Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:conf/wisa:"
@proceedings{DBLP:conf/wisa/2023, editor = {Howon Kim and Jonghee M. Youn}, title = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-99-8024-6}, doi = {10.1007/978-981-99-8024-6}, isbn = {978-981-99-8023-9}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AlthebeitiGANM23, author = {Hattan Althebeiti and Ran Gedawy and Ahod Alghuried and Daehun Nyang and David Mohaisen}, editor = {Howon Kim and Jonghee M. Youn}, title = {Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {159--174}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_13}, doi = {10.1007/978-981-99-8024-6\_13}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AlthebeitiGANM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AlthebeitiM23, author = {Hattan Althebeiti and David Mohaisen}, editor = {Howon Kim and Jonghee M. Youn}, title = {Enriching Vulnerability Reports Through Automated and Augmented Description Summarization}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {213--227}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_17}, doi = {10.1007/978-981-99-8024-6\_17}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AlthebeitiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BaeKLS23, author = {Seungyeon Bae and Taehun Kim and Woomin Lee and Youngjoo Shin}, editor = {Howon Kim and Jonghee M. Youn}, title = {Exploiting Memory Page Management in {KSM} for Remote Memory Deduplication Attack}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {244--256}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_19}, doi = {10.1007/978-981-99-8024-6\_19}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/BaeKLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DohYHLAY23, author = {Hyun Jung Doh and Joon Soo Yoo and Miyeon Hong and Kang Hoon Lee and Tae Min Ahn and Ji Won Yoon}, editor = {Howon Kim and Jonghee M. Youn}, title = {Principal Component Analysis over the Boolean Circuit Within {TFHE} Scheme}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {27--39}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_3}, doi = {10.1007/978-981-99-8024-6\_3}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/DohYHLAY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HaM23, author = {Seon Ha and Hyungon Moon}, editor = {Howon Kim and Jonghee M. Youn}, title = {Protecting Kernel Code Integrity with {PMP} on {RISC-V}}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {231--243}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_18}, doi = {10.1007/978-981-99-8024-6\_18}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IkematsuJY23, author = {Yasuhiko Ikematsu and Hyungrok Jo and Takanori Yasuda}, editor = {Howon Kim and Jonghee M. Youn}, title = {A Security Analysis on MQ-Sign}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {40--51}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_4}, doi = {10.1007/978-981-99-8024-6\_4}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/IkematsuJY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeonS23, author = {Seungho Jeon and Jung{-}Taek Seo}, editor = {Howon Kim and Jonghee M. Youn}, title = {SP-Fuzz: Fuzzing Soft {PLC} with Semi-automated Harness Synthesis}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {282--293}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_22}, doi = {10.1007/978-981-99-8024-6\_22}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/JeonS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JiJS23, author = {Ilhwan Ji and Seungho Jeon and Jung{-}Taek Seo}, editor = {Howon Kim and Jonghee M. Youn}, title = {{AE-LSTM} Based Anomaly Detection System for Communication Over {DNP} 3.0}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {91--104}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_8}, doi = {10.1007/978-981-99-8024-6\_8}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/JiJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JoS23, author = {Hyungrok Jo and Junji Shikata}, editor = {Howon Kim and Jonghee M. Youn}, title = {Bloomier Filters on 3-Hypergraphs}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {16--26}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_2}, doi = {10.1007/978-981-99-8024-6\_2}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/JoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KhanK23, author = {Irshad Khan and Young{-}Woo Kwon}, editor = {Howon Kim and Jonghee M. Youn}, title = {Multi-class Malware Detection via Deep Graph Convolutional Networks Using TF-IDF-Based Attributed Call Graphs}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {188--200}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_15}, doi = {10.1007/978-981-99-8024-6\_15}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KhanK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimJSS23, author = {Donghyun Kim and Seungho Jeon and Jiho Shin and Jung{-}Taek Seo}, editor = {Howon Kim and Jonghee M. Youn}, title = {{OCR} Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {201--212}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_16}, doi = {10.1007/978-981-99-8024-6\_16}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimJSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimKKJS23, author = {Wonwoong Kim and Yeajun Kang and Hyunji Kim and Kyungbae Jang and Hwajeong Seo}, editor = {Howon Kim and Jonghee M. Youn}, title = {PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {310--323}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_24}, doi = {10.1007/978-981-99-8024-6\_24}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimKKJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimS23, author = {Eunyoung Kim and Kiwook Sohn}, editor = {Howon Kim and Jonghee M. Youn}, title = {Research on Security Threats Using {VPN} in Zero Trust Environments}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {55--66}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_5}, doi = {10.1007/978-981-99-8024-6\_5}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KuzunoYOHY23, author = {Hiroki Kuzuno and Tomohiko Yano and Kazuki Omo and Jeroen van der Ham and Toshihiro Yamauchi}, editor = {Howon Kim and Jonghee M. Youn}, title = {Security Risk Indicator for Open Source Software to Measure Software Development Status}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {143--156}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_12}, doi = {10.1007/978-981-99-8024-6\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KuzunoYOHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonSSLS23, author = {Hyeokdong Kwon and Minjoo Sim and Gyeongju Song and Minwoo Lee and Hwajeong Seo}, editor = {Howon Kim and Jonghee M. Youn}, title = {Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {338--348}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_26}, doi = {10.1007/978-981-99-8024-6\_26}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KwonSSLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LarasatiK23, author = {Harashta Tatimma Larasati and Howon Kim}, editor = {Howon Kim and Jonghee M. Youn}, title = {Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {297--309}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_23}, doi = {10.1007/978-981-99-8024-6\_23}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LarasatiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NaOLC23, author = {Hyunsik Na and Yoonju Oh and Wonho Lee and Daeseon Choi}, editor = {Howon Kim and Jonghee M. Youn}, title = {Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {107--118}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_9}, doi = {10.1007/978-981-99-8024-6\_9}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/NaOLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OktianJOJKLK23, author = {Yustus Eko Oktian and Uk Jo and Simon Oh and Hanho Jeong and Jaehyun Kim and Thi{-}Thu{-}Huong Le and Howon Kim}, editor = {Howon Kim and Jonghee M. Youn}, title = {Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {131--142}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_11}, doi = {10.1007/978-981-99-8024-6\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OktianJOJKLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkAPK23, author = {Jaewoo Park and Hong Eun Ahn and Leo Hyun Park and Taekyoung Kwon}, editor = {Howon Kim and Jonghee M. Youn}, title = {Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {175--187}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_14}, doi = {10.1007/978-981-99-8024-6\_14}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkAPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkKK23, author = {Yonggon Park and Youngjoo Ko and Jong Kim}, editor = {Howon Kim and Jonghee M. Youn}, title = {Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {257--268}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_20}, doi = {10.1007/978-981-99-8024-6\_20}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PrihatnoSLOLK23, author = {Aji Teguh Prihatno and Naufal Suryanto and Harashta Tatimma Larasati and Yustus Eko Oktian and Thi{-}Thu{-}Huong Le and Howon Kim}, editor = {Howon Kim and Jonghee M. Youn}, title = {A New Frontier in Digital Security: Verification for {NFT} Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {79--90}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_7}, doi = {10.1007/978-981-99-8024-6\_7}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/PrihatnoSLOLK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShibayamaI23, author = {Naoki Shibayama and Yasutaka Igarashi}, editor = {Howon Kim and Jonghee M. Youn}, title = {A New Higher Order Differential of {LCB}}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {3--15}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_1}, doi = {10.1007/978-981-99-8024-6\_1}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ShibayamaI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SimKESLS23, author = {Minjoo Sim and Hyeokdong Kwon and Siwoo Eum and Gyeongju Song and Minwoo Lee and Hwajeong Seo}, editor = {Howon Kim and Jonghee M. Youn}, title = {Efficient Implementation of the Classic McEliece on ARMv8 Processors}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {324--337}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_25}, doi = {10.1007/978-981-99-8024-6\_25}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SimKESLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WatanabeGM23, author = {Ryo Watanabe and Nasratullah Ghafoori and Atsuko Miyaji}, editor = {Howon Kim and Jonghee M. Youn}, title = {Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {269--281}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_21}, doi = {10.1007/978-981-99-8024-6\_21}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WatanabeGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YoonKKE23, author = {Seong{-}Su Yoon and Do{-}Yeon Kim and Ga{-}Gyeong Kim and Ieck{-}Chae Euom}, editor = {Howon Kim and Jonghee M. Youn}, title = {Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {119--130}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_10}, doi = {10.1007/978-981-99-8024-6\_10}, timestamp = {Thu, 18 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/YoonKKE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhangBLLS23, author = {Yan Zhang and Yuhao Bai and Soojin Lee and Ming Li and Seung{-}Hyun Seo}, editor = {Howon Kim and Jonghee M. Youn}, title = {A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism}, booktitle = {Information Security Applications - 24th International Conference, {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14402}, pages = {67--78}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8024-6\_6}, doi = {10.1007/978-981-99-8024-6\_6}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZhangBLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2022, editor = {Ilsun You and Taek{-}Young Youn}, title = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-25659-2}, doi = {10.1007/978-3-031-25659-2}, isbn = {978-3-031-25658-5}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AnadaFH22, author = {Hiroaki Anada and Masayuki Fukumitsu and Shingo Hasegawa}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {29--43}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_3}, doi = {10.1007/978-3-031-25659-2\_3}, timestamp = {Tue, 14 Feb 2023 11:13:42 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AnadaFH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AnastasovaAK22, author = {Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Time-Optimal Design of Finite Field Arithmetic for {SIKE} on Cortex-M4}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {265--276}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_19}, doi = {10.1007/978-3-031-25659-2\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AnastasovaAK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BordelACKRA22, author = {Borja Bordel and Ram{\'{o}}n Alcarria and Joaqu{\'{\i}}n Chung and Rajkumar Kettimuthu and Tom{\'{a}}s Robles and Iv{\'{a}}n Armuelles}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Quality-of-Service Degradation in Distributed Instrumentation Systems Through Poisoning of 5G Beamforming Algorithms}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {63--76}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_5}, doi = {10.1007/978-3-031-25659-2\_5}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/BordelACKRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/CastilloHACD22, author = {Mathew Del Castillo and Harvey Hermosa and Philip Virgil Astillo and Gaurav Choudhary and Nicola Dragoni}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Software-Defined Network Based Secure Internet-Enabled Video Surveillance System}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {89--101}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_7}, doi = {10.1007/978-3-031-25659-2\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/CastilloHACD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoLCL22, author = {Hyunsu Cho and Sunwoo Lee and Wonsuk Choi and Dong Hoon Lee}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {171--184}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_13}, doi = {10.1007/978-3-031-25659-2\_13}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoLCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiJ22, author = {Jinhong Choi and Yeongjin Jang}, editor = {Ilsun You and Taek{-}Young Youn}, title = {A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-Physical and Embedded Systems}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {185--203}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_14}, doi = {10.1007/978-3-031-25659-2\_14}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoiJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/EmuraKNOO22, author = {Keita Emura and Kaisei Kajita and Ryo Nojima and Kazuto Ogawa and Go Ohtake}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Membership Privacy for Asynchronous Group Messaging}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {131--142}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_10}, doi = {10.1007/978-3-031-25659-2\_10}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/EmuraKNOO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FirdausR22, author = {Muhammad Firdaus and Kyung{-}Hyune Rhee}, editor = {Ilsun You and Taek{-}Young Youn}, title = {A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {156--167}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_12}, doi = {10.1007/978-3-031-25659-2\_12}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/FirdausR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Hirose22, author = {Shoichi Hirose}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {3--15}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_1}, doi = {10.1007/978-3-031-25659-2\_1}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Hirose22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JangKLKYS22, author = {Kyungbae Jang and Won{-}Woong Kim and Sejin Lim and Yeajun Kang and Yujin Yang and Hwajeong Seo}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Optimized Implementation of Quantum Binary Field Multiplication with Toffoli Depth One}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {251--264}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_18}, doi = {10.1007/978-3-031-25659-2\_18}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/JangKLKYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimGL22, author = {Yu{-}kyung Kim and Myong{-}Hyun Go and Kyungho Lee}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Influence Through Cyber Capacity Building: Network Analysis of Assistance, Cooperation, and Agreements Among {ASEAN} Plus Three Countries}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {330--343}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_24}, doi = {10.1007/978-3-031-25659-2\_24}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimLYKY22, author = {Taewan Kim and Seyoon Lee and Seunghwan Yun and Jongbum Kim and Okyeon Yi}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {277--288}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_20}, doi = {10.1007/978-3-031-25659-2\_20}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimLYKY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimSBKC22, author = {Intae Kim and Willy Susilo and Joonsang Baek and Jongkil Kim and Yang{-}Wai Chow}, editor = {Ilsun You and Taek{-}Young Youn}, title = {{TLS} Goes Low Cost: When {TLS} Meets Edge}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {102--113}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_8}, doi = {10.1007/978-3-031-25659-2\_8}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimSBKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KuzunoY22, author = {Hiroki Kuzuno and Toshihiro Yamauchi}, editor = {Ilsun You and Taek{-}Young Youn}, title = {vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {222--234}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_16}, doi = {10.1007/978-3-031-25659-2\_16}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KuzunoY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonKSELLS22, author = {Hyeokdong Kwon and Hyunjun Kim and Minjoo Sim and Siwoo Eum and Minwoo Lee and Wai{-}Kong Lee and Hwajeong Seo}, editor = {Ilsun You and Taek{-}Young Youn}, title = {ARMing-Sword: Scabbard on {ARM}}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {237--250}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_17}, doi = {10.1007/978-3-031-25659-2\_17}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KwonKSELLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeLLJKLCK22, author = {Bora Lee and Kyungchan Lim and JiHo Lee and Chijung Jung and Doowon Kim and Kyu Hyung Lee and Haehyun Cho and Yonghwi Kwon}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {204--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_15}, doi = {10.1007/978-3-031-25659-2\_15}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeLLJKLCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiZLBC22, author = {Wei Li and Xiaoyu Zhang and Shen Lin and Xinbo Ban and Xiaofeng Chen}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Chameleon {DNN} Watermarking: Dynamically Public Model Ownership Verification}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {344--356}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_25}, doi = {10.1007/978-3-031-25659-2\_25}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LiZLBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MurataHGS22, author = {Issei Murata and Pengju He and Yujie Gu and Kouichi Sakurai}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Towards Evaluating the Security of Human Computable Passwords Using Neural Networks}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {303--312}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_22}, doi = {10.1007/978-3-031-25659-2\_22}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MurataHGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhPKPK22, author = {Myung Gyo Oh and Leo Hyun Park and Jaeuk Kim and Jaewoo Park and Taekyoung Kwon}, editor = {Ilsun You and Taek{-}Young Youn}, title = {On Membership Inference Attacks to Generative Language Models Across Language Domains}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {143--155}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_11}, doi = {10.1007/978-3-031-25659-2\_11}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/OhPKPK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PrabowoT22, author = {Theo Fanuela Prabowo and Chik How Tan}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Provably Secure Password-Authenticated Key Exchange Based on {SIDH}}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {16--28}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_2}, doi = {10.1007/978-3-031-25659-2\_2}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/PrabowoT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Shin22, author = {SeongHan Shin}, editor = {Ilsun You and Taek{-}Young Youn}, title = {5G-AKA, Revisited}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {114--127}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_9}, doi = {10.1007/978-3-031-25659-2\_9}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Shin22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ThaiT22, author = {Binh Le Thanh Thai and Hidema Tanaka}, editor = {Ilsun You and Taek{-}Young Youn}, title = {A Novel Metric for Password Security Risk Against Dictionary Attacks}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {291--302}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_21}, doi = {10.1007/978-3-031-25659-2\_21}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ThaiT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangYL22, author = {Lixin Wang and Jianhua Yang and Austin Lee}, editor = {Ilsun You and Taek{-}Young Youn}, title = {An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {77--88}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_6}, doi = {10.1007/978-3-031-25659-2\_6}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WangYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YangJKSS22, author = {Yujin Yang and Kyungbae Jang and Hyunji Kim and Gyeongju Song and Hwajeong Seo}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Grover on {SPARKLE}}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {44--59}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_4}, doi = {10.1007/978-3-031-25659-2\_4}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/YangJKSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhouEK22, author = {Xiaofan Zhou and Simon Yusuf Enoch and Dong Seong Kim}, editor = {Ilsun You and Taek{-}Young Youn}, title = {Markov Decision Process for Automatic Cyber Defense}, booktitle = {Information Security Applications - 23rd International Conference, {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13720}, pages = {313--329}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25659-2\_23}, doi = {10.1007/978-3-031-25659-2\_23}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZhouEK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AlkinoonCM21, author = {Mohammed Alkinoon and Sung J. Choi and David Mohaisen}, editor = {Hyoungshick Kim}, title = {Measuring Healthcare Data Breaches}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {265--277}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_22}, doi = {10.1007/978-3-030-89432-0\_22}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AlkinoonCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AwaludinPK21, author = {Asep Muhamad Awaludin and Derry Pratama and Howon Kim}, editor = {Hyoungshick Kim}, title = {AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {157--168}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_13}, doi = {10.1007/978-3-030-89432-0\_13}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AwaludinPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BaeHL21, author = {Sungho Bae and Chanwoong Hwang and Taejin Lee}, editor = {Hyoungshick Kim}, title = {Research on Improvement of Anomaly Detection Performance in Industrial Control Systems}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {76--87}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_7}, doi = {10.1007/978-3-030-89432-0\_7}, timestamp = {Mon, 13 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/BaeHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiK21, author = {Jeongseok Choi and Hyoungshick Kim}, editor = {Hyoungshick Kim}, title = {On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {39--50}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_4}, doi = {10.1007/978-3-030-89432-0\_4}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiPPK21, author = {Young Ah Choi and Kyung Ho Park and Eunji Park and Huy Kang Kim}, editor = {Hyoungshick Kim}, title = {Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {28--38}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_3}, doi = {10.1007/978-3-030-89432-0\_3}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiPPK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GantaYCP21, author = {Priyatham Ganta and Kicho Yu and Dharma Dheeraj Chintala and Younghee Park}, editor = {Hyoungshick Kim}, title = {Adaptive Network Security Service Orchestration Based on {SDN/NFV}}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {231--242}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_19}, doi = {10.1007/978-3-030-89432-0\_19}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GantaYCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Jang21, author = {Daehee Jang}, editor = {Hyoungshick Kim}, title = {BadASLR: Exceptional Cases of {ASLR} Aiding Exploitation}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {278--289}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_23}, doi = {10.1007/978-3-030-89432-0\_23}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Jang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimKCP21, author = {Jeongwoo Kim and Seoyeon Kang and Eun{-}Sun Cho and Joon{-}Young Paik}, editor = {Hyoungshick Kim}, title = {{LOM:} Lightweight Classifier for Obfuscation Methods}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {3--15}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_1}, doi = {10.1007/978-3-030-89432-0\_1}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimKCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimLS21, author = {Jane Kim and Soojin Lee and Seung{-}Hyun Seo}, editor = {Hyoungshick Kim}, title = {A Privacy-Preserving Payment Model for {EV} Charging}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {255--264}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_21}, doi = {10.1007/978-3-030-89432-0\_21}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimSCBK21, author = {Jongkil Kim and Willy Susilo and Yang{-}Wai Chow and Joonsang Baek and Intae Kim}, editor = {Hyoungshick Kim}, title = {Pattern Matching over Encrypted Data with a Short Ciphertext}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {132--143}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_11}, doi = {10.1007/978-3-030-89432-0\_11}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimSCBK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimSEJSKKLS21, author = {Hyunjun Kim and Minjoo Sim and Siwoo Eum and Kyungbae Jang and Gyeongju Song and Hyunji Kim and Hyeokdong Kwon and Wai{-}Kong Lee and Hwajeong Seo}, editor = {Hyoungshick Kim}, title = {Masked Implementation of {PIPO} Block Cipher on 8-bit {AVR} Microcontrollers}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {171--182}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_14}, doi = {10.1007/978-3-030-89432-0\_14}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimSEJSKKLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwakKS21, author = {YuJin Kwak and YoungBeom Kim and Seog Chung Seo}, editor = {Hyoungshick Kim}, title = {Parallel Implementation of {PIPO} Block Cipher on 32-bit {RISC-V} Processor}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {183--193}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_15}, doi = {10.1007/978-3-030-89432-0\_15}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwakKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonJKKSELS21, author = {Hyeokdong Kwon and Kyungbae Jang and Hyunjun Kim and Hyunji Kim and Minjoo Sim and Siwoo Eum and Wai{-}Kong Lee and Hwajeong Seo}, editor = {Hyoungshick Kim}, title = {ARMed Frodo - FrodoKEM on 64-Bit ARMv8 Processors}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {206--217}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_17}, doi = {10.1007/978-3-030-89432-0\_17}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KwonJKKSELS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LarasatiK21, author = {Harashta Tatimma Larasati and Howon Kim}, editor = {Hyoungshick Kim}, title = {Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {91--104}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_8}, doi = {10.1007/978-3-030-89432-0\_8}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LarasatiK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKS21, author = {Seokmin Lee and Taehun Kim and Youngjoo Shin}, editor = {Hyoungshick Kim}, title = {Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {218--228}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_18}, doi = {10.1007/978-3-030-89432-0\_18}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeY21, author = {KangHoon Lee and Ji Won Yoon}, editor = {Hyoungshick Kim}, title = {Efficient Adaptation of {TFHE} for High End-to-End Throughput}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {144--156}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_12}, doi = {10.1007/978-3-030-89432-0\_12}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuSB21, author = {Xin Liu and Willy Susilo and Joonsang Baek}, editor = {Hyoungshick Kim}, title = {Secure Computation of Shared Secrets and Its Applications}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {119--131}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_10}, doi = {10.1007/978-3-030-89432-0\_10}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LiuSB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoggEK21, author = {Raymond Mogg and Simon Yusuf Enoch and Dong Seong Kim}, editor = {Hyoungshick Kim}, title = {A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {51--63}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_5}, doi = {10.1007/978-3-030-89432-0\_5}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MoggEK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MotteH21, author = {Samuel De La Motte and Jin B. Hong}, editor = {Hyoungshick Kim}, title = {A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {16--27}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_2}, doi = {10.1007/978-3-030-89432-0\_2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MotteH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RheeL21, author = {Hyun Sook Rhee and Dong Hoon Lee}, editor = {Hyoungshick Kim}, title = {Anonymous {IBE} from {PEKS:} {A} Generic Construction}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {105--118}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_9}, doi = {10.1007/978-3-030-89432-0\_9}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RheeL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoLLS21, author = {Chang{-}Bae Seo and Gyuseop Lee and Yeonjoon Lee and Seung{-}Hyun Seo}, editor = {Hyoungshick Kim}, title = {Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {64--75}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_6}, doi = {10.1007/978-3-030-89432-0\_6}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoLLS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoSLA21, author = {Hwajeong Seo and Pakize Sanal and Wai{-}Kong Lee and Reza Azarderakhsh}, editor = {Hyoungshick Kim}, title = {No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit {ARM} Platforms}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {194--205}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_16}, doi = {10.1007/978-3-030-89432-0\_16}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoSLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WenLWW21, author = {Jinghang Wen and Jia{-}Nan Liu and Axin Wu and Jiasi Weng}, editor = {Hyoungshick Kim}, title = {A General Framework for Matching Pattern Hiding in Deep Packet Inspection}, booktitle = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, pages = {243--254}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0\_20}, doi = {10.1007/978-3-030-89432-0\_20}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WenLWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2021, editor = {Hyoungshick Kim}, title = {Information Security Applications - 22nd International Conference, {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13009}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-89432-0}, doi = {10.1007/978-3-030-89432-0}, isbn = {978-3-030-89431-3}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AbusnainaANC0M20, author = {Ahmed Abusnaina and Mohammed Abuhamad and DaeHun Nyang and Songqing Chen and An Wang and David Mohaisen}, editor = {Ilsun You}, title = {Insights into Attacks' Progression: Prediction of Spatio-Temporal Behavior of DDoS Attacks}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {362--374}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_27}, doi = {10.1007/978-3-030-65299-9\_27}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AbusnainaANC0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiS20, author = {Hojin Choi and Seog Chung Seo}, editor = {Ilsun You}, title = {Optimization of {PBKDF2-HMAC-SHA256} and {PBKDF2-HMAC-LSH256} in {CPU} Environments}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {321--333}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_24}, doi = {10.1007/978-3-030-65299-9\_24}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoiS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DuttaSDB020, author = {Priyanka Dutta and Willy Susilo and Dung Hoang Duong and Joonsang Baek and Partha Sarathi Roy}, editor = {Ilsun You}, title = {Identity-Based Unidirectional Proxy Re-encryption in Standard Model: {A} Lattice-Based Construction}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {245--257}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_19}, doi = {10.1007/978-3-030-65299-9\_19}, timestamp = {Mon, 08 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/DuttaSDB020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HanzawaK20, author = {Akihiro Hanzawa and Hiroaki Kikuchi}, editor = {Ilsun You}, title = {Analysis on Malicious Residential Hosts Activities Exploited by Residential {IP} Proxy Services}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {349--361}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_26}, doi = {10.1007/978-3-030-65299-9\_26}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HanzawaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IchiokaPMNY20, author = {Shuichi Ichioka and Estelle Pouget and Takao Mimura and Jun Nakajima and Toshihiro Yamauchi}, editor = {Ilsun You}, title = {Accessibility Service Utilization Rates in Android Applications Shared on Twitter}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {101--111}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_8}, doi = {10.1007/978-3-030-65299-9\_8}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/IchiokaPMNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JangCKHS20, author = {Kyoungbae Jang and Seung Ju Choi and Hyeokdong Kwon and Zhi Hu and Hwajeong Seo}, editor = {Ilsun You}, title = {Impact of Optimized Operations A{\(\cdot\)} B, A{\(\cdot\)} {C} for Binary Field Inversion on Quantum Computers}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {154--166}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_12}, doi = {10.1007/978-3-030-65299-9\_12}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/JangCKHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeonY20, author = {Youngbae Jeon and Ji Won Yoon}, editor = {Ilsun You}, title = {Filtering-Based Correlation Power Analysis {(CPA)} with Signal Envelopes Against Shuffling Methods}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {389--402}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_29}, doi = {10.1007/978-3-030-65299-9\_29}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JeonY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimJP20, author = {Sung{-}Kyung Kim and Eun{-}Tae Jang and Ki{-}Woong Park}, editor = {Ilsun You}, title = {Toward a Fine-Grained Evaluation of the Pwnable {CTF}}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {179--190}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_14}, doi = {10.1007/978-3-030-65299-9\_14}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimJP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimKMSLK20, author = {Yongsu Kim and Hyoeun Kang and Afifatul Mukaroh and Naufal Suryanto and Harashta Tatimma Larasati and Howon Kim}, editor = {Ilsun You}, title = {Spatially Localized Perturbation {GAN} {(SLP-GAN)} for Generating Invisible Adversarial Patches}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {3--15}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_1}, doi = {10.1007/978-3-030-65299-9\_1}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimKMSLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimPKJCS20, author = {Hyunji Kim and Jaehoon Park and Hyeokdong Kwon and Kyoungbae Jang and Seungju Choi and Hwajeong Seo}, editor = {Ilsun You}, title = {Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of Things}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {16--30}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_2}, doi = {10.1007/978-3-030-65299-9\_2}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimPKJCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimS20, author = {YoungBeom Kim and Seog Chung Seo}, editor = {Ilsun You}, title = {An Efficient Implementation of {AES} on 8-Bit AVR-Based Sensor Nodes}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {276--290}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_21}, doi = {10.1007/978-3-030-65299-9\_21}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KoderaCM20, author = {Kenta Kodera and Chen{-}Mou Cheng and Atsuko Miyaji}, editor = {Ilsun You}, title = {Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery Curves}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {258--275}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_20}, doi = {10.1007/978-3-030-65299-9\_20}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KoderaCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonKCJPKS20, author = {Hyeokdong Kwon and Hyunji Kim and Seungju Choi and Kyoungbae Jang and Jaehoon Park and Hyunjun Kim and Hwajeong Seo}, editor = {Ilsun You}, title = {Compact Implementation of {CHAM} Block Cipher on Low-End Microcontrollers}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {127--141}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_10}, doi = {10.1007/978-3-030-65299-9\_10}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KwonKCJPKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeH20, author = {JongHyeok Lee and Dong{-}Guk Han}, editor = {Ilsun You}, title = {{DLDDO:} Deep Learning to Detect Dummy Operations}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {73--85}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_6}, doi = {10.1007/978-3-030-65299-9\_6}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKL20, author = {Chaeeun Lee and Eunnarae Ko and Kyungho Lee}, editor = {Ilsun You}, title = {Methods to Select Features for Android Malware Detection Based on the Protection Level Analysis}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {375--386}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_28}, doi = {10.1007/978-3-030-65299-9\_28}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Liu0ZS20, author = {Naiwei Liu and Meng Yu and Wanyu Zang and Ravi S. Sandhu}, editor = {Ilsun You}, title = {On the Cost-Effectiveness of TrustZone Defense on {ARM} Platform}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {203--214}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_16}, doi = {10.1007/978-3-030-65299-9\_16}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Liu0ZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MeraoucheDS20, author = {Ishak Meraouche and Sabyasachi Dutta and Kouichi Sakurai}, editor = {Ilsun You}, title = {3-Party Adversarial Steganography}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {89--100}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_7}, doi = {10.1007/978-3-030-65299-9\_7}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MeraoucheDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MinLPSL20, author = {Moohong Min and Jemin Justin Lee and Hyunbeom Park and Hyojoung Shin and Kyungho Lee}, editor = {Ilsun You}, title = {A Statistical Approach Towards Fraud Detection in the Horse Racing}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {191--202}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_15}, doi = {10.1007/978-3-030-65299-9\_15}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MinLPSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NaPJ020, author = {Dongbin Na and Namgyu Park and Sangwoo Ji and Jong Kim}, editor = {Ilsun You}, title = {CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial CAPTCHAs}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {31--44}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_3}, doi = {10.1007/978-3-030-65299-9\_3}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/NaPJ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkCPCKY20, author = {Seongmin Park and HyungJin Cho and Youngkwon Park and Bomin Choi and Dowon Kim and Kangbin Yim}, editor = {Ilsun You}, title = {Security Problems of 5G Voice Communication}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {403--415}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_30}, doi = {10.1007/978-3-030-65299-9\_30}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkCPCKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkL20, author = {Semi Park and Kyungho Lee}, editor = {Ilsun You}, title = {The Gravy Value: {A} Set of Features for Pinpointing {BOT} Detection Method}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {142--153}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_11}, doi = {10.1007/978-3-030-65299-9\_11}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkPK20, author = {Kyung Ho Park and Eunji Park and Huy Kang Kim}, editor = {Ilsun You}, title = {Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle with Less Labeling Effort}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {45--58}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_4}, doi = {10.1007/978-3-030-65299-9\_4}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Peng20, author = {Kun Peng}, editor = {Ilsun You}, title = {Paid and Anonymous Usage of Cloud Software}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {308--320}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_23}, doi = {10.1007/978-3-030-65299-9\_23}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Peng20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShimJ20, author = {Hyunseok Shim and Souhwan Jung}, editor = {Ilsun You}, title = {Entropy-Based Feature Grouping in Machine Learning for Android Malware Classification}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {59--72}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_5}, doi = {10.1007/978-3-030-65299-9\_5}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ShimJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShiuLLH20, author = {Hung{-}Jr Shiu and Fang{-}Yie Leu and Chun{-}Ming Lai and Yu{-}Chun Huang}, editor = {Ilsun You}, title = {Novel Reversible Acoustic Steganography Based on Carrier Orthogonality}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {112--123}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_9}, doi = {10.1007/978-3-030-65299-9\_9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ShiuLLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangINT20, author = {Yacheng Wang and Yasuhiko Ikematsu and Shuhei Nakamura and Tsuyoshi Takagi}, editor = {Ilsun You}, title = {Revisiting the Minrank Problem on Multivariate Cryptography}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {291--307}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_22}, doi = {10.1007/978-3-030-65299-9\_22}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WangINT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WonJB20, author = {Yoo{-}Seung Won and Dirmanto Jap and Shivam Bhasin}, editor = {Ilsun You}, title = {Push for More: On Comparison of Data Augmentation and {SMOTE} with Optimised Deep Learning Architecture for Side-Channel}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {227--241}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_18}, doi = {10.1007/978-3-030-65299-9\_18}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WonJB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WongY20, author = {Shing Ki Wong and Siu{-}Ming Yiu}, editor = {Ilsun You}, title = {Detection on {GPS} Spoofing in Location Based Mobile Games}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {215--226}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_17}, doi = {10.1007/978-3-030-65299-9\_17}, timestamp = {Thu, 17 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WongY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YoonNHJ20, author = {Jaehyeon Yoon and Ngoc{-}Tu Chau and Hoang Nguyen Huy and Souhwan Jung}, editor = {Ilsun You}, title = {Virtualization Technologies in the Android Framework and Compatibility with SEAndroid}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {167--178}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_13}, doi = {10.1007/978-3-030-65299-9\_13}, timestamp = {Mon, 21 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/YoonNHJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhangLHZJ20, author = {Yanhua Zhang and Ximeng Liu and Yupu Hu and Qikun Zhang and Huiwen Jia}, editor = {Ilsun You}, title = {Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {334--346}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_25}, doi = {10.1007/978-3-030-65299-9\_25}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZhangLHZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2019, editor = {Ilsun You}, title = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-39303-8}, doi = {10.1007/978-3-030-39303-8}, isbn = {978-3-030-39302-1}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2020, editor = {Ilsun You}, title = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9}, doi = {10.1007/978-3-030-65299-9}, isbn = {978-3-030-65298-2}, timestamp = {Sat, 12 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/0001MKWLN19, author = {Jeman Park and Aziz Mohaisen and Charles A. Kamhoua and Michael J. Weisman and Nandi O. Leslie and Laurent Njilla}, editor = {Ilsun You}, title = {Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {299--312}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_23}, doi = {10.1007/978-3-030-39303-8\_23}, timestamp = {Tue, 28 Jan 2020 10:04:20 +0100}, biburl = {https://dblp.org/rec/conf/wisa/0001MKWLN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiV19, author = {Gwangbae Choi and Serge Vaudenay}, editor = {Ilsun You}, title = {Timed-Release Encryption with Master Time Bound Key}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {167--179}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_13}, doi = {10.1007/978-3-030-39303-8\_13}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoiV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChowSBK19, author = {Yang{-}Wai Chow and Willy Susilo and Joonsang Baek and Jongkil Kim}, editor = {Ilsun You}, title = {{QR} Code Watermarking for Digital Images}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {25--37}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_3}, doi = {10.1007/978-3-030-39303-8\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChowSBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Dutta0FKS19, author = {Sabyasachi Dutta and Partha Sarathi Roy and Kazuhide Fukushima and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Ilsun You}, title = {Secret Sharing on Evolving Multi-level Access Structure}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {180--191}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_14}, doi = {10.1007/978-3-030-39303-8\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Dutta0FKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HalgasAN19, author = {Lukas Halgas and Ioannis Agrafiotis and Jason R. C. Nurse}, editor = {Ilsun You}, title = {Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs)}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {219--233}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_17}, doi = {10.1007/978-3-030-39303-8\_17}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HalgasAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongY19, author = {Miyeon Hong and Ji Won Yoon}, editor = {Ilsun You}, title = {Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {155--166}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_12}, doi = {10.1007/978-3-030-39303-8\_12}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HongY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimBSC19, author = {Jongkil Kim and Joonsang Baek and Willy Susilo and Yang{-}Wai Chow}, editor = {Ilsun You}, title = {Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {206--216}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_16}, doi = {10.1007/978-3-030-39303-8\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimBSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimWLS19, author = {Hyuntae Kim and Seongil Wi and Hyunjoo Lee and Sooel Son}, editor = {Ilsun You}, title = {{FSF:} Code Coverage-Driven Fuzzing for Software-Defined Networking}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {41--54}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_4}, doi = {10.1007/978-3-030-39303-8\_4}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimWLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimYC19, author = {Taehyuk Kim and Taek{-}Young Youn and Dooho Choi}, editor = {Ilsun You}, title = {Is It Possible to Hide My Key into Deep Neural Network?}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {259--272}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_20}, doi = {10.1007/978-3-030-39303-8\_20}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KoJ019, author = {Youngjoo Ko and Sangwoo Ji and Jong Kim}, editor = {Ilsun You}, title = {Low-Noise {LLC} Side-Channel Attack with Perf}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {328--340}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_25}, doi = {10.1007/978-3-030-39303-8\_25}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KoJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonYP19, author = {Hyun Kwon and Hyunsoo Yoon and Ki{-}Woong Park}, editor = {Ilsun You}, title = {{CAPTCHA} Image Generation Using Style Transfer Learning in Deep Neural Network}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {234--246}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_18}, doi = {10.1007/978-3-030-39303-8\_18}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonYP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeDS19, author = {Huy Quoc Le and Dung Hoang Duong and Willy Susilo}, editor = {Ilsun You}, title = {A Blind Ring Signature Based on the Short Integer Solution Problem}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {92--111}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_8}, doi = {10.1007/978-3-030-39303-8\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeDS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeHKH19, author = {Jinhee Lee and Younggee Hong and Hyunsoo Kwon and Junbeom Hur}, editor = {Ilsun You}, title = {Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {357--369}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_27}, doi = {10.1007/978-3-030-39303-8\_27}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeHKH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeOKC19, author = {Sangjae Lee and Mi{-}Kyung Oh and Yousung Kang and Dooho Choi}, editor = {Ilsun You}, title = {{RC} {PUF:} {A} Low-Cost and an Easy-to-Design {PUF} for Resource-Constrained IoT Devices}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {275--285}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_21}, doi = {10.1007/978-3-030-39303-8\_21}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeOKC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LohHTK19, author = {Jia{-}Ch'ng Loh and Swee{-}Huay Heng and Syh{-}Yuan Tan and Kaoru Kurosawa}, editor = {Ilsun You}, title = {A Note on the Invisibility and Anonymity of Undeniable Signature Schemes}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {112--125}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_9}, doi = {10.1007/978-3-030-39303-8\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LohHTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MatheuPRS19, author = {Sara Nieves Matheu and Salvador P{\'{e}}rez and Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and Antonio F. Skarmeta}, editor = {Ilsun You}, title = {On the Automation of Security Testing for IoT Constrained Scenarios}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {286--298}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_22}, doi = {10.1007/978-3-030-39303-8\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MatheuPRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NamJM19, author = {Sungyup Nam and Seungho Jeon and Jongsub Moon}, editor = {Ilsun You}, title = {A New Password Cracking Model with Generative Adversarial Networks}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {247--258}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_19}, doi = {10.1007/978-3-030-39303-8\_19}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/NamJM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkKKCPSKK19, author = {Minkyung Park and Jeongnyeo Kim and Youngho Kim and Eunsang Cho and Soobin Park and Sungmin Sohn and Minhyeok Kang and Ted "Taekyoung" Kwon}, editor = {Ilsun You}, title = {An SGX-Based Key Management Framework for Data Centric Networking}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {370--382}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_28}, doi = {10.1007/978-3-030-39303-8\_28}, timestamp = {Wed, 18 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkKKCPSKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkLK19, author = {Kyung Ho Park and Eunjo Lee and Huy Kang Kim}, editor = {Ilsun You}, title = {Show Me Your Account: Detecting {MMORPG} Game Bot Leveraging Financial Analysis with {LSTM}}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {3--13}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_1}, doi = {10.1007/978-3-030-39303-8\_1}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkLK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PereraNHY19, author = {Maharage Nisansala Sevwandi Perera and Toru Nakamura and Masayuki Hashimoto and Hiroyuki Yokoyama}, editor = {Ilsun You}, title = {Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with {VLR}}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {126--140}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_10}, doi = {10.1007/978-3-030-39303-8\_10}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/PereraNHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoJA19, author = {Hwajeong Seo and Amir Jalali and Reza Azarderakhsh}, editor = {Ilsun You}, title = {Optimized {SIKE} Round 2 on 64-bit {ARM}}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {341--353}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_26}, doi = {10.1007/978-3-030-39303-8\_26}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoJA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoJL19, author = {Jeongeun Seo and Minhee Joo and Kyungho Lee}, editor = {Ilsun You}, title = {Turn On the Lights: User Behavior in Game Environment Using {CPTED}}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {14--24}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_2}, doi = {10.1007/978-3-030-39303-8\_2}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoKKKCKJ19, author = {Hwajeong Seo and Hyeokdong Kwon and Yongbeen Kwon and Kyungho Kim and Seungju Choi and Hyunjun Kim and Kyoungbae Jang}, editor = {Ilsun You}, title = {Ring-LWE on 8-Bit {AVR} Embedded Processor}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {315--327}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_24}, doi = {10.1007/978-3-030-39303-8\_24}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoKKKCKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Shin0HIKOKT19, author = {SeongHan Shin and Shota Yamada and Goichiro Hanaoka and Yusuke Ishida and Atsushi Kunii and Junichi Oketani and Shimpei Kunii and Kiyoshi Tomomura}, editor = {Ilsun You}, title = {An Extended {CTRT} for {AES-256}}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {79--91}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_7}, doi = {10.1007/978-3-030-39303-8\_7}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Shin0HIKOKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Shin19, author = {SeongHan Shin}, editor = {Ilsun You}, title = {Strengthened {PAKE} Protocols Secure Against Malicious Private Key Generator}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {192--205}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_15}, doi = {10.1007/978-3-030-39303-8\_15}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Shin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SimsekBSSKAAO19, author = {Goksel Simsek and Hakan Bostan and Alper Kaan Sarica and Egemen Sarikaya and Alperen Keles and Pelin Angin and Hande Alemdar and Ertan Onur}, editor = {Ilsun You}, title = {DroPPPP: {A} {P4} Approach to Mitigating DoS Attacks in {SDN}}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {55--66}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_5}, doi = {10.1007/978-3-030-39303-8\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SimsekBSSKAAO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WuCZT19, author = {Hao{-}Tian Wu and Yiu{-}ming Cheung and Zhenwei Zhuang and Shaohua Tang}, editor = {Ilsun You}, title = {Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {141--154}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_11}, doi = {10.1007/978-3-030-39303-8\_11}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WuCZT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZengHY19, author = {Gongxian Zeng and Meiqi He and Siu{-}Ming Yiu}, editor = {Ilsun You}, title = {A Secure and Self-tallying E-voting System Based on Blockchain}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {67--76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_6}, doi = {10.1007/978-3-030-39303-8\_6}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZengHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2018, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17982-3}, doi = {10.1007/978-3-030-17982-3}, isbn = {978-3-030-17981-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AnCK18, author = {Hyeongcheol An and Rakyong Choi and Kwangjo Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Blockchain-Based Decentralized Key Management System with Quantum Resistance}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {229--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_18}, doi = {10.1007/978-3-030-17982-3\_18}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AnCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoCKHR18, author = {Geumhwan Cho and Jusop Choi and Hyoungshick Kim and Sangwon Hyun and Jungwoo Ryoo}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Threat Modeling and Analysis of Voice Assistant Applications}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {197--209}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_16}, doi = {10.1007/978-3-030-17982-3\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoCKHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongLLCCC18, author = {Jina Hong and JinKi Lee and HyunKyu Lee and YoonHa Chang and KwangHo Choi and Sang Kil Cha}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {AlertVision: Visualizing Security Alerts}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {173--184}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_14}, doi = {10.1007/978-3-030-17982-3\_14}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongLLCCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ImamuraO18, author = {Mitsuyoshi Imamura and Kazumasa Omote}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {117--128}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_10}, doi = {10.1007/978-3-030-17982-3\_10}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ImamuraO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimEHLN18, author = {SungCheol Kim and IeckChae Euom and ChangHyun Ha and JooHyoung Lee and BongNam Noh}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A Study on the Vulnerability Assessment for Digital I{\&}C System in Nuclear Power Plant}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {68--80}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_6}, doi = {10.1007/978-3-030-17982-3\_6}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimEHLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimK18, author = {Kunwoo Kim and Jungduk Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A Study on Analyzing Risk Scenarios About Vulnerabilities of Security Monitoring System: Focused on Information Leakage by Insider}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {159--170}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_13}, doi = {10.1007/978-3-030-17982-3\_13}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KobayashiH18, author = {Takumi Kobayashi and Keisuke Hakuta}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {213--228}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_17}, doi = {10.1007/978-3-030-17982-3\_17}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KobayashiH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KoderaKKN18, author = {Yuta Kodera and Minoru Kuribayashi and Takuya Kusaka and Yasuyuki Nogami}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {241--252}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_19}, doi = {10.1007/978-3-030-17982-3\_19}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KoderaKKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonKYC18, author = {Hyun Kwon and Yongchul Kim and Hyunsoo Yoon and Daeseon Choi}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {42--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_4}, doi = {10.1007/978-3-030-17982-3\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonKYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Lee18, author = {Jong{-}Kwan Lee}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {{IP} Address Mutation Scheme Using Vector Projection for Tactical Wireless Networks}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {81--92}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_7}, doi = {10.1007/978-3-030-17982-3\_7}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Lee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeJK18, author = {Sanghak Lee and Sangwoo Ji and Jong Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {3--15}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_1}, doi = {10.1007/978-3-030-17982-3\_1}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeJK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeK18, author = {Sooyeon Lee and Huy Kang Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {ADSaS: Comprehensive Real-Time Anomaly Detection System}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {29--41}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_3}, doi = {10.1007/978-3-030-17982-3\_3}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeSL18, author = {Jae{-}Yung Lee and Jae Hyuk Suk and Dong Hoon Lee}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {{VODKA:} Virtualization Obfuscation Using Dynamic Key Approach}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {131--145}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_11}, doi = {10.1007/978-3-030-17982-3\_11}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NanjoKSKN18, author = {Yuki Nanjo and Md. Al{-}Amin Khandaker and Masaaki Shirase and Takuya Kusaka and Yasuyuki Nogami}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Efficient Ate-Based Pairing over the Attractive Classes of {BN} Curves}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {55--67}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_5}, doi = {10.1007/978-3-030-17982-3\_5}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NanjoKSKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhK18, author = {Saeyoung Oh and Jong Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {146--158}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_12}, doi = {10.1007/978-3-030-17982-3\_12}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RatchasanW18, author = {Trust Ratchasan and Rungrat Wiangsripanawan}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {HapticPoints: The Extended PassPoints Graphical Password}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {16--28}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_2}, doi = {10.1007/978-3-030-17982-3\_2}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/RatchasanW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoAK18, author = {Hwajeong Seo and Kyuhwang An and Hyeokdong Kwon}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Compact {LEA} and {HIGHT} Implementations on 8-Bit {AVR} and 16-Bit {MSP} Processors}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {253--265}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_20}, doi = {10.1007/978-3-030-17982-3\_20}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SeoAK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoAKPHK18, author = {Hwajeong Seo and Kyuhwang An and Hyeokdong Kwon and Taehwan Park and Zhi Hu and Howon Kim}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Parallel Implementations of {CHAM}}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {93--104}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_8}, doi = {10.1007/978-3-030-17982-3\_8}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoAKPHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShimY18, author = {Shinwoo Shim and Ji Won Yoon}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {185--196}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_15}, doi = {10.1007/978-3-030-17982-3\_15}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShimY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YooSY18, author = {Joon Soo Yoo and Baek Kyung Song and Ji Won Yoon}, editor = {Brent ByungHoon Kang and Jin Soo Jang}, title = {Logarithm Design on Encrypted Data with Bitwise Operation}, booktitle = {Information Security Applications - 19th International Conference, {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11402}, pages = {105--116}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-17982-3\_9}, doi = {10.1007/978-3-030-17982-3\_9}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YooSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2017, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93563-8}, doi = {10.1007/978-3-319-93563-8}, isbn = {978-3-319-93562-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AminantoK17, author = {Muhamad Erza Aminanto and Kwangjo Kim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {212--223}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_18}, doi = {10.1007/978-3-319-93563-8\_18}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AminantoK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BiWW17, author = {Jingguo Bi and Mingqiang Wang and Wei Wei}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {An Improved Algorithm to Solve the Systems of Univariate Modular Equations}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {51--60}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_5}, doi = {10.1007/978-3-319-93563-8\_5}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BiWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BoehmKH17, author = {Vanesco A. J. Boehm and Jong Kim and James Won{-}Ki Hong}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Holistic Tracking of Products on the Blockchain Using {NFC} and Verified Users}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {184--195}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_16}, doi = {10.1007/978-3-319-93563-8\_16}, timestamp = {Sat, 30 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BoehmKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FiroozjaeiLK17, author = {Mahdi Daghmehchi Firoozjaei and Sangmin Lee and Hyoungshick Kim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {O\({}^{\mbox{2}}\)TR: Offline Off-the-Record {(OTR)} Messaging}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {61--71}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_6}, doi = {10.1007/978-3-319-93563-8\_6}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FiroozjaeiLK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GrimmARBH17, author = {Jonathan Grimm and Irfan Ahmed and Vassil Roussev and Manish Bhatt and Manpyo Hong}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Automatic Mitigation of Kernel Rootkits in Cloud Environments}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {137--149}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_12}, doi = {10.1007/978-3-319-93563-8\_12}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GrimmARBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HouJPL17, author = {Jong{-}Uk Hou and Han{-}Ul Jang and Jin{-}Seok Park and Heung{-}Kyu Lee}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural Networks}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {16--24}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_2}, doi = {10.1007/978-3-319-93563-8\_2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HouJPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HouYSL17, author = {Jong{-}Uk Hou and In{-}Jae Yu and Hyun{-}Ji Song and Heung{-}Kyu Lee}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint Code}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {25--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_3}, doi = {10.1007/978-3-319-93563-8\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HouYSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HwangK17, author = {Da Mi Hwang and In Seok Kim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and Recapture}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {310--322}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_26}, doi = {10.1007/978-3-319-93563-8\_26}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HwangK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JohSKK17, author = {Jungwoo Joh and Yezee Seo and Hoon{-}Kyu Kim and Taekyoung Kwon}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Glitch Recall: {A} Hardware Trojan Exploiting Natural Glitches in Logic Circuits}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {150--161}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_13}, doi = {10.1007/978-3-319-93563-8\_13}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/JohSKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KasuyaS17, author = {Momoka Kasuya and Kazuo Sakiyama}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Improved {EM} Side-Channel Authentication Using Profile-Based {XOR} Model}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {173--183}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_15}, doi = {10.1007/978-3-319-93563-8\_15}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KasuyaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimLY17, author = {Hyunki Kim and Jae{-}Hoon Lee and Okyeon Yi}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Key Managements of Underwater Acoustic Communication Environments}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {274--282}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_23}, doi = {10.1007/978-3-319-93563-8\_23}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKL17, author = {Keun Young Lee and Hun Yeong Kwon and Jong In Lim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {323--335}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_27}, doi = {10.1007/978-3-319-93563-8\_27}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeLS17, author = {Minsu Lee and Hyun{-}Gu Lee and Ji Sun Shin}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Evolution of Spamming Attacks on Facebook}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {101--111}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_9}, doi = {10.1007/978-3-319-93563-8\_9}, timestamp = {Tue, 10 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeY17, author = {Saetbyeol Lee and Jiwon Yoon}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted Images}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {115--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_10}, doi = {10.1007/978-3-319-93563-8\_10}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeYC17, author = {Namsup Lee and Hyunsoo Yoon and Daeseon Choi}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural Network}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {297--309}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_25}, doi = {10.1007/978-3-319-93563-8\_25}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeYC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiP17, author = {Haoyu Li and Yanbin Pan}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {The Search Successive Minima Problem Is Equivalent to Its Optimization Version}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {39--50}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_4}, doi = {10.1007/978-3-319-93563-8\_4}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MaL17, author = {Sha Ma and Yunhao Ling}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {A General Two-Server Cryptosystem Supporting Complex Queries}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {249--260}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_21}, doi = {10.1007/978-3-319-93563-8\_21}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MaL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MiyamotoSS17, author = {Eito Miyamoto and Takeshi Sugawara and Kazuo Sakiyama}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's {DSP} {TMS320C6678}}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {261--273}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_22}, doi = {10.1007/978-3-319-93563-8\_22}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MiyamotoSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NguyenMT17, author = {Son Duc Nguyen and Mamoru Mimura and Hidema Tanaka}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Abusing {TCP} Retransmission for DoS Attack Inside Virtual Network}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {199--211}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_17}, doi = {10.1007/978-3-319-93563-8\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NguyenMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhLY17, author = {Insu Oh and Kyungroul Lee and Kangbin Yim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos Function}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {236--245}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_20}, doi = {10.1007/978-3-319-93563-8\_20}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkPL17, author = {Mookyu Park and Moosung Park and Kyungho Lee}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {224--235}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_19}, doi = {10.1007/978-3-319-93563-8\_19}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkSLKNK17, author = {Taehwan Park and Hwajeong Seo and Garam Lee and Md. Al{-}Amin Khandaker and Yasuyuki Nogami and Howon Kim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Parallel Implementations of {SIMON} and SPECK, Revisited}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {283--294}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_24}, doi = {10.1007/978-3-319-93563-8\_24}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkSLKNK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkY017, author = {Joon Young Park and Jong Pil Yun and Dong Hoon Lee}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {WheelLogger: Driver Tracing Using Smart Watch}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {87--100}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_8}, doi = {10.1007/978-3-319-93563-8\_8}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkY017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoPJHK17, author = {Hwajeong Seo and Taehwan Park and Janghyun Ji and Zhi Hu and Howon Kim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {{ARM/NEON} Co-design of Multiplication/Squaring}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {72--84}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_7}, doi = {10.1007/978-3-319-93563-8\_7}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoPJHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoPJK17, author = {Hwajeong Seo and Taehwan Park and Janghyun Ji and Howon Kim}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {3--15}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_1}, doi = {10.1007/978-3-319-93563-8\_1}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoPJK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WooPL17, author = {Jae Hyeon Woo and Moosung Park and Kyungho Lee}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Breaking Text {CAPTCHA} by Repeated Information}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {127--136}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_11}, doi = {10.1007/978-3-319-93563-8\_11}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WooPL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YoonYJ17, author = {Kwon{-}Jin Yoon and Jaehyeon Yoon and Souhwan Jung}, editor = {Brent ByungHoon Kang and Taesoo Kim}, title = {Design and Implementation of Android Container Monitoring Server and Agent}, booktitle = {Information Security Applications - 18th International Conference, {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10763}, pages = {162--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-93563-8\_14}, doi = {10.1007/978-3-319-93563-8\_14}, timestamp = {Wed, 27 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YoonYJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2016, editor = {Dooho Choi and Sylvain Guilley}, title = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56549-1}, doi = {10.1007/978-3-319-56549-1}, isbn = {978-3-319-56548-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AminantoK16, author = {Muhamad Erza Aminanto and Kwangjo Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {136--147}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_12}, doi = {10.1007/978-3-319-56549-1\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AminantoK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChaK16, author = {Seunghun Cha and Hyoungshick Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Detecting Encrypted Traffic: {A} Machine Learning Approach}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {54--65}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_5}, doi = {10.1007/978-3-319-56549-1\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiPHPK16, author = {Jongseok Choi and Jong{-}gyu Park and Shinwook Heo and Namje Park and Howon Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Slowloris DoS Countermeasure over WebSocket}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {42--53}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_4}, doi = {10.1007/978-3-319-56549-1\_4}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoiPHPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FaugereP16, author = {Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, editor = {Dooho Choi and Sylvain Guilley}, title = {The Quantum-Safe Revolution}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {258--266}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_22}, doi = {10.1007/978-3-319-56549-1\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FaugereP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FengHS16, author = {Yaokai Feng and Yoshiaki Hori and Kouichi Sakurai}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {79--89}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_7}, doi = {10.1007/978-3-319-56549-1\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FengHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GiaoLMK16, author = {Pham Ngoc Giao and Suk{-}Hwan Lee and Kwang{-}Seok Moon and Ki{-}Ryong Kwon}, editor = {Dooho Choi and Sylvain Guilley}, title = {{GIS} Vector Map Perceptual Encryption Scheme Using Geometric Objects}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {210--220}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_18}, doi = {10.1007/978-3-319-56549-1\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GiaoLMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HomoliakSH16, author = {Ivan Homoliak and Ladislav Sulak and Petr Han{\'{a}}cek}, editor = {Dooho Choi and Sylvain Guilley}, title = {Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {66--78}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_6}, doi = {10.1007/978-3-319-56549-1\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HomoliakSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongKHKCLK16, author = {Hyunwook Hong and Hongil Kim and Byeongdo Hong and Dongkwan Kim and Hyunwoo Choi and Eunkyu Lee and Yongdae Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Pay as You Want: Bypassing Charging System in Operational Cellular Networks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {148--160}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_13}, doi = {10.1007/978-3-319-56549-1\_13}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HongKHKCLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JegedeUAM16, author = {Abayomi Jegede and Nur Izura Udzir and Azizol Abdullah and Ramlan Mahmod}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {341--352}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_29}, doi = {10.1007/978-3-319-56549-1\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JegedeUAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeongKSH16, author = {Jongmin Jeong and Hyunsoo Kwon and Hyungjune Shin and Junbeom Hur}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Practical Analysis of {TLS} Vulnerabilities in Korea Web Environment}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {112--123}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_10}, doi = {10.1007/978-3-319-56549-1\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JeongKSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JungKY16, author = {Jisoo Jung and Joo{-}Im Kim and Ji Won Yoon}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {198--209}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_17}, doi = {10.1007/978-3-319-56549-1\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JungKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KhandakerNSD16, author = {Md. Al{-}Amin Khandaker and Yasuyuki Nogami and Hwajeong Seo and Sylvain Duquesne}, editor = {Dooho Choi and Sylvain Guilley}, title = {Efficient Scalar Multiplication for Ate Based Pairing over {KSS} Curve of Embedding Degree 18}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {221--232}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_19}, doi = {10.1007/978-3-319-56549-1\_19}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KhandakerNSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KosugeT16, author = {Haruhisa Kosuge and Hidema Tanaka}, editor = {Dooho Choi and Sylvain Guilley}, title = {Algebraic Degree Estimation for Integral Attack by Randomized Algorithm}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {292--304}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_25}, doi = {10.1007/978-3-319-56549-1\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KosugeT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KownJLDBC16, author = {Su{-}kyung Kown and Bongsoo Jang and Byoung{-}Dai Lee and Younghae Do and Hunki Baek and Yoon{-}Ho Choi}, editor = {Dooho Choi and Sylvain Guilley}, title = {Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {90--101}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_8}, doi = {10.1007/978-3-319-56549-1\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KownJLDBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonKSCK16, author = {Yujin Kwon and Dohyun Kim and Yunmok Son and Jaeyeong Choi and Yongdae Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {124--135}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_11}, doi = {10.1007/978-3-319-56549-1\_11}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonKSCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeP16, author = {Donghyeok Lee and Namje Park}, editor = {Dooho Choi and Sylvain Guilley}, title = {Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {376--387}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_32}, doi = {10.1007/978-3-319-56549-1\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeRKJ16, author = {Sung{-}Hoon Lee and Jong{-}Hyuk Roh and Soo{-}Hyung Kim and Seung{-}Hun Jin}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {366--375}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_31}, doi = {10.1007/978-3-319-56549-1\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeRKJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuCK16, author = {Xinyu Liu and Beumjin Cho and Jong Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {{SD-OVS:} {SYN} Flooding Attack Defending Open vSwitch for {SDN}}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {29--41}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_3}, doi = {10.1007/978-3-319-56549-1\_3}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenKR16, author = {Aziz Mohaisen and Ah Reum Kang and Kui Ren}, editor = {Dooho Choi and Sylvain Guilley}, title = {Does Query Blocking Improve {DNS} Privacy? - Quantifying Privacy Under Partial Blocking Deployment}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_1}, doi = {10.1007/978-3-319-56549-1\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhKC16, author = {Eun Oh and Tae{-}Sung Kim and Tae{-}Hee Cho}, editor = {Dooho Choi and Sylvain Guilley}, title = {Development of Information Security Management Assessment Model for the Financial Sector}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {186--197}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_16}, doi = {10.1007/978-3-319-56549-1\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhKK16, author = {Sanghak Oh and Eunsoo Kim and Hyoungshick Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Empirical Analysis of {SSL/TLS} Weaknesses in Real Websites: Who Cares?}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {174--185}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_15}, doi = {10.1007/978-3-319-56549-1\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhLC16, author = {Seung{-}Hee Oh and Byung{-}Gil Lee and Byungho Chung}, editor = {Dooho Choi and Sylvain Guilley}, title = {The Vessel Trajectory Mechanism for Marine Accidents Analysis}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {388--396}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_33}, doi = {10.1007/978-3-319-56549-1\_33}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/OhLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Picek16, author = {Stjepan Picek}, editor = {Dooho Choi and Sylvain Guilley}, title = {Applications of Soft Computing in Cryptology}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {305--317}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_26}, doi = {10.1007/978-3-319-56549-1\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Picek16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RuffellHKK16, author = {Matthew Ruffell and Jin B. Hong and Hyoungshick Kim and Dong Seong Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Towards Automated Exploit Generation for Embedded Systems}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {161--173}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_14}, doi = {10.1007/978-3-319-56549-1\_14}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RuffellHKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Sadiah016, author = {Shahidatul Sadiah and Toru Nakanishi}, editor = {Dooho Choi and Sylvain Guilley}, title = {Revocable Group Signatures with Compact Revocation List Using Vector Commitments}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {245--257}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_21}, doi = {10.1007/978-3-319-56549-1\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Sadiah016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoPHSBHZNZK16, author = {Hwajeong Seo and Taehwan Park and Shinwook Heo and Gyuwon Seo and Bongjin Bae and Zhi Hu and Lu Zhou and Yasuyuki Nogami and Youwen Zhu and Howon Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Parallel Implementations of LEA, Revisited}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {318--330}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_27}, doi = {10.1007/978-3-319-56549-1\_27}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoPHSBHZNZK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoPHSBZK16, author = {Hwajeong Seo and Taehwan Park and Shinwook Heo and Gyuwon Seo and Bongjin Bae and Lu Zhou and Howon Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {331--340}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_28}, doi = {10.1007/978-3-319-56549-1\_28}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoPHSBZK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Skorski16, author = {Maciej Skorski}, editor = {Dooho Choi and Sylvain Guilley}, title = {On Pseudorandomness in Stateless Sources}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {280--291}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_24}, doi = {10.1007/978-3-319-56549-1\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Skorski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SugioIKH16, author = {Nobuyuki Sugio and Yasutaka Igarashi and Toshinobu Kaneko and Kenichi Higuchi}, editor = {Dooho Choi and Sylvain Guilley}, title = {New Integral Characteristics of {KASUMI} Derived by Division Property}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {267--279}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_23}, doi = {10.1007/978-3-319-56549-1\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SugioIKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangMCC16, author = {An Wang and Aziz Mohaisen and Wentao Chang and Songqing Chen}, editor = {Dooho Choi and Sylvain Guilley}, title = {Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {15--28}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_2}, doi = {10.1007/978-3-319-56549-1\_2}, timestamp = {Sat, 06 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WangMCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WooKYK16, author = {Simon S. Woo and Jingul Kim and Duoduo Yu and Beomjun Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Exploration of 3D Texture and Projection for New {CAPTCHA} Design}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {353--365}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_30}, doi = {10.1007/978-3-319-56549-1\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WooKYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YangKO16, author = {Jeong Yoon Yang and So{-}Jeong Kim and Il Seok Oh(Luke)}, editor = {Dooho Choi and Sylvain Guilley}, title = {Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {102--111}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_9}, doi = {10.1007/978-3-319-56549-1\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YangKO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YuCZZY16, author = {Xiaoqi Yu and Nairen Cao and Gongxian Zeng and Ruoqing Zhang and Siu{-}Ming Yiu}, editor = {Dooho Choi and Sylvain Guilley}, title = {{LRCRYPT:} Leakage-Resilient Cryptographic System (Design and Implementation)}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {233--244}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_20}, doi = {10.1007/978-3-319-56549-1\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YuCZZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2015, editor = {Howon Kim and Dooho Choi}, title = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31875-2}, doi = {10.1007/978-3-319-31875-2}, isbn = {978-3-319-31874-5}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AhnC15, author = {Sungjun Ahn and Dooho Choi}, editor = {Howon Kim and Dooho Choi}, title = {An Improved Masking Scheme for S-Box Software Implementations}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {200--212}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_17}, doi = {10.1007/978-3-319-31875-2\_17}, timestamp = {Thu, 02 Mar 2023 10:53:05 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AhnC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AhnHOH15, author = {Hyunjin Ahn and Neil Hanley and M{\'{a}}ire O'Neill and Dong{-}Guk Han}, editor = {Howon Kim and Dooho Choi}, title = {An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected {AES} -}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {174--186}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_15}, doi = {10.1007/978-3-319-31875-2\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AhnHOH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiCHK15, author = {Kyu Young Choi and Jihoon Cho and Jung Yeon Hwang and Taekyoung Kwon}, editor = {Howon Kim and Dooho Choi}, title = {Constructing Efficient {PAKE} Protocols from Identity-Based {KEM/DEM}}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {411--422}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_34}, doi = {10.1007/978-3-319-31875-2\_34}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoiCHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiSLKK15, author = {Kibum Choi and Yunmok Son and Jangjun Lee and Suryeon Kim and Yongdae Kim}, editor = {Howon Kim and Dooho Choi}, title = {Frying {PAN:} Dissecting Customized Protocol for Personal Area Network}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {300--312}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_25}, doi = {10.1007/978-3-319-31875-2\_25}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoiSLKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/El-HadidiEAO15, author = {Mahmoud T. El{-}Hadidi and Hany El{-}Sayed and Heba Kamal Aslan and Karim Osama}, editor = {Howon Kim and Dooho Choi}, title = {Structured Design Approach for an Optimal Programmable Synchronous Security Processor}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {313--325}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_26}, doi = {10.1007/978-3-319-31875-2\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/El-HadidiEAO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/EngelstadHKYNB15, author = {Paal E. Engelstad and Hugo Hammer and Kyrre Wahl Kongsg{\aa}rd and Anis Yazidi and Nils Agne Nordbotten and Aleksander Bai}, editor = {Howon Kim and Dooho Choi}, title = {Automatic Security Classification with Lasso}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {399--410}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_33}, doi = {10.1007/978-3-319-31875-2\_33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/EngelstadHKYNB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GordonMSS15, author = {Steven Gordon and Atsuko Miyaji and Chunhua Su and Karin Sumongkayothin}, editor = {Howon Kim and Dooho Choi}, title = {{M-ORAM:} {A} Matrix {ORAM} with Log {N} Bandwidth Cost}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {3--15}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_1}, doi = {10.1007/978-3-319-31875-2\_1}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GordonMSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HeJH15, author = {Wei He and Dirmanto Jap and Alexander Herrmann}, editor = {Howon Kim and Dooho Choi}, title = {Process Variation Evaluation Using {RO} {PUF} for Enhancing SCA-Resistant Dual-Rail Implementation}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {16--27}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_2}, doi = {10.1007/978-3-319-31875-2\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HeJH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HidanoK15, author = {Seira Hidano and Shinsaku Kiyomoto}, editor = {Howon Kim and Dooho Choi}, title = {On Partitioning Secret Data Based on Concept of Functional Safety}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {110--121}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_10}, doi = {10.1007/978-3-319-31875-2\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HidanoK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HuangL15, author = {Guifang Huang and Hongda Li}, editor = {Howon Kim and Dooho Choi}, title = {On Zero Knowledge Argument with {PQT} Soundness}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {326--335}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_27}, doi = {10.1007/978-3-319-31875-2\_27}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HuangL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangOCO15, author = {You Sung Kang and Elizabeth O'Sullivan and Dooho Choi and M{\'{a}}ire O'Neill}, editor = {Howon Kim and Dooho Choi}, title = {Security Analysis on {RFID} Mutual Authentication Protocol}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {65--74}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_6}, doi = {10.1007/978-3-319-31875-2\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangOCO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Kim15, author = {Kwangho Kim}, editor = {Howon Kim and Dooho Choi}, title = {Cyber Security Considerations for Designing IoT-Based Control Systems}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {288--299}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_24}, doi = {10.1007/978-3-319-31875-2\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Kim15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimK15, author = {Jihyun Kim and Howon Kim}, editor = {Howon Kim and Dooho Choi}, title = {Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {357--369}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_30}, doi = {10.1007/978-3-319-31875-2\_30}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimKKY15, author = {Se Hwan Kim and Yonggon Kim and Ohmin Kwon and Hyunsoo Yoon}, editor = {Howon Kim and Dooho Choi}, title = {Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle Tree}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {386--398}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_32}, doi = {10.1007/978-3-319-31875-2\_32}, timestamp = {Mon, 06 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimKKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimPCK15, author = {Dongkwan Kim and Suwan Park and Kibum Choi and Yongdae Kim}, editor = {Howon Kim and Dooho Choi}, title = {BurnFit: Analyzing and Exploiting Wearable Devices}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {227--239}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_19}, doi = {10.1007/978-3-319-31875-2\_19}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimPCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimPL15, author = {Kwangho Kim and Sangdon Park and Jongin Lim}, editor = {Howon Kim and Dooho Choi}, title = {Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {348--356}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_29}, doi = {10.1007/978-3-319-31875-2\_29}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonLACK15, author = {Hyeokchan Kwon and Kwangil Lee and Gaeil An and Byung{-}Ho Chung and Jeong{-}Nyeo Kim}, editor = {Howon Kim and Dooho Choi}, title = {Detection of Rogue Devices in {WLAN} by Analyzing {RF} Features and Indoor Location of the Device}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {54--61}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_5}, doi = {10.1007/978-3-319-31875-2\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonLACK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonPK15, author = {Hyeokjin Kwon and Jiye Park and Namhi Kang}, editor = {Howon Kim and Dooho Choi}, title = {Challenges in Deploying CoAP Over {DTLS} in Resource Constrained Environments}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {269--280}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_22}, doi = {10.1007/978-3-319-31875-2\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKY15, author = {Eunchong Lee and Hyunsoo Kim and Ji Won Yoon}, editor = {Howon Kim and Dooho Choi}, title = {Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network Attack}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {187--199}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_16}, doi = {10.1007/978-3-319-31875-2\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuP15, author = {Renzhang Liu and Yanbin Pan}, editor = {Howon Kim and Dooho Choi}, title = {Two Types of Special Bases for Integral Lattices}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {87--95}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_8}, doi = {10.1007/978-3-319-31875-2\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NguyenNKK15, author = {Binh P. Nguyen and Hoa Ngo and Jihun Kim and Jong Kim}, editor = {Howon Kim and Dooho Choi}, title = {Publishing Graph Data with Subgraph Differential Privacy}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {134--145}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_12}, doi = {10.1007/978-3-319-31875-2\_12}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NguyenNKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkK15, author = {Kyungwon Park and Hyoungshick Kim}, editor = {Howon Kim and Dooho Choi}, title = {Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic Analysis}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {254--265}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_21}, doi = {10.1007/978-3-319-31875-2\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkKPJ15, author = {Jungsoo Park and Jinouk Kim and Minho Park and Souhwan Jung}, editor = {Howon Kim and Dooho Choi}, title = {A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource Server}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {281--287}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_23}, doi = {10.1007/978-3-319-31875-2\_23}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkKPJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkS0CK15, author = {Taehwan Park and Hwajeong Seo and Zhe Liu and Jongseok Choi and Howon Kim}, editor = {Howon Kim and Dooho Choi}, title = {Compact Implementations of {LSH}}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {41--53}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_4}, doi = {10.1007/978-3-319-31875-2\_4}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkS0CK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RheeL15, author = {Hyun Sook Rhee and Dong Hoon Lee}, editor = {Howon Kim and Dooho Choi}, title = {Keyword Updatable {PEKS}}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {96--109}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_9}, doi = {10.1007/978-3-319-31875-2\_9}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RheeL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RyuLPL15, author = {Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee}, editor = {Howon Kim and Dooho Choi}, title = {Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {122--133}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_11}, doi = {10.1007/978-3-319-31875-2\_11}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RyuLPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Seo0CPK15, author = {Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and Howon Kim}, editor = {Howon Kim and Dooho Choi}, title = {Compact Implementations of {LEA} Block Cipher for Low-End Microprocessors}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {28--40}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_3}, doi = {10.1007/978-3-319-31875-2\_3}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Seo0CPK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Seo0SPCK15, author = {Hwajeong Seo and Zhe Liu and Gyuwon Seo and Taehwan Park and Jongseok Choi and Howon Kim}, editor = {Howon Kim and Dooho Choi}, title = {Open Sesame! Hacking the Password}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {215--226}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_18}, doi = {10.1007/978-3-319-31875-2\_18}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Seo0SPCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoC0NPCK15, author = {Hwajeong Seo and Chien{-}Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim}, editor = {Howon Kim and Dooho Choi}, title = {Secure Binary Field Multiplication}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {161--173}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_14}, doi = {10.1007/978-3-319-31875-2\_14}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoC0NPCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShinCPCK15, author = {Hocheol Shin and Kibum Choi and Young{-}Seok Park and Jaeyeong Choi and Yongdae Kim}, editor = {Howon Kim and Dooho Choi}, title = {Security Analysis of FHSS-type Drone Controller}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {240--253}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_20}, doi = {10.1007/978-3-319-31875-2\_20}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ShinCPCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Skorski15, author = {Maciej Skorski}, editor = {Howon Kim and Dooho Choi}, title = {How Much Randomness Can Be Extracted from Memoryless Shannon Entropy Sources?}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {75--86}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_7}, doi = {10.1007/978-3-319-31875-2\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Skorski15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SusukiY15, author = {Hiroya Susuki and Rie Shigetomi Yamaguchi}, editor = {Howon Kim and Dooho Choi}, title = {Cost-Effective Modeling for Authentication and Its Application to Activity Tracker}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {373--385}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_31}, doi = {10.1007/978-3-319-31875-2\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SusukiY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TamaR15, author = {Bayu Adhi Tama and Kyung Hyune Rhee}, editor = {Howon Kim and Dooho Choi}, title = {Performance Analysis of Multiple Classifier System in DoS Attack Detection}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {339--347}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_28}, doi = {10.1007/978-3-319-31875-2\_28}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TamaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Wang15, author = {Maoning Wang}, editor = {Howon Kim and Dooho Choi}, title = {An Improved Analysis of Broadcast Attacks on the {GGH} Cryptosystem}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {146--158}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_13}, doi = {10.1007/978-3-319-31875-2\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Wang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhuangHW15, author = {Yunhui Zhuang and Gerhard P. Hancke and Duncan S. Wong}, editor = {Howon Kim and Dooho Choi}, title = {How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol}, booktitle = {Information Security Applications - 16th International Workshop, {WISA} 2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9503}, pages = {423--435}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31875-2\_35}, doi = {10.1007/978-3-319-31875-2\_35}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhuangHW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2014, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-15087-1}, doi = {10.1007/978-3-319-15087-1}, isbn = {978-3-319-15086-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AbbasRHEO14, author = {Fizza Abbas and Ubaidullah Rajput and Rasheed Hussain and Hasoo Eun and Heekuck Oh}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {A Trustless Broker Based Protocol to Discover Friends in Proximity-Based Mobile Social Networks}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {216--227}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_17}, doi = {10.1007/978-3-319-15087-1\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AbbasRHEO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChauNJJ14, author = {Ngoc{-}Tu Chau and Minh{-}Duong Nguyen and Seung Wook Jung and Souhwan Jung}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {SecaaS Framework and Architecture: {A} Design of Dynamic Packet Control}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {190--201}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_15}, doi = {10.1007/978-3-319-15087-1\_15}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChauNJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChenCCL14, author = {Chao{-}Lieh Chen and Shen{-}Chien Chen and Chun{-}Ruei Chang and Chia{-}Fei Lin}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Scalable and Autonomous Mobile Device-Centric Cloud for Secured {D2D} Sharing}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {177--189}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_14}, doi = {10.1007/978-3-319-15087-1\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChenCCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiCYK14, author = {Seungoh Choi and Yeop Chang and Jeong{-}Han Yun and Woonyon Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Multivariate Statistic Approach to Field Specifications of Binary Protocols in {SCADA} System}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {345--357}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_27}, doi = {10.1007/978-3-319-15087-1\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiCYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ElashryMS14, author = {Ibrahim F. Elashry and Yi Mu and Willy Susilo}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption Without Pairing}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {257--268}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_20}, doi = {10.1007/978-3-319-15087-1\_20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ElashryMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ItoM14, author = {Ryoma Ito and Atsuko Miyaji}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {New Integrated Long-Term Glimpse of {RC4}}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {137--149}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_11}, doi = {10.1007/978-3-319-15087-1\_11}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ItoM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JavedS14, author = {Ashar Javed and J{\"{o}}rg Schwenk}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Systematically Breaking Online {WYSIWYG} Editors}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {122--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_10}, doi = {10.1007/978-3-319-15087-1\_10}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JavedS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JooL14, author = {Minkyu Joo and Pil Joong Lee}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {231--243}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_18}, doi = {10.1007/978-3-319-15087-1\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JooL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangKKH14, author = {Jina Kang and Daehyun Kim and Hyoungshick Kim and Jun Ho Huh}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Analyzing Unnecessary Permissions Requested by Android Apps Based on Users' Opinions}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {68--79}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_6}, doi = {10.1007/978-3-319-15087-1\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangKKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangOI14, author = {Dongwan Kang and JooHyung Oh and Chaetae Im}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Context Based Smart Access Control on {BYOD} Environments}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {165--176}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_13}, doi = {10.1007/978-3-319-15087-1\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangOI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Kim14, author = {Yongdae Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Successful Profiling Attacks with Different Measurement Environments for Each Phase}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {321--330}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_25}, doi = {10.1007/978-3-319-15087-1\_25}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimALC14, author = {Taesung Kim and Sungjun Ahn and Seungkwang Lee and Dooho Choi}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Function Masking: {A} New Countermeasure Against Side Channel Attack}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {331--342}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_26}, doi = {10.1007/978-3-319-15087-1\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimALC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimK14, author = {Ji{-}Yeon Kim and Hyung{-}Jong Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Defining Security Primitives for Eliciting Flexible Attack Scenarios Through {CAPEC} Analysis}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {370--382}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_29}, doi = {10.1007/978-3-319-15087-1\_29}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimPKS14, author = {Eunhyun Kim and Kyungwon Park and Hyoungshick Kim and Jaeseung Song}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {I've Got Your Number: - Harvesting Users' Personal Data via Contacts Sync for the KakaoTalk Messenger}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {55--67}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_5}, doi = {10.1007/978-3-319-15087-1\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimPKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimYCK14, author = {Kyoung{-}Ho Kim and Jeong{-}Han Yun and Yeop Chang and Woonyon Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Packet Loss Consideration for Burst-Based Anomaly Detection in {SCADA} Network}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {358--369}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_28}, doi = {10.1007/978-3-319-15087-1\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimYCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KosbaMWTK14, author = {Ahmed E. Kosba and Aziz Mohaisen and Andrew G. West and Trevor Tonn and Huy Kang Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {{ADAM:} Automated Detection and Attribution of Malicious Webpages}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {3--16}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_1}, doi = {10.1007/978-3-319-15087-1\_1}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KosbaMWTK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeSK14, author = {Yeoncheol Lee and Hwajeong Seo and Howon Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {The Unified Hardware Design for {GCM} and {SGCM}}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {307--320}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_24}, doi = {10.1007/978-3-319-15087-1\_24}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MatsumotoOKS14, author = {Shinichi Matsumoto and Yuya Onitsuka and Junpei Kawamoto and Kouichi Sakurai}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {83--94}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_7}, doi = {10.1007/978-3-319-15087-1\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MatsumotoOKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenA14, author = {Aziz Mohaisen and Omar Alrawi}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {{AMAL:} High-Fidelity, Behavior-Based Automated Malware Analysis and Classification}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {107--121}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_9}, doi = {10.1007/978-3-319-15087-1\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenBL14, author = {Aziz Mohaisen and Mansurul Bhuiyan and Yannis Labrou}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Name Server Switching: Anomaly Signatures, Usage, Clustering, and Prediction}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {202--215}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_16}, doi = {10.1007/978-3-319-15087-1\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Muller-QuadeA14, author = {J{\"{o}}rn M{\"{u}}ller{-}Quade and Antonio Sobreira de Almeida}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Wireless Key Exchange Using Frequency Impairments}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {283--294}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_22}, doi = {10.1007/978-3-319-15087-1\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Muller-QuadeA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkPYKK14, author = {Shinjo Park and Suwan Park and Insu Yun and Dongkwan Kim and Yongdae Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Analyzing Security of Korean USIM-Based {PKI} Certificate Service}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {95--106}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_8}, doi = {10.1007/978-3-319-15087-1\_8}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ParkPYKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RajputAHEO14, author = {Ubaidullah Rajput and Fizza Abbas and Rasheed Hussain and Hasoo Eun and Heekuck Oh}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {27--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_3}, doi = {10.1007/978-3-319-15087-1\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/RajputAHEO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Seo0NCK14, author = {Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Improved Modular Multiplication for Optimal Prime Fields}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {150--161}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_12}, doi = {10.1007/978-3-319-15087-1\_12}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Seo0NCK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SongSK14, author = {Jaehyeok Song and Jonghyuk Song and Jong Kim}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Detection of Heap-Spraying Attacks Using String Trace Graph}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {17--26}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_2}, doi = {10.1007/978-3-319-15087-1\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SongSK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SongSL14, author = {Misun Song and JunSeok Seo and Kyungho Lee}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Study on the Effectiveness of the Security Countermeasures Against Spear Phishing}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {394--404}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_31}, doi = {10.1007/978-3-319-15087-1\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SongSL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TangL14, author = {Fei Tang and Hongda Li}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Joint Signature and Encryption in the Presence of Continual Leakage}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {269--280}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_21}, doi = {10.1007/978-3-319-15087-1\_21}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TangL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM14, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Fair Multi-signature}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {244--256}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_19}, doi = {10.1007/978-3-319-15087-1\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YouOL14, author = {Youngin You and Sangkyo Oh and Kyungho Lee}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Advanced Security Assessment for Control Effectiveness}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {383--393}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_30}, doi = {10.1007/978-3-319-15087-1\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YouOL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Zhang14, author = {Zhongwen Zhang}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Before Unrooting your Android Phone, Patching up Permission System First!}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {41--54}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_4}, doi = {10.1007/978-3-319-15087-1\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhengPLJZ14, author = {Fangyu Zheng and Wuqiong Pan and Jingqiang Lin and Jiwu Jing and Yuan Zhao}, editor = {Kyung Hyune Rhee and Jeong Hyun Yi}, title = {Exploiting the Potential of GPUs for Modular Multiplication in {ECC}}, booktitle = {Information Security Applications - 15th International Workshop, {WISA} 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8909}, pages = {295--306}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15087-1\_23}, doi = {10.1007/978-3-319-15087-1\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhengPLJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2013, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05149-9}, doi = {10.1007/978-3-319-05149-9}, isbn = {978-3-319-05148-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AthreyaWKTT13, author = {Arjun P. Athreya and Xiao Wang and Yu Seung Kim and Yuan Tian and Patrick Tague}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {174--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_11}, doi = {10.1007/978-3-319-05149-9\_11}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AthreyaWKTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChinW13, author = {Erika Chin and David A. Wagner}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Bifocals: Analyzing WebView Vulnerabilities in Android Applications}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {138--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_9}, doi = {10.1007/978-3-319-05149-9\_9}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChinW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DoCL13, author = {Heesung Do and Peter Choi and Heejo Lee}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Dynamic Surveillance: {A} Case Study with Enron Email Data Set}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {81--99}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_6}, doi = {10.1007/978-3-319-05149-9\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DoCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FanCG13, author = {Limin Fan and Hua Chen and Si Gao}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {A General Method to Evaluate the Correlation of Randomness Tests}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {52--62}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_4}, doi = {10.1007/978-3-319-05149-9\_4}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FanCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongLKKRL13, author = {Deukjo Hong and Jung{-}Keun Lee and Dong{-}Chan Kim and Daesung Kwon and Kwon Ho Ryu and Donggeon Lee}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {{LEA:} {A} 128-Bit Block Cipher for Fast Encryption on Common Processors}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {3--27}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_1}, doi = {10.1007/978-3-319-05149-9\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongLKKRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HuP13, author = {Gengran Hu and Yanbin Pan}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Improvements on Reductions among Different Variants of {SVP} and {CVP}}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {39--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_3}, doi = {10.1007/978-3-319-05149-9\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HuP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JavedS13, author = {Ashar Javed and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {103--123}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_7}, doi = {10.1007/978-3-319-05149-9\_7}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JavedS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimK13, author = {Daehyun Kim and Hyoungshick Kim}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {We Are Still Vulnerable to Clickjacking Attacks: About 99 {\%} of Korean Websites Are Dangerous}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {163--173}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_10}, doi = {10.1007/978-3-319-05149-9\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKLKK13, author = {Hayoung Lee and Taeho Kang and Sangho Lee and Jong Kim and Yoonho Kim}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Punobot: Mobile Botnet Using Push Notification Service in Android}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {124--137}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_8}, doi = {10.1007/978-3-319-05149-9\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKLKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LvZL13, author = {Jing Lv and Bin Zhang and Dongdai Lin}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Some New Weaknesses in the {RC4} Stream Cipher}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {28--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_2}, doi = {10.1007/978-3-319-05149-9\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LvZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MeyerS13, author = {Christopher Meyer and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {SoK: Lessons Learned from {SSL/TLS} Attacks}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {189--209}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_12}, doi = {10.1007/978-3-319-05149-9\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MeyerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenALM13, author = {Aziz Mohaisen and Omar Alrawi and Matt Larson and Danny McPherson}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention"}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {231--241}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_15}, doi = {10.1007/978-3-319-05149-9\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenALM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenH13, author = {Aziz Mohaisen and Scott Hollenbeck}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {65--80}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_5}, doi = {10.1007/978-3-319-05149-9\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoonCE13, author = {Cheolmin Sky Moon and Sam Chung and Barbara Endicott{-}Popovsky}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {260--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_17}, doi = {10.1007/978-3-319-05149-9\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoonCE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MosunovSCACK13, author = {Anton Mosunov and Vineet Sinha and Heather Crawford and John Aycock and Daniel Medeiros Nunes de Castro and Rashmi Kumari}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Assured Supraliminal Steganography in Computer Games}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {245--259}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_16}, doi = {10.1007/978-3-319-05149-9\_16}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MosunovSCACK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SongSC13, author = {YongJoo Song and Seungwon Shin and Yongjin Choi}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Network Iron Curtain: Hide Enterprise Networks with OpenFlow}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {218--230}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_14}, doi = {10.1007/978-3-319-05149-9\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SongSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/VassermanH13, author = {Eugene Y. Vasserman and John Hatcliff}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Foundational Security Principles for Medical Application Platforms - (Extended Abstract)}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {213--217}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_13}, doi = {10.1007/978-3-319-05149-9\_13}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/VassermanH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AszalosH12, author = {L{\'{a}}szl{\'{o}} Aszal{\'{o}}s and Andrea Huszti}, editor = {Dong Hoon Lee and Moti Yung}, title = {Payment Approval for PayWord}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {161--176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_12}, doi = {10.1007/978-3-642-35416-8\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AszalosH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiKKK12, author = {Jaeun Choi and Gisung Kim and Tae Ghyoon Kim and Sehun Kim}, editor = {Dong Hoon Lee and Moti Yung}, title = {An Efficient Filtering Method for Detecting Malicous Web Pages}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {241--253}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_17}, doi = {10.1007/978-3-642-35416-8\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiKKK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiKOJ12, author = {Yangseo Choi and Ik{-}Kyun Kim and Jintae Oh and Jongsoo Jang}, editor = {Dong Hoon Lee and Moti Yung}, title = {{AIGG} Threshold Based {HTTP} {GET} Flooding Attack Detection}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {270--284}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_19}, doi = {10.1007/978-3-642-35416-8\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiKOJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DurvauxGKKS12, author = {Fran{\c{c}}ois Durvaux and Beno{\^{\i}}t G{\'{e}}rard and St{\'{e}}phanie Kerckhof and Fran{\c{c}}ois Koeune and Fran{\c{c}}ois{-}Xavier Standaert}, editor = {Dong Hoon Lee and Moti Yung}, title = {Intellectual Property Protection for Integrated Systems Using Soft Physical Hash Functions}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {208--225}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_15}, doi = {10.1007/978-3-642-35416-8\_15}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/DurvauxGKKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HussainKO12, author = {Rasheed Hussain and Sangjin Kim and Heekuck Oh}, editor = {Dong Hoon Lee and Moti Yung}, title = {Privacy-Aware {VANET} Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {296--311}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_21}, doi = {10.1007/978-3-642-35416-8\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HussainKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HwangECLN12, author = {Jung Yeon Hwang and Sungwook Eom and Ku{-}Young Chang and Pil Joong Lee and DaeHun Nyang}, editor = {Dong Hoon Lee and Moti Yung}, title = {Anonymity-Based Authenticated Key Agreement with Full Binding Property}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {177--191}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_13}, doi = {10.1007/978-3-642-35416-8\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HwangECLN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JiaL12, author = {Keting Jia and Leibo Li}, editor = {Dong Hoon Lee and Moti Yung}, title = {Improved Impossible Differential Attacks on Reduced-Round {MISTY1}}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {15--27}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_2}, doi = {10.1007/978-3-642-35416-8\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JiaL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangP12, author = {Hyun{-}Sun Kang and Chang{-}Seop Park}, editor = {Dong Hoon Lee and Moti Yung}, title = {An Authentication and Key Management Scheme for the Proxy Mobile IPv6}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {144--160}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_11}, doi = {10.1007/978-3-642-35416-8\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimD12, author = {Yukyong Kim and Kyung{-}Goo Doh}, editor = {Dong Hoon Lee and Moti Yung}, title = {A Trust Management Model for QoS-Based Service Selection}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {345--357}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_24}, doi = {10.1007/978-3-642-35416-8\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimKKKC12, author = {Hyunjoo Kim and Byoung{-}Koo Kim and Daewon Kim and Ik{-}Kyun Kim and Tai{-}Myoung Chung}, editor = {Dong Hoon Lee and Moti Yung}, title = {Implementation of {GESNIC} for Web Server Protection against {HTTP} {GET} Flooding Attacks}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {285--295}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_20}, doi = {10.1007/978-3-642-35416-8\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimKKKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimRV12, author = {Hyunmin Kim and Vladimir Rozic and Ingrid Verbauwhede}, editor = {Dong Hoon Lee and Moti Yung}, title = {Three Phase Dynamic Current Mode Logic: {A} More Secure DyCML to Achieve a More Balanced Power Consumption}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {68--81}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_6}, doi = {10.1007/978-3-642-35416-8\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimmS12, author = {Haklin Kimm and Norkee Sherpa}, editor = {Dong Hoon Lee and Moti Yung}, title = {Multilevel Secure Database on Security Enhanced Linux for System High Distributed Systems}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {358--370}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_25}, doi = {10.1007/978-3-642-35416-8\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimmS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LarangeiraT12, author = {Mario Larangeira and Keisuke Tanaka}, editor = {Dong Hoon Lee and Moti Yung}, title = {Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {124--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_10}, doi = {10.1007/978-3-642-35416-8\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LarangeiraT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiZ12, author = {Liangze Li and Fan Zhang}, editor = {Dong Hoon Lee and Moti Yung}, title = {Tate Pairing Computation on Generalized Hessian Curves}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {111--123}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_9}, doi = {10.1007/978-3-642-35416-8\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LinAM12, author = {Eric Lin and John Aycock and Mohammad Mannan}, editor = {Dong Hoon Lee and Moti Yung}, title = {Lightweight Client-Side Methods for Detecting Email Forgery}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {254--269}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_18}, doi = {10.1007/978-3-642-35416-8\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LinAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuCH12, author = {Shun{-}Te Liu and Yi{-}Ming Chen and Hui{-}Ching Hung}, editor = {Dong Hoon Lee and Moti Yung}, title = {N-Victims: An Approach to Determine N-Victims for {APT} Investigations}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {226--240}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_16}, doi = {10.1007/978-3-642-35416-8\_16}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuCH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhSLL12, author = {Junghoon Oh and Namheun Son and Sangjin Lee and Kyungho Lee}, editor = {Dong Hoon Lee and Moti Yung}, title = {A Study for Classification of Web Browser Log and Timeline Visualization}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {192--207}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_14}, doi = {10.1007/978-3-642-35416-8\_14}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhSLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkH12, author = {JeaHoon Park and JaeCheol Ha}, editor = {Dong Hoon Lee and Moti Yung}, title = {Improved Differential Fault Analysis on Block Cipher {ARIA}}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {82--95}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_7}, doi = {10.1007/978-3-642-35416-8\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoK12, author = {Hwajeong Seo and Howon Kim}, editor = {Dong Hoon Lee and Moti Yung}, title = {Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {55--67}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_5}, doi = {10.1007/978-3-642-35416-8\_5}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShinKS12, author = {Incheol Shin and Sinkyu Kim and Jungtaek Seo}, editor = {Dong Hoon Lee and Moti Yung}, title = {On Trigger Detection against Reactive Jamming Attacks: {A} Localized Solution}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {312--327}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_22}, doi = {10.1007/978-3-642-35416-8\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShinKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TanakaCYCS12, author = {Satoshi Tanaka and Tung Chou and Bo{-}Yin Yang and Chen{-}Mou Cheng and Kouichi Sakurai}, editor = {Dong Hoon Lee and Moti Yung}, title = {Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {28--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_3}, doi = {10.1007/978-3-642-35416-8\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TanakaCYCS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM12, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Dong Hoon Lee and Moti Yung}, title = {Multi-Level Controlled Signature}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {96--110}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_8}, doi = {10.1007/978-3-642-35416-8\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangWYZ12, author = {Yanfeng Wang and Wenling Wu and Xiaoli Yu and Lei Zhang}, editor = {Dong Hoon Lee and Moti Yung}, title = {Security on LBlock against Biclique Cryptanalysis}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {1--14}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_1}, doi = {10.1007/978-3-642-35416-8\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WangWYZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WeiC12, author = {Yu{-}Chih Wei and Yi{-}Ming Chen}, editor = {Dong Hoon Lee and Moti Yung}, title = {Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {328--344}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_23}, doi = {10.1007/978-3-642-35416-8\_23}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WeiC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhaoHFLW12, author = {Wentao Zhao and Xin Hai and Shaojing Fu and Chao Li and Yanfeng Wang}, editor = {Dong Hoon Lee and Moti Yung}, title = {Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {43--54}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_4}, doi = {10.1007/978-3-642-35416-8\_4}, timestamp = {Mon, 11 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhaoHFLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2011, editor = {Souhwan Jung and Moti Yung}, title = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27890-7}, doi = {10.1007/978-3-642-27890-7}, isbn = {978-3-642-27889-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2012, editor = {Dong Hoon Lee and Moti Yung}, title = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8}, doi = {10.1007/978-3-642-35416-8}, isbn = {978-3-642-35415-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoL11, author = {Kwantae Cho and Dong Hoon Lee}, editor = {Souhwan Jung and Moti Yung}, title = {Biometric Based Secure Communications without Pre-deployed Key for Biosensor Implanted in Body Sensor Networks}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {203--218}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_17}, doi = {10.1007/978-3-642-27890-7\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DongWWZ11, author = {Le Dong and Wenling Wu and Shuang Wu and Jian Zou}, editor = {Souhwan Jung and Moti Yung}, title = {Known-Key Distinguisher on Round-Reduced 3D Block Cipher}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {55--69}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_5}, doi = {10.1007/978-3-642-27890-7\_5}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/DongWWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HegazySW11, author = {Islam Hegazy and Reihaneh Safavi{-}Naini and Carey Williamson}, editor = {Souhwan Jung and Moti Yung}, title = {Exploiting Routing Tree Construction in {CTP}}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {256--270}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_21}, doi = {10.1007/978-3-642-27890-7\_21}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HegazySW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongBP11, author = {Insung Hong and Jinsung Byun and Sehyun Park}, editor = {Souhwan Jung and Moti Yung}, title = {Lightweight Middleware-Based ZigBee Security in Building Energy Management System}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {151--156}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_13}, doi = {10.1007/978-3-642-27890-7\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangKYI11, author = {Boojoong Kang and Hye Seon Kim and Ji Su Yang and Eul Gyu Im}, editor = {Souhwan Jung and Moti Yung}, title = {Rule Indexing for Efficient Intrusion Detection Systems}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {136--141}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_11}, doi = {10.1007/978-3-642-27890-7\_11}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangKYI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimCJLB11, author = {Chung{-}Hyo Kim and Moon{-}Seok Choi and Seongho Ju and Yong{-}Hun Lim and Jong{-}mock Baek}, editor = {Souhwan Jung and Moti Yung}, title = {Security Data Extraction from {IEC} 61850 {ACSI} Models for Network and System Management}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {142--150}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_12}, doi = {10.1007/978-3-642-27890-7\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimCJLB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimLC11, author = {Myungsun Kim and Hyung Tae Lee and Jung Hee Cheon}, editor = {Souhwan Jung and Moti Yung}, title = {Mutual Private Set Intersection with Linear Complexity}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {219--231}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_18}, doi = {10.1007/978-3-642-27890-7\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KiribuchiKNEY11, author = {Naoto Kiribuchi and Ryo Kato and Takashi Nishide and Tsukasa Endo and Hiroshi Yoshiura}, editor = {Souhwan Jung and Moti Yung}, title = {Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {187--202}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_16}, doi = {10.1007/978-3-642-27890-7\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KiribuchiKNEY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KogureKY11, author = {Jun Kogure and Noboru Kunihiro and Hirosuke Yamamoto}, editor = {Souhwan Jung and Moti Yung}, title = {Generalized Security Analysis of the Random Key Bits Leakage Attack}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {13--27}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_2}, doi = {10.1007/978-3-642-27890-7\_2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KogureKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeSL11, author = {Woomyo Lee and Jae Woo Seo and Pil Joong Lee}, editor = {Souhwan Jung and Moti Yung}, title = {Identity-Based Signcryption from Identity-Based Cryptography}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {70--83}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_6}, doi = {10.1007/978-3-642-27890-7\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiWZ11, author = {Yanjun Li and Wenling Wu and Lei Zhang}, editor = {Souhwan Jung and Moti Yung}, title = {Improved Integral Attacks on Reduced-Round {CLEFIA} Block Cipher}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {28--39}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_3}, doi = {10.1007/978-3-642-27890-7\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MatsushitaYZ11, author = {Tatsuyuki Matsushita and Shinji Yamanaka and Fangming Zhao}, editor = {Souhwan Jung and Moti Yung}, title = {A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {121--135}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_10}, doi = {10.1007/978-3-642-27890-7\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MatsushitaYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhtaharaOSS11, author = {Chiaki Ohtahara and Keita Okada and Yu Sasaki and Takeshi Shimoyama}, editor = {Souhwan Jung and Moti Yung}, title = {Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {40--54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_4}, doi = {10.1007/978-3-642-27890-7\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhtaharaOSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhtakeO11, author = {Go Ohtake and Kazuto Ogawa}, editor = {Souhwan Jung and Moti Yung}, title = {Application Authentication for Hybrid Services of Broadcasting and Communications Networks}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {171--186}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_15}, doi = {10.1007/978-3-642-27890-7\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhtakeO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PanD11, author = {Yanbin Pan and Yingpu Deng}, editor = {Souhwan Jung and Moti Yung}, title = {A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {109--120}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_9}, doi = {10.1007/978-3-642-27890-7\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PanD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SakemiITY11, author = {Yumi Sakemi and Tetsuya Izu and Masahiko Takenaka and Masaya Yasuda}, editor = {Souhwan Jung and Moti Yung}, title = {Solving a {DLP} with Auxiliary Input with the {\(\rho\)}-Algorithm}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {98--108}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_8}, doi = {10.1007/978-3-642-27890-7\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SakemiITY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Salonen11, author = {Jarno Salonen}, editor = {Souhwan Jung and Moti Yung}, title = {Evaluating the Security and Privacy of Near Field Communication - Case: Public Transportation}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {242--255}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_20}, doi = {10.1007/978-3-642-27890-7\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Salonen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SekarP11, author = {Gautham Sekar and Bart Preneel}, editor = {Souhwan Jung and Moti Yung}, title = {Practical Attacks on a Cryptosystem Proposed in Patent {WO/2009/066313}}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {1--12}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_1}, doi = {10.1007/978-3-642-27890-7\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SekarP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SunC11, author = {Chung Il Sun and Tae Ho Cho}, editor = {Souhwan Jung and Moti Yung}, title = {Advanced Path Selection Method for Detection of False Reports in Statistical Filtering Based WSNs}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {232--241}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_19}, doi = {10.1007/978-3-642-27890-7\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SunC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YumKKLH11, author = {Dae Hyun Yum and Duk Soo Kim and Jin Seok Kim and Pil Joong Lee and Sung Je Hong}, editor = {Souhwan Jung and Moti Yung}, title = {Order-Preserving Encryption for Non-uniformly Distributed Plaintexts}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {84--97}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_7}, doi = {10.1007/978-3-642-27890-7\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YumKKLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhangZC11, author = {Yingjun Zhang and Yang Zhang and Kai Chen}, editor = {Souhwan Jung and Moti Yung}, title = {A Map-Layer-Based Access Control Model}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {157--170}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_14}, doi = {10.1007/978-3-642-27890-7\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhangZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2010, editor = {Yongwha Chung and Moti Yung}, title = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17955-6}, doi = {10.1007/978-3-642-17955-6}, isbn = {978-3-642-17954-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AllailouMM10, author = {Boufeldja Allailou and Abdelaziz Marjane and Abdellah Mokrane}, editor = {Yongwha Chung and Moti Yung}, title = {Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {76--91}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_6}, doi = {10.1007/978-3-642-17955-6\_6}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AllailouMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AmakiHMO10, author = {Takehiko Amaki and Masanori Hashimoto and Yukio Mitsuyama and Takao Onoye}, editor = {Yongwha Chung and Moti Yung}, title = {A Design Procedure for Oscillator-Based Hardware Random Number Generator with Stochastic Behavior Modeling}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {107--121}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_8}, doi = {10.1007/978-3-642-17955-6\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AmakiHMO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BaoZ10, author = {Kehua Bao and Zhenfeng Zhang}, editor = {Yongwha Chung and Moti Yung}, title = {Collusion Attack on a Self-healing Key Distribution with Revocation in Wireless Sensor Networks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {221--233}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_16}, doi = {10.1007/978-3-642-17955-6\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BaoZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DottlingLMA10, author = {Nico D{\"{o}}ttling and Dejan E. Lazich and J{\"{o}}rn M{\"{u}}ller{-}Quade and Antonio Sobreira de Almeida}, editor = {Yongwha Chung and Moti Yung}, title = {Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {206--220}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_15}, doi = {10.1007/978-3-642-17955-6\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DottlingLMA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DowsleyGMN10, author = {Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento}, editor = {Yongwha Chung and Moti Yung}, title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner Product}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {337--350}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_25}, doi = {10.1007/978-3-642-17955-6\_25}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DowsleyGMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DowsleyHIN10, author = {Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, editor = {Yongwha Chung and Moti Yung}, title = {Round-Optimal Deniable Ring Authentication in the Presence of Big Brother}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {307--321}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_23}, doi = {10.1007/978-3-642-17955-6\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DowsleyHIN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ElaabidMGD10, author = {M. Abdelaziz Elaabid and Olivier Meynard and Sylvain Guilley and Jean{-}Luc Danger}, editor = {Yongwha Chung and Moti Yung}, title = {Combined Side-Channel Attacks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {175--190}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_13}, doi = {10.1007/978-3-642-17955-6\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FujiokaSY10, author = {Atsushi Fujioka and Koutarou Suzuki and Kazuki Yoneyama}, editor = {Yongwha Chung and Moti Yung}, title = {Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {15--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_2}, doi = {10.1007/978-3-642-17955-6\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FujiokaSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GallaisKT10, author = {Jean{-}Fran{\c{c}}ois Gallais and Ilya Kizhvatov and Michael Tunstall}, editor = {Yongwha Chung and Moti Yung}, title = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES} Implementations}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {243--257}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_18}, doi = {10.1007/978-3-642-17955-6\_18}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GallaisKT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JangYLY10, author = {Jae{-}hoon Jang and Don{-}Gu Yeo and Dong{-}hee Lee and Heung{-}Youl Youm}, editor = {Yongwha Chung and Moti Yung}, title = {An {IP} Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {150--159}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_11}, doi = {10.1007/978-3-642-17955-6\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JangYLY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JinLKP10, author = {Changlong Jin and Shengzhe Li and Hakil Kim and Eunsoo Park}, editor = {Yongwha Chung and Moti Yung}, title = {Fingerprint Liveness Detection Based on Multiple Image Quality Features}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {281--291}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_21}, doi = {10.1007/978-3-642-17955-6\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JinLKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JingXL10, author = {Wenpan Jing and Haixia Xu and Bao Li}, editor = {Yongwha Chung and Moti Yung}, title = {A New Efficient Construction for Non-Malleable Zero-Knowledge Sets}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {31--43}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_3}, doi = {10.1007/978-3-642-17955-6\_3}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JingXL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Kabasele-Tenday10, author = {Jean{-}Marie Kabasele{-}Tenday}, editor = {Yongwha Chung and Moti Yung}, title = {Using Special Use Cases for Security in the Software Development Life Cycle}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {122--134}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_9}, doi = {10.1007/978-3-642-17955-6\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Kabasele-Tenday10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeCKP10, author = {Hansung Lee and Yunsu Chung and Jeongnyeo Kim and Daihee Park}, editor = {Yongwha Chung and Moti Yung}, title = {Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP Histogram}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {273--280}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_20}, doi = {10.1007/978-3-642-17955-6\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeCKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuQGT10, author = {Hongying Liu and Guoyu Qian and Satoshi Goto and Yukiyasu Tsunoo}, editor = {Yongwha Chung and Moti Yung}, title = {Correlation Power Analysis Based on Switching Glitch Model}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {191--205}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_14}, doi = {10.1007/978-3-642-17955-6\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuQGT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MiyajiO10, author = {Atsuko Miyaji and Kazumasa Omote}, editor = {Yongwha Chung and Moti Yung}, title = {Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {135--149}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_10}, doi = {10.1007/978-3-642-17955-6\_10}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MiyajiO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MiyajiRS10, author = {Atsuko Miyaji and Mohammad Shahriar Rahman and Masakazu Soshi}, editor = {Yongwha Chung and Moti Yung}, title = {Hidden Credential Retrieval without Random Oracles}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {160--174}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_12}, doi = {10.1007/978-3-642-17955-6\_12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MiyajiRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NakatsuLSO10, author = {Daisuke Nakatsu and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Yongwha Chung and Moti Yung}, title = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA} against Power Analysis}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {258--272}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_19}, doi = {10.1007/978-3-642-17955-6\_19}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NguyenNK10, author = {Thi Hai Binh Nguyen and Van Huan Nguyen and Hakil Kim}, editor = {Yongwha Chung and Moti Yung}, title = {Robust Feature Extraction for Facial Image Quality Assessment}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {292--306}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_22}, doi = {10.1007/978-3-642-17955-6\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NguyenNK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NishideS10, author = {Takashi Nishide and Kouichi Sakurai}, editor = {Yongwha Chung and Moti Yung}, title = {Distributed Paillier Cryptosystem without Trusted Dealer}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {44--60}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_4}, doi = {10.1007/978-3-642-17955-6\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NishideS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PandeyB10, author = {Sumit Kumar Pandey and Rana Barua}, editor = {Yongwha Chung and Moti Yung}, title = {Construction of Identity Based Signcryption Schemes}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {1--14}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_1}, doi = {10.1007/978-3-642-17955-6\_1}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PandeyB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SuWZL10, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, editor = {Yongwha Chung and Moti Yung}, title = {Full-Round Differential Attack on {TWIS} Block Cipher}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {234--242}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_17}, doi = {10.1007/978-3-642-17955-6\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SuWZL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Walter10, author = {Colin D. Walter}, editor = {Yongwha Chung and Moti Yung}, title = {Fast Scalar Multiplication for {ECC} over GF(\emph{p}) Using Division Chains}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {61--75}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_5}, doi = {10.1007/978-3-642-17955-6\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Walter10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WengerFF10, author = {Erich Wenger and Martin Feldhofer and Norbert Felber}, editor = {Yongwha Chung and Moti Yung}, title = {Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless Devices}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {92--106}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_7}, doi = {10.1007/978-3-642-17955-6\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WengerFF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Yoneyama10, author = {Kazuki Yoneyama}, editor = {Yongwha Chung and Moti Yung}, title = {Cross-Realm Password-Based Server Aided Key Exchange}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {322--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_24}, doi = {10.1007/978-3-642-17955-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Yoneyama10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AkdemirHS09, author = {Kahraman D. Akdemir and Ghaith Hammouri and Berk Sunar}, editor = {Heung Youl Youm and Moti Yung}, title = {Non-linear Error Detection for Finite State Machines}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {226--238}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_17}, doi = {10.1007/978-3-642-10838-9\_17}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AkdemirHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AkramMM09, author = {Raja Naeem Akram and Konstantinos Markantonakis and Keith Mayes}, editor = {Heung Youl Youm and Moti Yung}, title = {Application Management Framework in User Centric Smart Card Ownership Model}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {20--35}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_3}, doi = {10.1007/978-3-642-10838-9\_3}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AkramMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AvoineLM09, author = {Gildas Avoine and C{\'{e}}dric Lauradoux and Tania Martin}, editor = {Heung Youl Youm and Moti Yung}, title = {When Compromised Readers Meet {RFID}}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {36--50}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_4}, doi = {10.1007/978-3-642-10838-9\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AvoineLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BuschKB09, author = {Heike Busch and Stefan Katzenbeisser and Paul Baecher}, editor = {Heung Youl Youm and Moti Yung}, title = {PUF-Based Authentication Protocols - Revisited}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {296--308}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_22}, doi = {10.1007/978-3-642-10838-9\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BuschKB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/CaoH09, author = {Weiwei Cao and Lei Hu}, editor = {Heung Youl Youm and Moti Yung}, title = {Cryptanalysis of a Multivariate Public Key Encryption Scheme with Internal Perturbation Structure}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {254--267}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_19}, doi = {10.1007/978-3-642-10838-9\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/CaoH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/EmuraMO09, author = {Keita Emura and Atsuko Miyaji and Kazumasa Omote}, editor = {Heung Youl Youm and Moti Yung}, title = {A Selectable \emph{k}-Times Relaxed Anonymous Authentication Scheme}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {281--295}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_21}, doi = {10.1007/978-3-642-10838-9\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/EmuraMO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FuQL09, author = {Shaojing Fu and Longjiang Qu and Chao Li}, editor = {Heung Youl Youm and Moti Yung}, title = {Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {109--117}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_9}, doi = {10.1007/978-3-642-10838-9\_9}, timestamp = {Mon, 11 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FuQL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HanleyTM09, author = {Neil Hanley and Michael Tunstall and William P. Marnane}, editor = {Heung Youl Youm and Moti Yung}, title = {Unknown Plaintext Template Attacks}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {148--162}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_12}, doi = {10.1007/978-3-642-10838-9\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HanleyTM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HussainKO09, author = {Rasheed Hussain and Sangjin Kim and Heekuck Oh}, editor = {Heung Youl Youm and Moti Yung}, title = {Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile Generation in {VANET}}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {268--280}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_20}, doi = {10.1007/978-3-642-10838-9\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HussainKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IbraimiPNHJ09, author = {Luan Ibraimi and Milan Petkovic and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Heung Youl Youm and Moti Yung}, title = {Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {309--323}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_23}, doi = {10.1007/978-3-642-10838-9\_23}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IbraimiPNHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KasperOP09, author = {Timo Kasper and David F. Oswald and Christof Paar}, editor = {Heung Youl Youm and Moti Yung}, title = {{EM} Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {79--93}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_7}, doi = {10.1007/978-3-642-10838-9\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KasperOP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimYJY09, author = {Mijoo Kim and Miyeon Yoon and Hyun Cheol Jeong and Heung Youl Youm}, editor = {Heung Youl Youm and Moti Yung}, title = {{USN} Middleware Security Model}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {354--365}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_26}, doi = {10.1007/978-3-642-10838-9\_26}, timestamp = {Wed, 22 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimYJY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KoKKLCJ09, author = {KyoungHee Ko and Hwan{-}Kuk Kim and JeongWook Kim and Chang{-}Yong Lee and Soo{-}Gil Cha and Hyun{-}Cheol Jeong}, editor = {Heung Youl Youm and Moti Yung}, title = {Design and Implementation of SIP-aware Security Management System}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {10--19}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_2}, doi = {10.1007/978-3-642-10838-9\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KoKKLCJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonMNS09, author = {Hyeokchan Kwon and Yong{-}Hyuk Moon and Jaehoon Nah and Dongil Seo}, editor = {Heung Youl Youm and Moti Yung}, title = {Protecting {IPTV} Service Network against Malicious Rendezvous Point}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {1--9}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_1}, doi = {10.1007/978-3-642-10838-9\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonMNS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Lim09, author = {Chae Hoon Lim}, editor = {Heung Youl Youm and Moti Yung}, title = {Practical Broadcast Authentication Using Short-Lived Signatures in WSNs}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {366--383}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_27}, doi = {10.1007/978-3-642-10838-9\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Lim09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Manulis09, author = {Mark Manulis}, editor = {Heung Youl Youm and Moti Yung}, title = {Securing Remote Access Inside Wireless Mesh Networks}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {324--338}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_24}, doi = {10.1007/978-3-642-10838-9\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Manulis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MedwedS09, author = {Marcel Medwed and J{\"{o}}rn{-}Marc Schmidt}, editor = {Heung Youl Youm and Moti Yung}, title = {Coding Schemes for Arithmetic and Logic Operations - How Robust Are They?}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {51--65}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_5}, doi = {10.1007/978-3-642-10838-9\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MedwedS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoradiMPS09, author = {Amir Moradi and Nima Mousavi and Christof Paar and Mahmoud Salmasizadeh}, editor = {Heung Youl Youm and Moti Yung}, title = {A Comparative Study of Mutual Information Analysis under a Gaussian Assumption}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {193--205}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_15}, doi = {10.1007/978-3-642-10838-9\_15}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoradiMPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MouhaCIP09, author = {Nicky Mouha and Christophe De Canni{\`{e}}re and Sebastiaan Indesteege and Bart Preneel}, editor = {Heung Youl Youm and Moti Yung}, title = {Finding Collisions for a 45-Step Simplified {HAS-V}}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {206--225}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_16}, doi = {10.1007/978-3-642-10838-9\_16}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MouhaCIP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PanHL09, author = {Jing Pan and J. I. den Hartog and Jiqiang Lu}, editor = {Heung Youl Youm and Moti Yung}, title = {You Cannot Hide behind the Mask: Power Analysis on a Provably Secure \emph{S}-Box Implementation}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {178--192}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_14}, doi = {10.1007/978-3-642-10838-9\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PanHL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PengB09, author = {Kun Peng and Feng Bao}, editor = {Heung Youl Youm and Moti Yung}, title = {Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness and {ZK} Privacy}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {118--132}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_10}, doi = {10.1007/978-3-642-10838-9\_10}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/PengB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PlosHF09, author = {Thomas Plos and Michael Hutter and Martin Feldhofer}, editor = {Heung Youl Youm and Moti Yung}, title = {On Comparing Side-Channel Preprocessing Techniques for Attacking {RFID} Devices}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {163--177}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_13}, doi = {10.1007/978-3-642-10838-9\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PlosHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SugawaraHHMASS09, author = {Takeshi Sugawara and Yu{-}ichi Hayashi and Naofumi Homma and Takaaki Mizuki and Takafumi Aoki and Hideaki Sone and Akashi Satoh}, editor = {Heung Youl Youm and Moti Yung}, title = {Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {66--78}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_6}, doi = {10.1007/978-3-642-10838-9\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SugawaraHHMASS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM09, author = {Pairat Thorncharoensri and Willy Susilo and Yi Mu}, editor = {Heung Youl Youm and Moti Yung}, title = {Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {94--108}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_8}, doi = {10.1007/978-3-642-10838-9\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XieCW09, author = {Jia Xie and Weiwei Cao and TianZe Wang}, editor = {Heung Youl Youm and Moti Yung}, title = {Quadratic Equations from a Kind of S-boxes}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {239--253}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_18}, doi = {10.1007/978-3-642-10838-9\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XieCW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YumKMKRL09, author = {Dae Hyun Yum and Sun Young Kim and Ho{-}Kun Moon and Mi{-}Yeon Kim and Jae{-}Hoon Roh and Pil Joong Lee}, editor = {Heung Youl Youm and Moti Yung}, title = {Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {339--353}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_25}, doi = {10.1007/978-3-642-10838-9\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YumKMKRL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhangZC09, author = {Fangguo Zhang and Xingwen Zhao and Xiaofeng Chen}, editor = {Heung Youl Youm and Moti Yung}, title = {ID-Based Adaptive Oblivious Transfer}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {133--147}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_11}, doi = {10.1007/978-3-642-10838-9\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ZhangZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2008, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00306-6}, doi = {10.1007/978-3-642-00306-6}, isbn = {978-3-642-00305-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2009, editor = {Heung Youl Youm and Moti Yung}, title = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9}, doi = {10.1007/978-3-642-10838-9}, isbn = {978-3-642-10837-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChaeLCJLM08, author = {Sooyoung Chae and Hosub Lee and Jaeik Cho and Manhyun Jung and Jongin Lim and Jongsub Moon}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {190--200}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_14}, doi = {10.1007/978-3-642-00306-6\_14}, timestamp = {Fri, 18 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChaeLCJLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiCWK08, author = {Donghyun Choi and Sungkyu Cho and Dongho Won and Seungjoo Kim}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Protection Profile for Connected Interoperable {DRM} Framework}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {320--332}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_24}, doi = {10.1007/978-3-642-00306-6\_24}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiCWK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FukushimaKTS08, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Ternary Subset Difference Method and Its Quantitative Analysis}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {225--239}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_17}, doi = {10.1007/978-3-642-00306-6\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FukushimaKTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HerbstM08, author = {Christoph Herbst and Marcel Medwed}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {1--13}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_1}, doi = {10.1007/978-3-642-00306-6\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HerbstM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Hirose08, author = {Shoichi Hirose}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Security Analysis of {DRBG} Using {HMAC} in {NIST} {SP} 800-90}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {278--291}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_21}, doi = {10.1007/978-3-642-00306-6\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Hirose08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IslamHCH08, author = {Md. Shariful Islam and Md. Abdul Hamid and Byung Goo Choi and Choong Seon Hong}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Securing Layer-2 Path Selection in Wireless Mesh Networks}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {69--83}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_6}, doi = {10.1007/978-3-642-00306-6\_6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IslamHCH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IzuKOST08, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Makoto Sano and Masahiko Takenaka}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Sanitizable and Deletable Signature}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {130--144}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_10}, doi = {10.1007/978-3-642-00306-6\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IzuKOST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JameelSHWRCLLSF08, author = {Hassan Jameel and Riaz Ahmed Shaikh and Le Xuan Hung and Weiwei Yuan and Syed Muhammad Khaliq{-}ur{-}Rahman Raazi and Ngo Trong Canh and Sungyoung Lee and Heejo Lee and Yuseung Son and Miguel Fernandes}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Image-Feature Based Human Identification Protocols on Limited Display Devices}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {211--224}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_16}, doi = {10.1007/978-3-642-00306-6\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JameelSHWRCLLSF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08, author = {Yutaka Kawai and Shotaro Tanno and Takahiro Kondo and Kazuki Yoneyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {160--173}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_12}, doi = {10.1007/978-3-642-00306-6\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimRJ08, author = {Mooseop Kim and Jaecheol Ryou and Sungik Jun}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Compact Implementation of {SHA-1} Hash Function for Mobile Trusted Module}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {292--304}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_22}, doi = {10.1007/978-3-642-00306-6\_22}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimRJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KlonowskiPS08, author = {Marek Klonowski and Michal Przykucki and Tomasz Struminski}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Data Deletion with Provable Security}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {240--255}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_18}, doi = {10.1007/978-3-642-00306-6\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KlonowskiPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KuwakadoH08, author = {Hidenori Kuwakado and Shoichi Hirose}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Pseudorandom-Function Property of the Step-Reduced Compression Functions of {SHA-256} and {SHA-512}}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {174--189}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_13}, doi = {10.1007/978-3-642-00306-6\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KuwakadoH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MedwedO08, author = {Marcel Medwed and Elisabeth Oswald}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Template Attacks on {ECDSA}}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {14--27}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_2}, doi = {10.1007/978-3-642-00306-6\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MedwedO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MiretSTTV08, author = {Josep M. Miret and Daniel Sadornil and Juan Tena and Rosana Tom{\`{a}}s and Magda Valls}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {On Avoiding ZVP-Attacks Using Isogeny Volcanoes}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {266--277}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_20}, doi = {10.1007/978-3-642-00306-6\_20}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MiretSTTV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkKN08, author = {Jun{-}Hyung Park and Minsoo Kim and Bong{-}Nam Noh}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {201--210}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_15}, doi = {10.1007/978-3-642-00306-6\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkKN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Peris-LopezCER08, author = {Pedro Peris{-}Lopez and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Juan M. Est{\'{e}}vez{-}Tapiador and Arturo Ribagorda}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Advances in Ultralightweight Cryptography for Low-Cost {RFID} Tags: Gossamer Protocol}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {56--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_5}, doi = {10.1007/978-3-642-00306-6\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Peris-LopezCER08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SchmidtK08, author = {J{\"{o}}rn{-}Marc Schmidt and Chong Hee Kim}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {A Probing Attack on {AES}}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {256--265}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_19}, doi = {10.1007/978-3-642-00306-6\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SchmidtK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SelviVGKR08, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {115--129}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_9}, doi = {10.1007/978-3-642-00306-6\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SelviVGKR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SugawaraHAS08, author = {Takeshi Sugawara and Naofumi Homma and Takafumi Aoki and Akashi Satoh}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Compact {ASIC} Architectures for the 512-Bit Hash Function Whirlpool}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {28--40}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_3}, doi = {10.1007/978-3-642-00306-6\_3}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SugawaraHAS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/VuillaumeODB08, author = {Camille Vuillaume and Katsuyuki Okeya and Erik Dahmen and Johannes Buchmann}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Public Key Authentication with Memory Tokens}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {84--98}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_7}, doi = {10.1007/978-3-642-00306-6\_7}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/VuillaumeODB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangWP08, author = {Peishun Wang and Huaxiong Wang and Josef Pieprzyk}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based Retrieval on Encrypted Data}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {145--159}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_11}, doi = {10.1007/978-3-642-00306-6\_11}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WangWP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WuMSH08, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {99--114}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_8}, doi = {10.1007/978-3-642-00306-6\_8}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WuMSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XuH08, author = {Qingyu Xu and Mingxing He}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {41--55}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_4}, doi = {10.1007/978-3-642-00306-6\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XuH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhouH08, author = {Jun Zhou and Mingxing He}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {An Improved Distributed Key Management Scheme in Wireless Sensor Networks}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {305--319}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_23}, doi = {10.1007/978-3-642-00306-6\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhouH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2007, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77535-5}, doi = {10.1007/978-3-540-77535-5}, isbn = {978-3-540-77534-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChangWYT07, author = {Junsheng Chang and Huaimin Wang and Gang Yin and Yang{-}Bin Tang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {ICRep: An Incentive Compatible Reputation Mechanism for {P2P} Systems}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {371--386}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_27}, doi = {10.1007/978-3-540-77535-5\_27}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChangWYT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiS07, author = {Myeonggil Choi and Sangmun Shin}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Optimizing Quality Levels and Development Costs for Developing an Integrated Information Security System}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {359--370}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_26}, doi = {10.1007/978-3-540-77535-5\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HaPMY07, author = {JaeCheol Ha and JeaHoon Park and Sang{-}Jae Moon and Sung{-}Ming Yen}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Provably Secure Countermeasure Resistant to Several Types of Power Attack for {ECC}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {333--344}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_24}, doi = {10.1007/978-3-540-77535-5\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HaPMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HanLY07, author = {Lilong Han and Qingtang Liu and Zongkai Yang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Authorization Constraints Specification of {RBAC}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {266--276}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_19}, doi = {10.1007/978-3-540-77535-5\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HanLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HashimotoIUISKI07, author = {Toru Hashimoto and Takashi Itoh and Masazumi Ueba and Hisato Iwai and Hideichi Sasaoka and Kazukuni Kobara and Hideki Imai}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {173--187}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_13}, doi = {10.1007/978-3-540-77535-5\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HashimotoIUISKI07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JangEK07, author = {Jihyeon Jang and Stephen J. Elliott and Hakil Kim}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Implementation of BioAPI Conformance Test Suite Using {BSP} Testing Model}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {48--60}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_4}, doi = {10.1007/978-3-540-77535-5\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JangEK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeCV07, author = {Yong Ki Lee and Herwin Chan and Ingrid Verbauwhede}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Iteration Bound Analysis and Throughput Optimum Architecture of {SHA-256} (384, 512) for Hardware Implementations}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {102--114}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_8}, doi = {10.1007/978-3-540-77535-5\_8}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeCV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeCYY07, author = {Byoungcheon Lee and Kim{-}Kwang Raymond Choo and Jeongmo Yang and Seungjae Yoo}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Secret Signatures: How to Achieve Business Privacy Efficiently?}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {30--47}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_3}, doi = {10.1007/978-3-540-77535-5\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeCYY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeV07, author = {Yong Ki Lee and Ingrid Verbauwhede}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {115--127}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_9}, doi = {10.1007/978-3-540-77535-5\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LimUKL07, author = {Jae{-}Deok Lim and Sung{-}Kyong Un and Jeong{-}Nyeo Kim and ChoelHoon Lee}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Implementation of LSM-Based {RBAC} Module for Embedded System}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {91--101}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_7}, doi = {10.1007/978-3-540-77535-5\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LimUKL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LoPG07, author = {Swee{-}Won Lo and Raphael C.{-}W. Phan and Bok{-}Min Goi}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {245--265}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_18}, doi = {10.1007/978-3-540-77535-5\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LoPG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/McEvoyTMM07, author = {Robert P. McEvoy and Michael Tunstall and Colin C. Murphy and William P. Marnane}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Differential Power Analysis of {HMAC} Based on SHA-2, and Countermeasures}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {317--332}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_23}, doi = {10.1007/978-3-540-77535-5\_23}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/McEvoyTMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ProuffR07, author = {Emmanuel Prouff and Matthieu Rivain}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {A Generic Method for Secure SBox Implementation}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {227--244}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_17}, doi = {10.1007/978-3-540-77535-5\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ProuffR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SameshimaSMK07, author = {Yoshiki Sameshima and Hideaki Saisho and Tsutomu Matsumoto and Norihisa Komoda}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Windows Vault: Prevention of Virus Infection and Secret Leakage with Secure {OS} and Virtual Machine}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {128--141}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_10}, doi = {10.1007/978-3-540-77535-5\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SameshimaSMK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShiraseKTO07, author = {Masaaki Shirase and Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Universal \emph{eta}\({}_{\mbox{T}}\) Pairing Algorithm over Arbitrary Extension Degree}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_1}, doi = {10.1007/978-3-540-77535-5\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShiraseKTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/StumpfRE07, author = {Frederic Stumpf and Patrick R{\"{o}}der and Claudia Eckert}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {An Architecture Providing Virtualization-Based Protection Mechanisms Against Insider Attacks}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {142--156}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_11}, doi = {10.1007/978-3-540-77535-5\_11}, timestamp = {Fri, 15 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/StumpfRE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TanakaHSK07, author = {Hidema Tanaka and Yasuo Hatano and Nobuyuki Sugio and Toshinobu Kaneko}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Security Analysis of {MISTY1}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {215--226}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_16}, doi = {10.1007/978-3-540-77535-5\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TanakaHSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TangLLW07, author = {Zhuo Tang and Ruixuan Li and Zhengding Lu and Zhumu Wen}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {277--290}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_20}, doi = {10.1007/978-3-540-77535-5\_20}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TangLLW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TewsWP07, author = {Erik Tews and Ralf{-}Philipp Weinmann and Andrei Pyshkin}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Breaking 104 Bit {WEP} in Less Than 60 Seconds}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {188--202}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_14}, doi = {10.1007/978-3-540-77535-5\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TewsWP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Walter07, author = {Colin D. Walter}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Longer Randomly Blinded {RSA} Keys May Be Weaker Than Shorter Ones}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {303--316}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_22}, doi = {10.1007/978-3-540-77535-5\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Walter07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WilsonFA07, author = {William O. Wilson and Jan Feyereisl and Uwe Aickelin}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Detecting Motifs in System Call Sequences}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {157--172}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_12}, doi = {10.1007/978-3-540-77535-5\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WilsonFA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WuMSH07, author = {Wei Wu and Yi Mu and Willy Susilo and Xinyi Huang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {16--29}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_2}, doi = {10.1007/978-3-540-77535-5\_2}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WuMSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XiaHH07, author = {Lei Xia and Wei Huang and Hao Huang}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {A Compositional Multiple Policies Operating System Security Model}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {291--302}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_21}, doi = {10.1007/978-3-540-77535-5\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XiaHH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XiangK07, author = {Shijun Xiang and Hyoung{-}Joong Kim}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Geometrically Invariant Image Watermarking in the {DWT} Domain}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {76--90}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_6}, doi = {10.1007/978-3-540-77535-5\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XiangK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XuY07, author = {Shenkun Xu and Xiaojun Ye}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Risk {\&} Distortion Based K-Anonymity}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {345--358}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_25}, doi = {10.1007/978-3-540-77535-5\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XuY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YoshitomiTKT07, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {203--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_15}, doi = {10.1007/978-3-540-77535-5\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YoshitomiTKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ZhouMGJ07, author = {Yongxin Zhou and Alec Main and Yuan Xiang Gu and Harold Johnson}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Information Hiding in Software with Mixed Boolean-Arithmetic Transforms}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {61--75}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_5}, doi = {10.1007/978-3-540-77535-5\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ZhouMGJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2006, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71093-6}, doi = {10.1007/978-3-540-71093-6}, isbn = {978-3-540-71092-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/CarluccioLPS06, author = {Dario Carluccio and Kerstin Lemke{-}Rust and Christof Paar and Ahmad{-}Reza Sadeghi}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {E-Passport: The Global Traceability Or How to Feel Like a {UPS} Package}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {391--404}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_30}, doi = {10.1007/978-3-540-71093-6\_30}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/CarluccioLPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChangW06, author = {Chin{-}Chen Chang and Chia{-}Chi Wu}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {A Novel Key Agreement Scheme in a Multiple Server Environment}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {187--197}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_15}, doi = {10.1007/978-3-540-71093-6\_15}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChangW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChengC06, author = {Bo{-}Chao Cheng and Huan Chen}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Quality Assurance for Evidence Collection in Network Forensics}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {121--132}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_10}, doi = {10.1007/978-3-540-71093-6\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChengC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChengM06, author = {Feng Cheng and Christoph Meinel}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Deployment of Virtual Machines in Lock-Keeper}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {147--159}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_12}, doi = {10.1007/978-3-540-71093-6\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChengM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GaoWWX06, author = {Wei Gao and Guilin Wang and Xueli Wang and Dongqing Xie}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Controllable Ring Signatures}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_1}, doi = {10.1007/978-3-540-71093-6\_1}, timestamp = {Sat, 09 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GaoWWX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GuNCLJ06, author = {Jabeom Gu and Jaehoon Nah and Cheoljoo Chae and Jae{-}Kwang Lee and Jongsoo Jang}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Random Visitor: {A} Defense Against Identity Attacks in {P2P} Overlay Networks}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {282--296}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_22}, doi = {10.1007/978-3-540-71093-6\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GuNCLJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeongHKSKK06, author = {Youngok Jeong and Younggoo Han and Hyunwoo Kim and Woochul Shim and Jaehong Kim and Sehun Kim}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Cost-Effective {IDS} Operating Scheme in MANETs}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {198--210}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_16}, doi = {10.1007/978-3-540-71093-6\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JeongHKSKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Juang06, author = {Wen{-}Shenq Juang}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Efficient User Authentication and Key Agreement in Wireless Sensor Networks}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {15--29}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_2}, doi = {10.1007/978-3-540-71093-6\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Juang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangP06, author = {Hyun{-}Sun Kang and Chang{-}Seop Park}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {211--224}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_17}, doi = {10.1007/978-3-540-71093-6\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KikuchiT06, author = {Hiroaki Kikuchi and Masato Terada}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {How Many Malicious Scanners Are in the Internet?}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {381--390}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_29}, doi = {10.1007/978-3-540-71093-6\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KikuchiT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimC06, author = {Yoonkyung Kim and Byeong{-}Mo Chang}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Visualization of Permission Checks in Java Using Static Analysis}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {133--146}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_11}, doi = {10.1007/978-3-540-71093-6\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimDC06, author = {Mihui Kim and Inshil Doh and Kijoon Chae}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {A Key Management Based on Multiple Regression in Hierarchical Sensor Network}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {267--281}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_21}, doi = {10.1007/978-3-540-71093-6\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimDC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonCKL06, author = {Taekyoung Kwon and Jung Hee Cheon and Yongdae Kim and Jaeil Lee}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Privacy Protection in PKIs: {A} Separation-of-Authority Approach}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {297--311}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_23}, doi = {10.1007/978-3-540-71093-6\_23}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KwonCKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonL06, author = {Saeran Kwon and Sang{-}Ho Lee}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Identity-Based Key Issuing Without Secure Channel in a Broad Area}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {30--44}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_3}, doi = {10.1007/978-3-540-71093-6\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonL06a, author = {Taekyoung Kwon and Dong Hoon Lee}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Three-Party Password Authenticated Key Agreement Resistant to Server Compromise}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {312--323}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_24}, doi = {10.1007/978-3-540-71093-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonL06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKHK06, author = {Ki Hun Lee and Yuna Kim and Sung Je Hong and Jong Kim}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {45--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_4}, doi = {10.1007/978-3-540-71093-6\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeMKCKK06, author = {Mun{-}Kyu Lee and Jung Ki Min and Seok Hun Kang and Sang{-}Hwa Chung and Howon Kim and Dong Kyue Kim}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {173--186}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_14}, doi = {10.1007/978-3-540-71093-6\_14}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeMKCKK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MaZZT06, author = {Jianqing Ma and Shiyong Zhang and YiPing Zhong and Xiaowen Tong}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {{SAID:} {A} Self-Adaptive Intrusion Detection System in Wireless Sensor Networks}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {60--73}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_5}, doi = {10.1007/978-3-540-71093-6\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MaZZT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoonLJCYLM06, author = {Daesung Moon and Sungju Lee and Seunghwan Jung and Yongwha Chung and Okyeon Yi and Namil Lee and Kiyoung Moon}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {100--109}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_8}, doi = {10.1007/978-3-540-71093-6\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoonLJCYLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PaekOL06, author = {Seung{-}Hyun Paek and Yoon{-}Keun Oh and Do{-}Hoon Lee}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {83--99}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_7}, doi = {10.1007/978-3-540-71093-6\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PaekOL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkHKSY06, author = {Chanil Park and Junbeom Hur and Chanoe Kim and Young{-}joo Shin and Hyunsoo Yoon}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Pre-authentication for Fast Handoff in Wireless Mesh Networks with Mobile APs}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {349--363}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_27}, doi = {10.1007/978-3-540-71093-6\_27}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkHKSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkMCP06, author = {Byungkwan Park and Daesung Moon and Yongwha Chung and Jin{-}Won Park}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {110--120}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_9}, doi = {10.1007/978-3-540-71093-6\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkMCP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkN06, author = {Jae{-}Chul Park and Bong{-}Nam Noh}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {{SQL} Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {74--82}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_6}, doi = {10.1007/978-3-540-71093-6\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Ryu06, author = {Jongho Ryu}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {{EAP} Using the Split Password-Based Authenticated Key Agreement}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {364--380}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_28}, doi = {10.1007/978-3-540-71093-6\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Ryu06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TanakaT06, author = {Michiru Tanaka and Yoshimi Teshigawara}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {A Method and Its Usability for User Authentication by Utilizing a Matrix Code Reader on Mobile Phones}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {225--236}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_18}, doi = {10.1007/978-3-540-71093-6\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TanakaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TobitaYDM06, author = {Takayuki Tobita and Hironori Yamamoto and Hiroshi Doi and Keigo Majima}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {324--338}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_25}, doi = {10.1007/978-3-540-71093-6\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TobitaYDM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/VasantaSSS06, author = {Harikrishna Vasanta and Reihaneh Safavi{-}Naini and Nicholas Paul Sheppard and Jan Martin Surminen}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Distributed Management of {OMA} {DRM} Domains}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {237--251}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_19}, doi = {10.1007/978-3-540-71093-6\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/VasantaSSS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YagiMH06, author = {Hideki Yagi and Toshiyasu Matsushima and Shigeichi Hirasawa}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {New Traceability Codes Against a Generalized Collusion Attack for Digital Fingerprinting}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {252--266}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_20}, doi = {10.1007/978-3-540-71093-6\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YagiMH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YamashitaT06, author = {Naoyuki Yamashita and Keisuke Tanaka}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Secret Handshake with Multiple Groups}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {339--348}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_26}, doi = {10.1007/978-3-540-71093-6\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YamashitaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YooHMOM06, author = {HyungSo Yoo and Christoph Herbst and Stefan Mangard and Elisabeth Oswald and Sang{-}Jae Moon}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Investigations of Power Analysis Attacks and Countermeasures for {ARIA}}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {160--172}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_13}, doi = {10.1007/978-3-540-71093-6\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YooHMOM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2005, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11604938}, doi = {10.1007/11604938}, isbn = {3-540-31012-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChaeKK05, author = {Song{-}hwa Chae and Wonil Kim and Dong{-}Kyoo Kim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Role-Based Access Control Model for Ubiquitous Computing Environment}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {354--363}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_28}, doi = {10.1007/11604938\_28}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChaeKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChengHCW05, author = {Bo{-}Chao Cheng and Ching{-}Fu Huang and Wei{-}Chi Chang and Cheng{-}Shong Wu}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Developing and Implementing {IHPM} on {IXP} 425 Network Processor Platforms}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {218--231}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_17}, doi = {10.1007/11604938\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChengHCW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GuoWZYL05, author = {Fei Guo and Jianmin Wang and Zhihao Zhang and Xiaojun Ye and Deyi Li}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {An Improved Algorithm to Watermark Numeric Relational Data}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {138--149}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_11}, doi = {10.1007/11604938\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GuoWZYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongJW05, author = {Kihun Hong and Souhwan Jung and Shyhtsun Felix Wu}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless Network}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {96--107}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_8}, doi = {10.1007/11604938\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongJW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IzuKOS05, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Takeshi Shimoyama}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {232--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_18}, doi = {10.1007/11604938\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IzuKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Juang05, author = {Wen{-}Shenq Juang}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {A Simple and Efficient Conference Scheme for Mobile Communications}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {81--95}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_7}, doi = {10.1007/11604938\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Juang05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangKPLSYK05, author = {Hyun{-}Ho Kang and Brian M. Kurkoski and Young{-}Ran Park and Hyejoo Lee and Sanguk Shin and Kazuhiko Yamaguchi and Kingo Kobayashi}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Video Fingerprinting System Using Wavelet and Error Correcting Code}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {150--164}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_12}, doi = {10.1007/11604938\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KangKPLSYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KanlayasiriS05, author = {Urupoj Kanlayasiri and Surasak Sanguanpong}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Key Factors Influencing Worm Infection in Enterprise Networks}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {54--67}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_5}, doi = {10.1007/11604938\_5}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KanlayasiriS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKKK05, author = {Mun{-}Kyu Lee and Keon Tae Kim and Howon Kim and Dong Kyue Kim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient Hardware Implementation of Elliptic Curve Cryptography over \emph{GF}(\emph{p}\({}^{\mbox{\emph{m}}}\))}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {207--217}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_16}, doi = {10.1007/11604938\_16}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/LeeKKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeePS05, author = {Minsoo Lee and Sehyun Park and Ohyoung Song}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Elastic Security QoS Provisioning for Telematics Applications}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {126--137}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_10}, doi = {10.1007/11604938\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeePS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeS05, author = {Ho Lee and Jung Hwan Song}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Designing Security Auditing Protocol with Web Browsers}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {364--376}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_29}, doi = {10.1007/11604938\_29}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LimK05, author = {Chae Hoon Lim and Tymur Korkishko}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {mCrypton - {A} Lightweight Block Cipher for Security of Low-Cost {RFID} Tags and Sensors}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {243--258}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_19}, doi = {10.1007/11604938\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LimK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MadouAMDSB05, author = {Matias Madou and Bertrand Anckaert and Patrick Moseley and Saumya K. Debray and Bjorn De Sutter and Koen De Bosschere}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Software Protection Through Dynamic Code Mutation}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {194--206}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_15}, doi = {10.1007/11604938\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MadouAMDSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MukhopadhyayS05, author = {Sourav Mukhopadhyay and Palash Sarkar}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Application of LFSRs in Time/Memory Trade-Off Cryptanalysis}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {25--37}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_3}, doi = {10.1007/11604938\_3}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MukhopadhyayS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NamKW05, author = {Junghyun Nam and Seungjoo Kim and Dongho Won}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {1--9}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_1}, doi = {10.1007/11604938\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NamKW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Oh05, author = {Sejong Oh}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {New Concept of Authority Range for Flexible Management of Role Hierarchy}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {343--353}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_27}, doi = {10.1007/11604938\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Oh05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OkadaK05, author = {Mitsuo Okada and Hiroaki Kikuchi}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Secure Asymmetric Watermark Detection Without Secret of Modified Pixels}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {165--178}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_13}, doi = {10.1007/11604938\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OkadaK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OntuaP05, author = {Marife G. Ontua and Susan Pancho{-}Festin}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Evaluation of the Unified Modeling Language for Security Requirements Analysis}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {68--80}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_6}, doi = {10.1007/11604938\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OntuaP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OswaldS05, author = {Elisabeth Oswald and Kai Schramm}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {An Efficient Masking Scheme for {AES} Software Implementations}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {292--305}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_23}, doi = {10.1007/11604938\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OswaldS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkKP05, author = {Je Hong Park and Bo Gyeong Kang and Sangwoo Park}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Cryptanalysis of Some Group-Oriented Proxy Signature Schemes}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {10--24}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_2}, doi = {10.1007/11604938\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkLHC05, author = {Tae{-}Jun Park and Mun{-}Kyu Lee and Dowon Hong and Kyoil Chung}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {A {DPA} Countermeasure by Randomized Frobenius Decomposition}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {271--282}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_21}, doi = {10.1007/11604938\_21}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkLHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RheeBLL05, author = {Hyun Sook Rhee and Jin Wook Byun and Dong Hoon Lee and Jongin Lim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Oblivious Conjunctive Keyword Search}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {318--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_25}, doi = {10.1007/11604938\_25}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RheeBLL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShinJ05, author = {Moon Sun Shin and Kyeong Ja Jeong}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {An Alert Data Mining Framework for Network-Based Intrusion Detection System}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {38--53}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_4}, doi = {10.1007/11604938\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShinJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShinPL05, author = {Jong Hoon Shin and Dong Jin Park and Pil Joong Lee}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {{DPA} Attack on the Improved Ha-Moon Algorithm}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {283--291}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_22}, doi = {10.1007/11604938\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShinPL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SuzukiY05, author = {Koutarou Suzuki and Makoto Yokoo}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Secure Multi-attribute Procurement Auction}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {306--317}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_24}, doi = {10.1007/11604938\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SuzukiY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Takashima05, author = {Katsuyuki Takashima}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on {(EC)DSA}}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {259--270}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_20}, doi = {10.1007/11604938\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Takashima05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TartaryW05, author = {Christophe Tartary and Huaxiong Wang}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient Multicast Stream Authentication for the Fully Adversarial Network Model}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {108--125}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_9}, doi = {10.1007/11604938\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TartaryW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YamamotoCNSU05, author = {Go Yamamoto and Koji Chida and Anderson C. A. Nascimento and Koutarou Suzuki and Shigenori Uchiyama}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {328--342}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_26}, doi = {10.1007/11604938\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YamamotoCNSU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YouSKCLK05, author = {Jin Ho You and Seong Chae Seo and Young Dae Kim and Jun Yong Choi and Sang Jun Lee and Byung Ki Kim}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Kimchi: {A} Binary Rewriting Defense Against Format String Attacks}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {179--193}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_14}, doi = {10.1007/11604938\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YouSKCLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BechlaghemR04, author = {Malek Bechlaghem and Vincent Rijmen}, editor = {Chae Hoon Lim and Moti Yung}, title = {Proving Key Usage}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {65--72}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_6}, doi = {10.1007/978-3-540-31815-6\_6}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BechlaghemR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiK04, author = {Young Jae Choi and Soon{-}Ja Kim}, editor = {Chae Hoon Lim and Moti Yung}, title = {An Improvement on Privacy and Authentication in {GSM}}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {14--26}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_2}, doi = {10.1007/978-3-540-31815-6\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChongRDEHC04, author = {Cheun Ngen Chong and Bin Ren and Jeroen Doumen and Sandro Etalle and Pieter H. Hartel and Ricardo Corin}, editor = {Chae Hoon Lim and Moti Yung}, title = {License Protection with a Tamper-Resistant Token}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {223--237}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_19}, doi = {10.1007/978-3-540-31815-6\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChongRDEHC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Chow04, author = {Sherman S. M. Chow}, editor = {Chae Hoon Lim and Moti Yung}, title = {Verifiable Pairing and Its Applications}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {170--187}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_15}, doi = {10.1007/978-3-540-31815-6\_15}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/Chow04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GodinezHM04, author = {Fernando God{\'{\i}}nez and Dieter Hutter and Ra{\'{u}}l Monroy}, editor = {Chae Hoon Lim and Moti Yung}, title = {Service Discrimination and Audit File Reduction for Effective Intrusion Detection}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {99--113}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_9}, doi = {10.1007/978-3-540-31815-6\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GodinezHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GomulkiewiczKK04, author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}, editor = {Chae Hoon Lim and Moti Yung}, title = {Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {400--410}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_32}, doi = {10.1007/978-3-540-31815-6\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GomulkiewiczKK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GuptaS04, author = {Kishan Chand Gupta and Palash Sarkar}, editor = {Chae Hoon Lim and Moti Yung}, title = {Efficient Representation and Software Implementation of Resilient Maiorana-McFarland S-boxes}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {317--331}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_26}, doi = {10.1007/978-3-540-31815-6\_26}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GuptaS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HaagdorensVG04, author = {Bart Haagdorens and Tim Vermeiren and Marnix Goossens}, editor = {Chae Hoon Lim and Moti Yung}, title = {Improving the Performance of Signature-Based Network Intrusion Detection Sensors by Multi-threading}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {188--203}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_16}, doi = {10.1007/978-3-540-31815-6\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HaagdorensVG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongJIR04, author = {Kihun Hong and Souhwan Jung and Luigi Lo Iacono and Christoph Ruland}, editor = {Chae Hoon Lim and Moti Yung}, title = {Impacts of Security Protocols on Real-Time Multimedia Communications}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {1--13}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_1}, doi = {10.1007/978-3-540-31815-6\_1}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongJIR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HuangLCCS04, author = {Yi{-}Yuan Huang and Kwok{-}Yan Lam and Siu Leung Chung and Chi{-}Hung Chi and Jia{-}Guang Sun}, editor = {Chae Hoon Lim and Moti Yung}, title = {Application of Content Computing in Honeyfarm}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {211--222}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_18}, doi = {10.1007/978-3-540-31815-6\_18}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HuangLCCS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Hwang0HR04, author = {SangCheol Hwang and Dong Hoon Lee and Daewan Han and Jae{-}Cheol Ryou}, editor = {Chae Hoon Lim and Moti Yung}, title = {Vulnerability of a Mobile Payment System Proposed at {WISA} 2002}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {278--285}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_23}, doi = {10.1007/978-3-540-31815-6\_23}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Hwang0HR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ImamotoS04, author = {Kenji Imamoto and Kouichi Sakurai}, editor = {Chae Hoon Lim and Moti Yung}, title = {Key-Exchange Protocol Using Pre-agreed Session-ID}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {375--387}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_30}, doi = {10.1007/978-3-540-31815-6\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ImamotoS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IwanagaTS04, author = {Manabu Iwanaga and Toshihiro Tabata and Kouichi Sakurai}, editor = {Chae Hoon Lim and Moti Yung}, title = {Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {135--143}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_12}, doi = {10.1007/978-3-540-31815-6\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IwanagaTS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeongCK04, author = {Seok Bong Jeong and Young{-}Woo Choi and Sehun Kim}, editor = {Chae Hoon Lim and Moti Yung}, title = {An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {204--210}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_17}, doi = {10.1007/978-3-540-31815-6\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JeongCK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KatagiKAT04, author = {Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi}, editor = {Chae Hoon Lim and Moti Yung}, title = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {345--359}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_28}, doi = {10.1007/978-3-540-31815-6\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KatagiKAT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimHL04, author = {Chong Hee Kim and Yong Ho Hwang and Pil Joong Lee}, editor = {Chae Hoon Lim and Moti Yung}, title = {Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {264--277}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_22}, doi = {10.1007/978-3-540-31815-6\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimHL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimKI04, author = {Mira Kim and Kazukuni Kobara and Hideki Imai}, editor = {Chae Hoon Lim and Moti Yung}, title = {Dynamic Fingerprinting over Broadcast Using Revocation Scheme}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {251--263}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_21}, doi = {10.1007/978-3-540-31815-6\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimKI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimO04, author = {Sangjin Kim and Heekuck Oh}, editor = {Chae Hoon Lim and Moti Yung}, title = {Fair Offline Payment Using Verifiable Encryption}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {286--301}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_24}, doi = {10.1007/978-3-540-31815-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimWCCP04, author = {Howon Kim and Thomas J. Wollinger and YongJe Choi and Kyoil Chung and Christof Paar}, editor = {Chae Hoon Lim and Moti Yung}, title = {Hyperelliptic Curve Coprocessors on a {FPGA}}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {360--374}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_29}, doi = {10.1007/978-3-540-31815-6\_29}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KimWCCP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KungpisdanLS04, author = {Supakorn Kungpisdan and Phu Dung Le and Bala Srinivasan}, editor = {Chae Hoon Lim and Moti Yung}, title = {A Limited-Used Key Generation Scheme for Internet Transactions}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {302--316}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_25}, doi = {10.1007/978-3-540-31815-6\_25}, timestamp = {Sun, 05 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KungpisdanLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Kwon04, author = {Soonhak Kwon}, editor = {Chae Hoon Lim and Moti Yung}, title = {Signed Digit Representation with {NAF} and Balanced Ternary Form and Efficient Exponentiation in GF(q\({}^{\mbox{n}}\)) Using a Gaussian Normal Basis of Type {II}}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {332--344}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_27}, doi = {10.1007/978-3-540-31815-6\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Kwon04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LawK04, author = {Kwok Ho Law and Lam For Kwok}, editor = {Chae Hoon Lim and Moti Yung}, title = {{IDS} False Alarm Filtering Using {KNN} Classifier}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {114--121}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_10}, doi = {10.1007/978-3-540-31815-6\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LawK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKLS04, author = {Hae{-}Yeoun Lee and Jong{-}Tae Kim and Heung{-}Kyu Lee and Young{-}Ho Suh}, editor = {Chae Hoon Lim and Moti Yung}, title = {Content-Based Synchronization Using the Local Invariant Feature for Robust Watermarking}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {122--134}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_11}, doi = {10.1007/978-3-540-31815-6\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuWW04, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, editor = {Chae Hoon Lim and Moti Yung}, title = {Custodian-Hiding Verifiable Encryption}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {51--64}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_5}, doi = {10.1007/978-3-540-31815-6\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoonI04, author = {Chang{-}Joo Moon and Hoh Peter In}, editor = {Chae Hoon Lim and Moti Yung}, title = {Inconsistency Detection of Authorization Policies in Distributed Component Environment}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {39--50}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_4}, doi = {10.1007/978-3-540-31815-6\_4}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoonI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkKL04, author = {Dong Jin Park and Kihyun Kim and Pil Joong Lee}, editor = {Chae Hoon Lim and Moti Yung}, title = {Public Key Encryption with Conjunctive Field Keyword Search}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {73--86}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_7}, doi = {10.1007/978-3-540-31815-6\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkKL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RechbergerO04, author = {Christian Rechberger and Elisabeth Oswald}, editor = {Chae Hoon Lim and Moti Yung}, title = {Practical Template Attacks}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {440--456}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_35}, doi = {10.1007/978-3-540-31815-6\_35}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/RechbergerO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RenLKY04, author = {Kui Ren and Hyunrok Lee and Kwangjo Kim and Taewhan Yoo}, editor = {Chae Hoon Lim and Moti Yung}, title = {Efficient Authenticated Key Agreement Protocol for Dynamic Groups}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {144--159}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_13}, doi = {10.1007/978-3-540-31815-6\_13}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/RenLKY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Saarinen04, author = {Markku{-}Juhani Olavi Saarinen}, editor = {Chae Hoon Lim and Moti Yung}, title = {Encrypted Watermarks and Linux Laptop Security}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {27--38}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_3}, doi = {10.1007/978-3-540-31815-6\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Saarinen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TanakaTY04, author = {Hidema Tanaka and Osamu Takizawa and Akihiro Yamamura}, editor = {Chae Hoon Lim and Moti Yung}, title = {Evaluation and Improvement of the Tempest Fonts}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {457--469}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_36}, doi = {10.1007/978-3-540-31815-6\_36}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TanakaTY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TataraTS04, author = {Kohei Tatara and Toshihiro Tabata and Kouichi Sakurai}, editor = {Chae Hoon Lim and Moti Yung}, title = {A Probabilistic Method for Detecting Anomalous Program Behavior}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {87--98}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_8}, doi = {10.1007/978-3-540-31815-6\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TataraTS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/TrichinaK04, author = {Elena Trichina and Lesya Korkishko}, editor = {Chae Hoon Lim and Moti Yung}, title = {Secure and Efficient {AES} Software Implementation for Smart Cards}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {425--439}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_34}, doi = {10.1007/978-3-540-31815-6\_34}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/TrichinaK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/XuZF04, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, editor = {Chae Hoon Lim and Moti Yung}, title = {A Ring Signature Scheme Using Bilinear Pairings}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {160--169}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_14}, doi = {10.1007/978-3-540-31815-6\_14}, timestamp = {Wed, 18 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/XuZF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YaoF04, author = {Gang Yao and Dengguo Feng}, editor = {Chae Hoon Lim and Moti Yung}, title = {A New k-Anonymous Message Transmission Protocol}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {388--399}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_31}, doi = {10.1007/978-3-540-31815-6\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YaoF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YooKHMP04, author = {HyungSo Yoo and ChangKyun Kim and JaeCheol Ha and Sang{-}Jae Moon and IlHwan Park}, editor = {Chae Hoon Lim and Moti Yung}, title = {Side Channel Cryptanalysis on {SEED}}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {411--424}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_33}, doi = {10.1007/978-3-540-31815-6\_33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YooKHMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YuT04, author = {Yinyan Yu and Zhi Tang}, editor = {Chae Hoon Lim and Moti Yung}, title = {An Adaptive Approach to Hardware Alteration for Digital Rights Management}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {238--250}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_20}, doi = {10.1007/978-3-540-31815-6\_20}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YuT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2003, editor = {Kijoon Chae and Moti Yung}, title = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b95188}, doi = {10.1007/B95188}, isbn = {3-540-20827-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2004, editor = {Chae Hoon Lim and Moti Yung}, title = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b103174}, doi = {10.1007/B103174}, isbn = {3-540-24015-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Asano03, author = {Tomoyuki Asano}, editor = {Kijoon Chae and Moti Yung}, title = {Reducing Storage at Receivers in {SD} and {LSD} Broadcast Encryption Schemes}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {317--332}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_24}, doi = {10.1007/978-3-540-24591-9\_24}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Asano03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AvoineV03, author = {Gildas Avoine and Serge Vaudenay}, editor = {Kijoon Chae and Moti Yung}, title = {Optimal Fair Exchange with Guardian Angels}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {188--202}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_15}, doi = {10.1007/978-3-540-24591-9\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AvoineV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/BidouBS03, author = {Renaud Bidou and Julien Bourgeois and Fran{\c{c}}ois Spies}, editor = {Kijoon Chae and Moti Yung}, title = {Towards a Global Security Architecture for Intrusion Detection and Reaction Management}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {111--123}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_9}, doi = {10.1007/978-3-540-24591-9\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/BidouBS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChiLSKOK03, author = {Suyoung Chi and Jaeyeon Lee and Jung Soh and Do{-}Hyung Kim and Weon{-}Geun Oh and Changhun Kim}, editor = {Kijoon Chae and Moti Yung}, title = {Visualization of Dynamic Characteristics in Two-Dimensional Time Series Patterns: An Application to Online Signature Verification}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {395--409}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_30}, doi = {10.1007/978-3-540-24591-9\_30}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChiLSKOK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChiPL03, author = {Sung{-}Do Chi and Jong Sou Park and Jang{-}Se Lee}, editor = {Kijoon Chae and Moti Yung}, title = {A Role of {DEVS} Simulation for Information Assurance}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {27--41}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_3}, doi = {10.1007/978-3-540-24591-9\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChiPL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoCCJCP03, author = {Yeongsub Cho and Sangrae Cho and Daeseon Choi and Seunghun Jin and Kyoil Chung and Cheehang Park}, editor = {Kijoon Chae and Moti Yung}, title = {A Location Privacy Protection Mechanism for Smart Space}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {162--173}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_13}, doi = {10.1007/978-3-540-24591-9\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoCCJCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiIL03, author = {Dae{-}Sik Choi and Eul{-}Gyu Im and Cheol Won Lee}, editor = {Kijoon Chae and Moti Yung}, title = {Intrusion-Tolerant System Design for Web Server Survivability}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {124--134}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_10}, doi = {10.1007/978-3-540-24591-9\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiIL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiKK03, author = {SuGil Choi and Kwangjo Kim and ByeongGon Kim}, editor = {Kijoon Chae and Moti Yung}, title = {Practical Solution for Location Privacy in Mobile IPv6}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {69--83}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_6}, doi = {10.1007/978-3-540-24591-9\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChoiKK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FukushimaS03, author = {Kazuhide Fukushima and Kouichi Sakurai}, editor = {Kijoon Chae and Moti Yung}, title = {A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {303--316}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_23}, doi = {10.1007/978-3-540-24591-9\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FukushimaS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GrossschadlK03, author = {Johann Gro{\ss}sch{\"{a}}dl and Guy{-}Armand Kamendje}, editor = {Kijoon Chae and Moti Yung}, title = {Low-Power Design of a Functional Unit for Arithmetic in Finite Fields GF(p) and GF(2\({}^{\mbox{m}}\))}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {227--243}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_18}, doi = {10.1007/978-3-540-24591-9\_18}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GrossschadlK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KangHKCC03, author = {Hyosup Kang and Y. Han and Hakil Kim and W. Choi and Yongwha Chung}, editor = {Kijoon Chae and Moti Yung}, title = {An Empirical Study of Multi-mode Biometric Systems Using Face and Fingerprint}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {348--354}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_26}, doi = {10.1007/978-3-540-24591-9\_26}, timestamp = {Sat, 16 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KangHKCC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimAB03, author = {Kyoil Kim and Jacob A. Abraham and Jayanta Bhadra}, editor = {Kijoon Chae and Moti Yung}, title = {Model Checking of Security Protocols with Pre-configuration}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {1--15}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_1}, doi = {10.1007/978-3-540-24591-9\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimAB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimLSR03, author = {Jin Suk Kim and Hohn Gyu Lee and Sungbo Seo and Keun Ho Ryu}, editor = {Kijoon Chae and Moti Yung}, title = {{CTAR:} Classification Based on Temporal Class-Association Rules for Intrusion Detection}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {84--96}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_7}, doi = {10.1007/978-3-540-24591-9\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimLSR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/King03, author = {Brian King}, editor = {Kijoon Chae and Moti Yung}, title = {A Comment on Group Independent Threshold Sharing}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {425--441}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_32}, doi = {10.1007/978-3-540-24591-9\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/King03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KooC03, author = {Ja{-}Min Koo and Sung{-}Bae Cho}, editor = {Kijoon Chae and Moti Yung}, title = {Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {97--110}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_8}, doi = {10.1007/978-3-540-24591-9\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KooC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KooJS03, author = {Bonwook Koo and Hwan Seok Jang and Jung Hwan Song}, editor = {Kijoon Chae and Moti Yung}, title = {Constructing and Cryptanalysis of a 16 {\texttimes} 16 Binary Matrix as a Diffusion Layer}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {489--503}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_36}, doi = {10.1007/978-3-540-24591-9\_36}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KooJS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonL03, author = {Taekyoung Kwon and Seongan Lim}, editor = {Kijoon Chae and Moti Yung}, title = {Automation-Considered Logic of Authentication and Key Distribution}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {442--457}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_33}, doi = {10.1007/978-3-540-24591-9\_33}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/KwonL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LamZCGS03, author = {Kwok{-}Yan Lam and Xibin Zhao and Siu Leung Chung and Ming Gu and Jia{-}Guang Sun}, editor = {Kijoon Chae and Moti Yung}, title = {Enhancing Grid Security Infrastructure to Support Mobile Computing Nodes}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {42--54}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_4}, doi = {10.1007/978-3-540-24591-9\_4}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LamZCGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKE03, author = {Hyun Suk Lee and Hyeog Man Kwon and Young Ik Eom}, editor = {Kijoon Chae and Moti Yung}, title = {Reliable Cascaded Delegation Scheme for Mobile Agent Environments}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {55--68}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_5}, doi = {10.1007/978-3-540-24591-9\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKE03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MinKC03, author = {Byoung{-}Joon Min and Sung Ki Kim and Joong{-}Sup Choi}, editor = {Kijoon Chae and Moti Yung}, title = {Secure System Architecture Based on Dynamic Resource Reallocation}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {174--187}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_14}, doi = {10.1007/978-3-540-24591-9\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MinKC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoonGAPCP03, author = {Daesung Moon and Youn{-}Hee Gil and Dosung Ahn and Sung Bum Pan and Yongwha Chung and Chee{-}Hang Park}, editor = {Kijoon Chae and Moti Yung}, title = {Fingerprint-Based Authentication for {USB} Token Systems}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {355--364}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_27}, doi = {10.1007/978-3-540-24591-9\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoonGAPCP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoonK03, author = {Hyeonjoon Moon and Jaihie Kim}, editor = {Kijoon Chae and Moti Yung}, title = {Biometrics Identification and Verification Using Projection-Based Face Recognition System}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {380--394}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_29}, doi = {10.1007/978-3-540-24591-9\_29}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoonK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MunozFES03, author = {Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza and Miguel Soriano}, editor = {Kijoon Chae and Moti Yung}, title = {{E-MHT.} An Efficient Protocol for Certificate Status Checking}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {410--424}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_31}, doi = {10.1007/978-3-540-24591-9\_31}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MunozFES03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NahKSPH03, author = {Jaehoon Nah and Hyeokchan Kwon and Sungwon Sohn and Cheehang Park and ChiMoon Han}, editor = {Kijoon Chae and Moti Yung}, title = {An Automatic Security Evaluation System for IPv6 Network}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {150--161}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_12}, doi = {10.1007/978-3-540-24591-9\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NahKSPH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NakaharaRPV03, author = {Jorge Nakahara Jr. and Vincent Rijmen and Bart Preneel and Joos Vandewalle}, editor = {Kijoon Chae and Moti Yung}, title = {The {MESH} Block Ciphers}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {458--473}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_34}, doi = {10.1007/978-3-540-24591-9\_34}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NakaharaRPV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Novak03, author = {Roman Novak}, editor = {Kijoon Chae and Moti Yung}, title = {Sign-Based Differential Power Analysis}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {203--216}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_16}, doi = {10.1007/978-3-540-24591-9\_16}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Novak03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PagliusiM03, author = {Paulo S. Pagliusi and Chris J. Mitchell}, editor = {Kijoon Chae and Moti Yung}, title = {PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous Access}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {135--149}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_11}, doi = {10.1007/978-3-540-24591-9\_11}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PagliusiM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkSL03, author = {Dong Jin Park and Sang Gyoo Sim and Pil Joong Lee}, editor = {Kijoon Chae and Moti Yung}, title = {Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {474--488}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_35}, doi = {10.1007/978-3-540-24591-9\_35}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkSL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PengBDV03, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapalee Viswanathan}, editor = {Kijoon Chae and Moti Yung}, title = {Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {244--256}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_19}, doi = {10.1007/978-3-540-24591-9\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PengBDV03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/PrakobpolP03, author = {Navapot Prakobpol and Yongyuth Permpoontanalarp}, editor = {Kijoon Chae and Moti Yung}, title = {Multi-dimensional Hash Chain For Sealed-Bid Auction}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {257--271}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_20}, doi = {10.1007/978-3-540-24591-9\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/PrakobpolP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SadeghiS03, author = {Ahmad{-}Reza Sadeghi and Christian St{\"{u}}ble}, editor = {Kijoon Chae and Moti Yung}, title = {Taming "Trusted Platforms" by Operating System Design}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {286--302}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_22}, doi = {10.1007/978-3-540-24591-9\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SadeghiS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShiraishiFM03, author = {Yoshiaki Shiraishi and Youji Fukuta and Masakatu Morii}, editor = {Kijoon Chae and Moti Yung}, title = {Remote Access {VPN} with Port Protection Function by Mobile Codes}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {16--26}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_2}, doi = {10.1007/978-3-540-24591-9\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShiraishiFM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SonKL03, author = {Byungjun Son and Gyundo Kee and Yillbyung Lee}, editor = {Kijoon Chae and Moti Yung}, title = {Iris Recognition System Using Wavelet Packet and Support Vector Machines}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {365--379}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_28}, doi = {10.1007/978-3-540-24591-9\_28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SonKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SongKL03, author = {Geun{-}Sil Song and Mi{-}Ae Kim and Won{-}Hyung Lee}, editor = {Kijoon Chae and Moti Yung}, title = {Asymmetric Watermarking Scheme Using Permutation Braids}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {217--226}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_17}, doi = {10.1007/978-3-540-24591-9\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SongKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SongYS03, author = {Hwanjong Song and Ukil Yang and Kwanghoon Sohn}, editor = {Kijoon Chae and Moti Yung}, title = {3D Face Recognition under Pose Varying Environments}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {333--347}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_25}, doi = {10.1007/978-3-540-24591-9\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SongYS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YaoFPD03, author = {Ming Yao and Ernest Foo and Kun Peng and Ed Dawson}, editor = {Kijoon Chae and Moti Yung}, title = {An Improved Forward Integrity Protocol for Mobile Agents}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {272--285}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_21}, doi = {10.1007/978-3-540-24591-9\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YaoFPD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.