}, title = {BadASLR: Exceptional Cases of {ASLR} Aiding Exploitation}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {278--289}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_23}, doi = {10.1007/978-3-030-89432-0\_23}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Jang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimKCP21, author = {Jeongwoo Kim and Seoyeon Kang and Eun{-}Sun Cho and Joon{-}Young Paik}, editor = {Hyoungshick Kim}, title = {{LOM:} Lightweight Classifier for Obfuscation Methods}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {3--15}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_1}, doi = {10.1007/978-3-030-89432-0\_1}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimKCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimLS21, author = {Jane Kim and Soojin Lee and Seung{-}Hyun Seo}, editor = {Hyoungshick Kim}, title = {A Privacy-Preserving Payment Model for {EV} Charging}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {255--264}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_21}, doi = {10.1007/978-3-030-89432-0\_21}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimSCBK21, author = {Jongkil Kim and Willy Susilo and Yang{-}Wai Chow and Joonsang Baek and Intae Kim}, editor = {Hyoungshick Kim}, title = {Pattern Matching over Encrypted Data with a Short Ciphertext}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {132--143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_11}, doi = {10.1007/978-3-030-89432-0\_11}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimSCBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimSEJSKKLS21, author = {Hyunjun Kim and Minjoo Sim and Siwoo Eum and Kyungbae Jang and Gyeongju Song and Hyunji Kim and Hyeokdong Kwon and Wai{-}Kong Lee and Hwajeong Seo}, editor = {Hyoungshick Kim}, title = {Masked Implementation of {PIPO} Block Cipher on 8-bit {AVR} Microcontrollers}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {171--182}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_14}, doi = {10.1007/978-3-030-89432-0\_14}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimSEJSKKLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwakKS21, author = {YuJin Kwak and YoungBeom Kim and Seog Chung Seo}, editor = {Hyoungshick Kim}, title = {Parallel Implementation of {PIPO} Block Cipher on 32-bit {RISC-V} Processor}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {183--193}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_15}, doi = {10.1007/978-3-030-89432-0\_15}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwakKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonJKKSELS21, author = {Hyeokdong Kwon and Kyungbae Jang and Hyunjun Kim and Hyunji Kim and Minjoo Sim and Siwoo Eum and Wai{-}Kong Lee and Hwajeong Seo}, editor = {Hyoungshick Kim}, title = {ARMed Frodo - FrodoKEM on 64-Bit ARMv8 Processors}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {206--217}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_17}, doi = {10.1007/978-3-030-89432-0\_17}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KwonJKKSELS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LarasatiK21, author = {Harashta Tatimma Larasati and Howon Kim}, editor = {Hyoungshick Kim}, title = {Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {91--104}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_8}, doi = {10.1007/978-3-030-89432-0\_8}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LarasatiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKS21, author = {Seokmin Lee and Taehun Kim and Youngjoo Shin}, editor = {Hyoungshick Kim}, title = {Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {218--228}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_18}, doi = {10.1007/978-3-030-89432-0\_18}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeY21, author = {KangHoon Lee and Ji Won Yoon}, editor = {Hyoungshick Kim}, title = {Efficient Adaptation of {TFHE} for High End-to-End Throughput}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {144--156}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_12}, doi = {10.1007/978-3-030-89432-0\_12}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuSB21, author = {Xin Liu and Willy Susilo and Joonsang Baek}, editor = {Hyoungshick Kim}, title = {Secure Computation of Shared Secrets and Its Applications}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {119--131}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_10}, doi = {10.1007/978-3-030-89432-0\_10}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LiuSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoggEK21, author = {Raymond Mogg and Simon Yusuf Enoch and Dong Seong Kim}, editor = {Hyoungshick Kim}, title = {A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {51--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_5}, doi = {10.1007/978-3-030-89432-0\_5}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MoggEK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MotteH21, author = {Samuel De La Motte and Jin B. Hong}, editor = {Hyoungshick Kim}, title = {A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {16--27}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_2}, doi = {10.1007/978-3-030-89432-0\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MotteH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RheeL21, author = {Hyun Sook Rhee and Dong Hoon Lee}, editor = {Hyoungshick Kim}, title = {Anonymous {IBE} from {PEKS:} {A} Generic Construction}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {105--118}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_9}, doi = {10.1007/978-3-030-89432-0\_9}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RheeL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoLLS21, author = {Chang{-}Bae Seo and Gyuseop Lee and Yeonjoon Lee and Seung{-}Hyun Seo}, editor = {Hyoungshick Kim}, title = {Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {64--75}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_6}, doi = {10.1007/978-3-030-89432-0\_6}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoLLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoSLA21, author = {Hwajeong Seo and Pakize Sanal and Wai{-}Kong Lee and Reza Azarderakhsh}, editor = {Hyoungshick Kim}, title = {No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit {ARM} Platforms}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {194--205}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_16}, doi = {10.1007/978-3-030-89432-0\_16}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoSLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WenLWW21, author = {Jinghang Wen and Jia{-}Nan Liu and Axin Wu and Jiasi Weng}, editor = {Hyoungshick Kim}, title = {A General Framework for Matching Pattern Hiding in Deep Packet Inspection}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {243--254}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_20}, doi = {10.1007/978-3-030-89432-0\_20}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WenLWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2021, editor = {Hyoungshick Kim}, title = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0}, doi = {10.1007/978-3-030-89432-0}, isbn = {978-3-030-89431-3}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.