Search dblp for Publications

export results for "stream:conf/wisa:"

 download as .bib file

@proceedings{DBLP:conf/wisa/2023,
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-99-8024-6},
  doi          = {10.1007/978-981-99-8024-6},
  isbn         = {978-981-99-8023-9},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AlthebeitiGANM23,
  author       = {Hattan Althebeiti and
                  Ran Gedawy and
                  Ahod Alghuried and
                  Daehun Nyang and
                  David Mohaisen},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Defending AirType Against Inference Attacks Using 3D In-Air Keyboard
                  Layouts: Design and Evaluation},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_13},
  doi          = {10.1007/978-981-99-8024-6\_13},
  timestamp    = {Thu, 18 Jan 2024 08:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AlthebeitiGANM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AlthebeitiM23,
  author       = {Hattan Althebeiti and
                  David Mohaisen},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Enriching Vulnerability Reports Through Automated and Augmented Description
                  Summarization},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {213--227},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_17},
  doi          = {10.1007/978-981-99-8024-6\_17},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AlthebeitiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BaeKLS23,
  author       = {Seungyeon Bae and
                  Taehun Kim and
                  Woomin Lee and
                  Youngjoo Shin},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Exploiting Memory Page Management in {KSM} for Remote Memory Deduplication
                  Attack},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {244--256},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_19},
  doi          = {10.1007/978-981-99-8024-6\_19},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/BaeKLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DohYHLAY23,
  author       = {Hyun Jung Doh and
                  Joon Soo Yoo and
                  Miyeon Hong and
                  Kang Hoon Lee and
                  Tae Min Ahn and
                  Ji Won Yoon},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Principal Component Analysis over the Boolean Circuit Within {TFHE}
                  Scheme},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {27--39},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_3},
  doi          = {10.1007/978-981-99-8024-6\_3},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/DohYHLAY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HaM23,
  author       = {Seon Ha and
                  Hyungon Moon},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Protecting Kernel Code Integrity with {PMP} on {RISC-V}},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {231--243},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_18},
  doi          = {10.1007/978-981-99-8024-6\_18},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HaM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IkematsuJY23,
  author       = {Yasuhiko Ikematsu and
                  Hyungrok Jo and
                  Takanori Yasuda},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {A Security Analysis on MQ-Sign},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {40--51},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_4},
  doi          = {10.1007/978-981-99-8024-6\_4},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/IkematsuJY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeonS23,
  author       = {Seungho Jeon and
                  Jung{-}Taek Seo},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {SP-Fuzz: Fuzzing Soft {PLC} with Semi-automated Harness Synthesis},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {282--293},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_22},
  doi          = {10.1007/978-981-99-8024-6\_22},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/JeonS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JiJS23,
  author       = {Ilhwan Ji and
                  Seungho Jeon and
                  Jung{-}Taek Seo},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {{AE-LSTM} Based Anomaly Detection System for Communication Over {DNP}
                  3.0},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_8},
  doi          = {10.1007/978-981-99-8024-6\_8},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/JiJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JoS23,
  author       = {Hyungrok Jo and
                  Junji Shikata},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Bloomier Filters on 3-Hypergraphs},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {16--26},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_2},
  doi          = {10.1007/978-981-99-8024-6\_2},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/JoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KhanK23,
  author       = {Irshad Khan and
                  Young{-}Woo Kwon},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Multi-class Malware Detection via Deep Graph Convolutional Networks
                  Using TF-IDF-Based Attributed Call Graphs},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {188--200},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_15},
  doi          = {10.1007/978-981-99-8024-6\_15},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KhanK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimJSS23,
  author       = {Donghyun Kim and
                  Seungho Jeon and
                  Jiho Shin and
                  Jung{-}Taek Seo},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {{OCR} Meets the Dark Web: Identifying the Content Type Regarding Illegal
                  and Cybercrime},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_16},
  doi          = {10.1007/978-981-99-8024-6\_16},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimJSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimKKJS23,
  author       = {Wonwoong Kim and
                  Yeajun Kang and
                  Hyunji Kim and
                  Kyungbae Jang and
                  Hwajeong Seo},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {310--323},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_24},
  doi          = {10.1007/978-981-99-8024-6\_24},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimKKJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimS23,
  author       = {Eunyoung Kim and
                  Kiwook Sohn},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Research on Security Threats Using {VPN} in Zero Trust Environments},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_5},
  doi          = {10.1007/978-981-99-8024-6\_5},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KuzunoYOHY23,
  author       = {Hiroki Kuzuno and
                  Tomohiko Yano and
                  Kazuki Omo and
                  Jeroen van der Ham and
                  Toshihiro Yamauchi},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Security Risk Indicator for Open Source Software to Measure Software
                  Development Status},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {143--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_12},
  doi          = {10.1007/978-981-99-8024-6\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KuzunoYOHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonSSLS23,
  author       = {Hyeokdong Kwon and
                  Minjoo Sim and
                  Gyeongju Song and
                  Minwoo Lee and
                  Hwajeong Seo},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking
                  Approach},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {338--348},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_26},
  doi          = {10.1007/978-981-99-8024-6\_26},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonSSLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LarasatiK23,
  author       = {Harashta Tatimma Larasati and
                  Howon Kim},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic
                  Curves},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {297--309},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_23},
  doi          = {10.1007/978-981-99-8024-6\_23},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LarasatiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NaOLC23,
  author       = {Hyunsik Na and
                  Yoonju Oh and
                  Wonho Lee and
                  Daeseon Choi},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Systematic Evaluation of Robustness Against Model Inversion Attacks
                  on Split Learning},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_9},
  doi          = {10.1007/978-981-99-8024-6\_9},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/NaOLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OktianJOJKLK23,
  author       = {Yustus Eko Oktian and
                  Uk Jo and
                  Simon Oh and
                  Hanho Jeong and
                  Jaehyun Kim and
                  Thi{-}Thu{-}Huong Le and
                  Howon Kim},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Patchman: Firmware Update Delivery Service Over the Blockchain for
                  IoT Environment},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {131--142},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_11},
  doi          = {10.1007/978-981-99-8024-6\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OktianJOJKLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkAPK23,
  author       = {Jaewoo Park and
                  Hong Eun Ahn and
                  Leo Hyun Park and
                  Taekyoung Kwon},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Robust Training for Deepfake Detection Models Against Disruption-Induced
                  Data Poisoning},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {175--187},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_14},
  doi          = {10.1007/978-981-99-8024-6\_14},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkAPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkKK23,
  author       = {Yonggon Park and
                  Youngjoo Ko and
                  Jong Kim},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Mutation Methods for Structured Input to Enhance Path Coverage of
                  Fuzzers},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {257--268},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_20},
  doi          = {10.1007/978-981-99-8024-6\_20},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PrihatnoSLOLK23,
  author       = {Aji Teguh Prihatno and
                  Naufal Suryanto and
                  Harashta Tatimma Larasati and
                  Yustus Eko Oktian and
                  Thi{-}Thu{-}Huong Le and
                  Howon Kim},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {A New Frontier in Digital Security: Verification for {NFT} Image Using
                  Deep Learning-Based ConvNeXt Model in Quantum Blockchain},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {79--90},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_7},
  doi          = {10.1007/978-981-99-8024-6\_7},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/PrihatnoSLOLK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShibayamaI23,
  author       = {Naoki Shibayama and
                  Yasutaka Igarashi},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {A New Higher Order Differential of {LCB}},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_1},
  doi          = {10.1007/978-981-99-8024-6\_1},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ShibayamaI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SimKESLS23,
  author       = {Minjoo Sim and
                  Hyeokdong Kwon and
                  Siwoo Eum and
                  Gyeongju Song and
                  Minwoo Lee and
                  Hwajeong Seo},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Efficient Implementation of the Classic McEliece on ARMv8 Processors},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {324--337},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_25},
  doi          = {10.1007/978-981-99-8024-6\_25},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SimKESLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WatanabeGM23,
  author       = {Ryo Watanabe and
                  Nasratullah Ghafoori and
                  Atsuko Miyaji},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {269--281},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_21},
  doi          = {10.1007/978-981-99-8024-6\_21},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WatanabeGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YoonKKE23,
  author       = {Seong{-}Su Yoon and
                  Do{-}Yeon Kim and
                  Ga{-}Gyeong Kim and
                  Ieck{-}Chae Euom},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {Vulnerability Assessment Framework Based on In-The-Wild Exploitability
                  for Prioritizing Patch Application in Control System},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_10},
  doi          = {10.1007/978-981-99-8024-6\_10},
  timestamp    = {Thu, 18 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/YoonKKE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhangBLLS23,
  author       = {Yan Zhang and
                  Yuhao Bai and
                  Soojin Lee and
                  Ming Li and
                  Seung{-}Hyun Seo},
  editor       = {Howon Kim and
                  Jonghee M. Youn},
  title        = {A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism},
  booktitle    = {Information Security Applications - 24th International Conference,
                  {WISA} 2023, Jeju Island, South Korea, August 23-25, 2023, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14402},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8024-6\_6},
  doi          = {10.1007/978-981-99-8024-6\_6},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhangBLLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2022,
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-25659-2},
  doi          = {10.1007/978-3-031-25659-2},
  isbn         = {978-3-031-25658-5},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AnadaFH22,
  author       = {Hiroaki Anada and
                  Masayuki Fukumitsu and
                  Shingo Hasegawa},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Group Signatures with Designated Traceability over Openers' Attributes
                  in Bilinear Groups},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {29--43},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_3},
  doi          = {10.1007/978-3-031-25659-2\_3},
  timestamp    = {Tue, 14 Feb 2023 11:13:42 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AnadaFH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AnastasovaAK22,
  author       = {Mila Anastasova and
                  Reza Azarderakhsh and
                  Mehran Mozaffari Kermani},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Time-Optimal Design of Finite Field Arithmetic for {SIKE} on Cortex-M4},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {265--276},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_19},
  doi          = {10.1007/978-3-031-25659-2\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AnastasovaAK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BordelACKRA22,
  author       = {Borja Bordel and
                  Ram{\'{o}}n Alcarria and
                  Joaqu{\'{\i}}n Chung and
                  Rajkumar Kettimuthu and
                  Tom{\'{a}}s Robles and
                  Iv{\'{a}}n Armuelles},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Quality-of-Service Degradation in Distributed Instrumentation Systems
                  Through Poisoning of 5G Beamforming Algorithms},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_5},
  doi          = {10.1007/978-3-031-25659-2\_5},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/BordelACKRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/CastilloHACD22,
  author       = {Mathew Del Castillo and
                  Harvey Hermosa and
                  Philip Virgil Astillo and
                  Gaurav Choudhary and
                  Nicola Dragoni},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Software-Defined Network Based Secure Internet-Enabled Video Surveillance
                  System},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {89--101},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_7},
  doi          = {10.1007/978-3-031-25659-2\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/CastilloHACD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoLCL22,
  author       = {Hyunsu Cho and
                  Sunwoo Lee and
                  Wonsuk Choi and
                  Dong Hoon Lee},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {171--184},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_13},
  doi          = {10.1007/978-3-031-25659-2\_13},
  timestamp    = {Wed, 22 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoLCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiJ22,
  author       = {Jinhong Choi and
                  Yeongjin Jang},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {A Survey on Sensor False Data Injection Attacks and Countermeasures
                  in Cyber-Physical and Embedded Systems},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {185--203},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_14},
  doi          = {10.1007/978-3-031-25659-2\_14},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/EmuraKNOO22,
  author       = {Keita Emura and
                  Kaisei Kajita and
                  Ryo Nojima and
                  Kazuto Ogawa and
                  Go Ohtake},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Membership Privacy for Asynchronous Group Messaging},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {131--142},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_10},
  doi          = {10.1007/978-3-031-25659-2\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/EmuraKNOO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FirdausR22,
  author       = {Muhammad Firdaus and
                  Kyung{-}Hyune Rhee},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular
                  Networks},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_12},
  doi          = {10.1007/978-3-031-25659-2\_12},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/FirdausR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Hirose22,
  author       = {Shoichi Hirose},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Collision-Resistant and Pseudorandom Hash Function Using Tweakable
                  Block Cipher},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_1},
  doi          = {10.1007/978-3-031-25659-2\_1},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Hirose22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JangKLKYS22,
  author       = {Kyungbae Jang and
                  Won{-}Woong Kim and
                  Sejin Lim and
                  Yeajun Kang and
                  Yujin Yang and
                  Hwajeong Seo},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Optimized Implementation of Quantum Binary Field Multiplication with
                  Toffoli Depth One},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {251--264},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_18},
  doi          = {10.1007/978-3-031-25659-2\_18},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/JangKLKYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimGL22,
  author       = {Yu{-}kyung Kim and
                  Myong{-}Hyun Go and
                  Kyungho Lee},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Influence Through Cyber Capacity Building: Network Analysis of Assistance,
                  Cooperation, and Agreements Among {ASEAN} Plus Three Countries},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {330--343},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_24},
  doi          = {10.1007/978-3-031-25659-2\_24},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimLYKY22,
  author       = {Taewan Kim and
                  Seyoon Lee and
                  Seunghwan Yun and
                  Jongbum Kim and
                  Okyeon Yi},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {277--288},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_20},
  doi          = {10.1007/978-3-031-25659-2\_20},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimLYKY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimSBKC22,
  author       = {Intae Kim and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim and
                  Yang{-}Wai Chow},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {{TLS} Goes Low Cost: When {TLS} Meets Edge},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {102--113},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_8},
  doi          = {10.1007/978-3-031-25659-2\_8},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimSBKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KuzunoY22,
  author       = {Hiroki Kuzuno and
                  Toshihiro Yamauchi},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel
                  Vulnerability},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {222--234},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_16},
  doi          = {10.1007/978-3-031-25659-2\_16},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KuzunoY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonKSELLS22,
  author       = {Hyeokdong Kwon and
                  Hyunjun Kim and
                  Minjoo Sim and
                  Siwoo Eum and
                  Minwoo Lee and
                  Wai{-}Kong Lee and
                  Hwajeong Seo},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {ARMing-Sword: Scabbard on {ARM}},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {237--250},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_17},
  doi          = {10.1007/978-3-031-25659-2\_17},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonKSELLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeLLJKLCK22,
  author       = {Bora Lee and
                  Kyungchan Lim and
                  JiHo Lee and
                  Chijung Jung and
                  Doowon Kim and
                  Kyu Hyung Lee and
                  Haehyun Cho and
                  Yonghwi Kwon},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic
                  State Machine},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_15},
  doi          = {10.1007/978-3-031-25659-2\_15},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeLLJKLCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiZLBC22,
  author       = {Wei Li and
                  Xiaoyu Zhang and
                  Shen Lin and
                  Xinbo Ban and
                  Xiaofeng Chen},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Chameleon {DNN} Watermarking: Dynamically Public Model Ownership Verification},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {344--356},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_25},
  doi          = {10.1007/978-3-031-25659-2\_25},
  timestamp    = {Wed, 06 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LiZLBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MurataHGS22,
  author       = {Issei Murata and
                  Pengju He and
                  Yujie Gu and
                  Kouichi Sakurai},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Towards Evaluating the Security of Human Computable Passwords Using
                  Neural Networks},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {303--312},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_22},
  doi          = {10.1007/978-3-031-25659-2\_22},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MurataHGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhPKPK22,
  author       = {Myung Gyo Oh and
                  Leo Hyun Park and
                  Jaeuk Kim and
                  Jaewoo Park and
                  Taekyoung Kwon},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {On Membership Inference Attacks to Generative Language Models Across
                  Language Domains},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {143--155},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_11},
  doi          = {10.1007/978-3-031-25659-2\_11},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/OhPKPK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PrabowoT22,
  author       = {Theo Fanuela Prabowo and
                  Chik How Tan},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Provably Secure Password-Authenticated Key Exchange Based on {SIDH}},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_2},
  doi          = {10.1007/978-3-031-25659-2\_2},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/PrabowoT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Shin22,
  author       = {SeongHan Shin},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {5G-AKA, Revisited},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {114--127},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_9},
  doi          = {10.1007/978-3-031-25659-2\_9},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Shin22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ThaiT22,
  author       = {Binh Le Thanh Thai and
                  Hidema Tanaka},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {A Novel Metric for Password Security Risk Against Dictionary Attacks},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_21},
  doi          = {10.1007/978-3-031-25659-2\_21},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ThaiT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangYL22,
  author       = {Lixin Wang and
                  Jianhua Yang and
                  Austin Lee},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {An Effective Approach for Stepping-Stone Intrusion Detection Using
                  Packet Crossover},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_6},
  doi          = {10.1007/978-3-031-25659-2\_6},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WangYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YangJKSS22,
  author       = {Yujin Yang and
                  Kyungbae Jang and
                  Hyunji Kim and
                  Gyeongju Song and
                  Hwajeong Seo},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Grover on {SPARKLE}},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {44--59},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_4},
  doi          = {10.1007/978-3-031-25659-2\_4},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/YangJKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhouEK22,
  author       = {Xiaofan Zhou and
                  Simon Yusuf Enoch and
                  Dong Seong Kim},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Markov Decision Process for Automatic Cyber Defense},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {313--329},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_23},
  doi          = {10.1007/978-3-031-25659-2\_23},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhouEK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AlkinoonCM21,
  author       = {Mohammed Alkinoon and
                  Sung J. Choi and
                  David Mohaisen},
  editor       = {Hyoungshick Kim},
  title        = {Measuring Healthcare Data Breaches},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {265--277},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_22},
  doi          = {10.1007/978-3-030-89432-0\_22},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AlkinoonCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AwaludinPK21,
  author       = {Asep Muhamad Awaludin and
                  Derry Pratama and
                  Howon Kim},
  editor       = {Hyoungshick Kim},
  title        = {AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator
                  Based on Synchronous Edge Sampling},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {157--168},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_13},
  doi          = {10.1007/978-3-030-89432-0\_13},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AwaludinPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BaeHL21,
  author       = {Sungho Bae and
                  Chanwoong Hwang and
                  Taejin Lee},
  editor       = {Hyoungshick Kim},
  title        = {Research on Improvement of Anomaly Detection Performance in Industrial
                  Control Systems},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {76--87},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_7},
  doi          = {10.1007/978-3-030-89432-0\_7},
  timestamp    = {Mon, 13 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/BaeHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiK21,
  author       = {Jeongseok Choi and
                  Hyoungshick Kim},
  editor       = {Hyoungshick Kim},
  title        = {On the Robustness of Intrusion Detection Systems for Vehicles Against
                  Adversarial Attacks},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_4},
  doi          = {10.1007/978-3-030-89432-0\_4},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiPPK21,
  author       = {Young Ah Choi and
                  Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  editor       = {Hyoungshick Kim},
  title        = {Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural
                  Networks},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_3},
  doi          = {10.1007/978-3-030-89432-0\_3},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiPPK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GantaYCP21,
  author       = {Priyatham Ganta and
                  Kicho Yu and
                  Dharma Dheeraj Chintala and
                  Younghee Park},
  editor       = {Hyoungshick Kim},
  title        = {Adaptive Network Security Service Orchestration Based on {SDN/NFV}},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {231--242},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_19},
  doi          = {10.1007/978-3-030-89432-0\_19},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/GantaYCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Jang21,
  author       = {Daehee Jang},
  editor       = {Hyoungshick Kim},
  title        = {BadASLR: Exceptional Cases of {ASLR} Aiding Exploitation},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {278--289},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_23},
  doi          = {10.1007/978-3-030-89432-0\_23},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Jang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimKCP21,
  author       = {Jeongwoo Kim and
                  Seoyeon Kang and
                  Eun{-}Sun Cho and
                  Joon{-}Young Paik},
  editor       = {Hyoungshick Kim},
  title        = {{LOM:} Lightweight Classifier for Obfuscation Methods},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_1},
  doi          = {10.1007/978-3-030-89432-0\_1},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimKCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimLS21,
  author       = {Jane Kim and
                  Soojin Lee and
                  Seung{-}Hyun Seo},
  editor       = {Hyoungshick Kim},
  title        = {A Privacy-Preserving Payment Model for {EV} Charging},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {255--264},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_21},
  doi          = {10.1007/978-3-030-89432-0\_21},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimSCBK21,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Yang{-}Wai Chow and
                  Joonsang Baek and
                  Intae Kim},
  editor       = {Hyoungshick Kim},
  title        = {Pattern Matching over Encrypted Data with a Short Ciphertext},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {132--143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_11},
  doi          = {10.1007/978-3-030-89432-0\_11},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimSCBK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimSEJSKKLS21,
  author       = {Hyunjun Kim and
                  Minjoo Sim and
                  Siwoo Eum and
                  Kyungbae Jang and
                  Gyeongju Song and
                  Hyunji Kim and
                  Hyeokdong Kwon and
                  Wai{-}Kong Lee and
                  Hwajeong Seo},
  editor       = {Hyoungshick Kim},
  title        = {Masked Implementation of {PIPO} Block Cipher on 8-bit {AVR} Microcontrollers},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_14},
  doi          = {10.1007/978-3-030-89432-0\_14},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimSEJSKKLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwakKS21,
  author       = {YuJin Kwak and
                  YoungBeom Kim and
                  Seog Chung Seo},
  editor       = {Hyoungshick Kim},
  title        = {Parallel Implementation of {PIPO} Block Cipher on 32-bit {RISC-V}
                  Processor},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_15},
  doi          = {10.1007/978-3-030-89432-0\_15},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwakKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonJKKSELS21,
  author       = {Hyeokdong Kwon and
                  Kyungbae Jang and
                  Hyunjun Kim and
                  Hyunji Kim and
                  Minjoo Sim and
                  Siwoo Eum and
                  Wai{-}Kong Lee and
                  Hwajeong Seo},
  editor       = {Hyoungshick Kim},
  title        = {ARMed Frodo - FrodoKEM on 64-Bit ARMv8 Processors},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {206--217},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_17},
  doi          = {10.1007/978-3-030-89432-0\_17},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonJKKSELS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LarasatiK21,
  author       = {Harashta Tatimma Larasati and
                  Howon Kim},
  editor       = {Hyoungshick Kim},
  title        = {Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve
                  Discrete Logarithm Problem},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {91--104},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_8},
  doi          = {10.1007/978-3-030-89432-0\_8},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LarasatiK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKS21,
  author       = {Seokmin Lee and
                  Taehun Kim and
                  Youngjoo Shin},
  editor       = {Hyoungshick Kim},
  title        = {Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {218--228},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_18},
  doi          = {10.1007/978-3-030-89432-0\_18},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeY21,
  author       = {KangHoon Lee and
                  Ji Won Yoon},
  editor       = {Hyoungshick Kim},
  title        = {Efficient Adaptation of {TFHE} for High End-to-End Throughput},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {144--156},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_12},
  doi          = {10.1007/978-3-030-89432-0\_12},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuSB21,
  author       = {Xin Liu and
                  Willy Susilo and
                  Joonsang Baek},
  editor       = {Hyoungshick Kim},
  title        = {Secure Computation of Shared Secrets and Its Applications},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {119--131},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_10},
  doi          = {10.1007/978-3-030-89432-0\_10},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuSB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoggEK21,
  author       = {Raymond Mogg and
                  Simon Yusuf Enoch and
                  Dong Seong Kim},
  editor       = {Hyoungshick Kim},
  title        = {A Framework for Generating Evasion Attacks for Machine Learning Based
                  Network Intrusion Detection Systems},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_5},
  doi          = {10.1007/978-3-030-89432-0\_5},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MoggEK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MotteH21,
  author       = {Samuel De La Motte and
                  Jin B. Hong},
  editor       = {Hyoungshick Kim},
  title        = {A Method for Collecting Vehicular Network Data for Enhanced Anomaly
                  Detection},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_2},
  doi          = {10.1007/978-3-030-89432-0\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MotteH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RheeL21,
  author       = {Hyun Sook Rhee and
                  Dong Hoon Lee},
  editor       = {Hyoungshick Kim},
  title        = {Anonymous {IBE} from {PEKS:} {A} Generic Construction},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {105--118},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_9},
  doi          = {10.1007/978-3-030-89432-0\_9},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/RheeL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoLLS21,
  author       = {Chang{-}Bae Seo and
                  Gyuseop Lee and
                  Yeonjoon Lee and
                  Seung{-}Hyun Seo},
  editor       = {Hyoungshick Kim},
  title        = {Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing
                  Environments},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {64--75},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_6},
  doi          = {10.1007/978-3-030-89432-0\_6},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoLLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoSLA21,
  author       = {Hwajeong Seo and
                  Pakize Sanal and
                  Wai{-}Kong Lee and
                  Reza Azarderakhsh},
  editor       = {Hyoungshick Kim},
  title        = {No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit
                  {ARM} Platforms},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {194--205},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_16},
  doi          = {10.1007/978-3-030-89432-0\_16},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoSLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WenLWW21,
  author       = {Jinghang Wen and
                  Jia{-}Nan Liu and
                  Axin Wu and
                  Jiasi Weng},
  editor       = {Hyoungshick Kim},
  title        = {A General Framework for Matching Pattern Hiding in Deep Packet Inspection},
  booktitle    = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  pages        = {243--254},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0\_20},
  doi          = {10.1007/978-3-030-89432-0\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WenLWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2021,
  editor       = {Hyoungshick Kim},
  title        = {Information Security Applications - 22nd International Conference,
                  {WISA} 2021, Jeju Island, South Korea, August 11-13, 2021, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13009},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-89432-0},
  doi          = {10.1007/978-3-030-89432-0},
  isbn         = {978-3-030-89431-3},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AbusnainaANC0M20,
  author       = {Ahmed Abusnaina and
                  Mohammed Abuhamad and
                  DaeHun Nyang and
                  Songqing Chen and
                  An Wang and
                  David Mohaisen},
  editor       = {Ilsun You},
  title        = {Insights into Attacks' Progression: Prediction of Spatio-Temporal
                  Behavior of DDoS Attacks},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {362--374},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_27},
  doi          = {10.1007/978-3-030-65299-9\_27},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AbusnainaANC0M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiS20,
  author       = {Hojin Choi and
                  Seog Chung Seo},
  editor       = {Ilsun You},
  title        = {Optimization of {PBKDF2-HMAC-SHA256} and {PBKDF2-HMAC-LSH256} in {CPU}
                  Environments},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {321--333},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_24},
  doi          = {10.1007/978-3-030-65299-9\_24},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DuttaSDB020,
  author       = {Priyanka Dutta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Joonsang Baek and
                  Partha Sarathi Roy},
  editor       = {Ilsun You},
  title        = {Identity-Based Unidirectional Proxy Re-encryption in Standard Model:
                  {A} Lattice-Based Construction},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {245--257},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_19},
  doi          = {10.1007/978-3-030-65299-9\_19},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/DuttaSDB020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HanzawaK20,
  author       = {Akihiro Hanzawa and
                  Hiroaki Kikuchi},
  editor       = {Ilsun You},
  title        = {Analysis on Malicious Residential Hosts Activities Exploited by Residential
                  {IP} Proxy Services},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {349--361},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_26},
  doi          = {10.1007/978-3-030-65299-9\_26},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HanzawaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IchiokaPMNY20,
  author       = {Shuichi Ichioka and
                  Estelle Pouget and
                  Takao Mimura and
                  Jun Nakajima and
                  Toshihiro Yamauchi},
  editor       = {Ilsun You},
  title        = {Accessibility Service Utilization Rates in Android Applications Shared
                  on Twitter},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {101--111},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_8},
  doi          = {10.1007/978-3-030-65299-9\_8},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/IchiokaPMNY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JangCKHS20,
  author       = {Kyoungbae Jang and
                  Seung Ju Choi and
                  Hyeokdong Kwon and
                  Zhi Hu and
                  Hwajeong Seo},
  editor       = {Ilsun You},
  title        = {Impact of Optimized Operations A{\(\cdot\)} B, A{\(\cdot\)} {C} for
                  Binary Field Inversion on Quantum Computers},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {154--166},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_12},
  doi          = {10.1007/978-3-030-65299-9\_12},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/JangCKHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeonY20,
  author       = {Youngbae Jeon and
                  Ji Won Yoon},
  editor       = {Ilsun You},
  title        = {Filtering-Based Correlation Power Analysis {(CPA)} with Signal Envelopes
                  Against Shuffling Methods},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {389--402},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_29},
  doi          = {10.1007/978-3-030-65299-9\_29},
  timestamp    = {Fri, 20 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JeonY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimJP20,
  author       = {Sung{-}Kyung Kim and
                  Eun{-}Tae Jang and
                  Ki{-}Woong Park},
  editor       = {Ilsun You},
  title        = {Toward a Fine-Grained Evaluation of the Pwnable {CTF}},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {179--190},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_14},
  doi          = {10.1007/978-3-030-65299-9\_14},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimJP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimKMSLK20,
  author       = {Yongsu Kim and
                  Hyoeun Kang and
                  Afifatul Mukaroh and
                  Naufal Suryanto and
                  Harashta Tatimma Larasati and
                  Howon Kim},
  editor       = {Ilsun You},
  title        = {Spatially Localized Perturbation {GAN} {(SLP-GAN)} for Generating
                  Invisible Adversarial Patches},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_1},
  doi          = {10.1007/978-3-030-65299-9\_1},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimKMSLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimPKJCS20,
  author       = {Hyunji Kim and
                  Jaehoon Park and
                  Hyeokdong Kwon and
                  Kyoungbae Jang and
                  Seungju Choi and
                  Hwajeong Seo},
  editor       = {Ilsun You},
  title        = {Detecting Block Cipher Encryption for Defense Against Crypto Ransomware
                  on Low-End Internet of Things},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_2},
  doi          = {10.1007/978-3-030-65299-9\_2},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimPKJCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimS20,
  author       = {YoungBeom Kim and
                  Seog Chung Seo},
  editor       = {Ilsun You},
  title        = {An Efficient Implementation of {AES} on 8-Bit AVR-Based Sensor Nodes},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {276--290},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_21},
  doi          = {10.1007/978-3-030-65299-9\_21},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KoderaCM20,
  author       = {Kenta Kodera and
                  Chen{-}Mou Cheng and
                  Atsuko Miyaji},
  editor       = {Ilsun You},
  title        = {Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery
                  Curves},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {258--275},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_20},
  doi          = {10.1007/978-3-030-65299-9\_20},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KoderaCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonKCJPKS20,
  author       = {Hyeokdong Kwon and
                  Hyunji Kim and
                  Seungju Choi and
                  Kyoungbae Jang and
                  Jaehoon Park and
                  Hyunjun Kim and
                  Hwajeong Seo},
  editor       = {Ilsun You},
  title        = {Compact Implementation of {CHAM} Block Cipher on Low-End Microcontrollers},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_10},
  doi          = {10.1007/978-3-030-65299-9\_10},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonKCJPKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeH20,
  author       = {JongHyeok Lee and
                  Dong{-}Guk Han},
  editor       = {Ilsun You},
  title        = {{DLDDO:} Deep Learning to Detect Dummy Operations},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {73--85},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_6},
  doi          = {10.1007/978-3-030-65299-9\_6},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKL20,
  author       = {Chaeeun Lee and
                  Eunnarae Ko and
                  Kyungho Lee},
  editor       = {Ilsun You},
  title        = {Methods to Select Features for Android Malware Detection Based on
                  the Protection Level Analysis},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {375--386},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_28},
  doi          = {10.1007/978-3-030-65299-9\_28},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Liu0ZS20,
  author       = {Naiwei Liu and
                  Meng Yu and
                  Wanyu Zang and
                  Ravi S. Sandhu},
  editor       = {Ilsun You},
  title        = {On the Cost-Effectiveness of TrustZone Defense on {ARM} Platform},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_16},
  doi          = {10.1007/978-3-030-65299-9\_16},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Liu0ZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MeraoucheDS20,
  author       = {Ishak Meraouche and
                  Sabyasachi Dutta and
                  Kouichi Sakurai},
  editor       = {Ilsun You},
  title        = {3-Party Adversarial Steganography},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {89--100},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_7},
  doi          = {10.1007/978-3-030-65299-9\_7},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MeraoucheDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MinLPSL20,
  author       = {Moohong Min and
                  Jemin Justin Lee and
                  Hyunbeom Park and
                  Hyojoung Shin and
                  Kyungho Lee},
  editor       = {Ilsun You},
  title        = {A Statistical Approach Towards Fraud Detection in the Horse Racing},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {191--202},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_15},
  doi          = {10.1007/978-3-030-65299-9\_15},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MinLPSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NaPJ020,
  author       = {Dongbin Na and
                  Namgyu Park and
                  Sangwoo Ji and
                  Jong Kim},
  editor       = {Ilsun You},
  title        = {CAPTCHAs Are Still in Danger: An Efficient Scheme to Bypass Adversarial
                  CAPTCHAs},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {31--44},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_3},
  doi          = {10.1007/978-3-030-65299-9\_3},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/NaPJ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkCPCKY20,
  author       = {Seongmin Park and
                  HyungJin Cho and
                  Youngkwon Park and
                  Bomin Choi and
                  Dowon Kim and
                  Kangbin Yim},
  editor       = {Ilsun You},
  title        = {Security Problems of 5G Voice Communication},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {403--415},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_30},
  doi          = {10.1007/978-3-030-65299-9\_30},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkCPCKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkL20,
  author       = {Semi Park and
                  Kyungho Lee},
  editor       = {Ilsun You},
  title        = {The Gravy Value: {A} Set of Features for Pinpointing {BOT} Detection
                  Method},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {142--153},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_11},
  doi          = {10.1007/978-3-030-65299-9\_11},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkPK20,
  author       = {Kyung Ho Park and
                  Eunji Park and
                  Huy Kang Kim},
  editor       = {Ilsun You},
  title        = {Unsupervised Intrusion Detection System for Unmanned Aerial Vehicle
                  with Less Labeling Effort},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {45--58},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_4},
  doi          = {10.1007/978-3-030-65299-9\_4},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Peng20,
  author       = {Kun Peng},
  editor       = {Ilsun You},
  title        = {Paid and Anonymous Usage of Cloud Software},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {308--320},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_23},
  doi          = {10.1007/978-3-030-65299-9\_23},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Peng20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShimJ20,
  author       = {Hyunseok Shim and
                  Souhwan Jung},
  editor       = {Ilsun You},
  title        = {Entropy-Based Feature Grouping in Machine Learning for Android Malware
                  Classification},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {59--72},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_5},
  doi          = {10.1007/978-3-030-65299-9\_5},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ShimJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShiuLLH20,
  author       = {Hung{-}Jr Shiu and
                  Fang{-}Yie Leu and
                  Chun{-}Ming Lai and
                  Yu{-}Chun Huang},
  editor       = {Ilsun You},
  title        = {Novel Reversible Acoustic Steganography Based on Carrier Orthogonality},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {112--123},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_9},
  doi          = {10.1007/978-3-030-65299-9\_9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ShiuLLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangINT20,
  author       = {Yacheng Wang and
                  Yasuhiko Ikematsu and
                  Shuhei Nakamura and
                  Tsuyoshi Takagi},
  editor       = {Ilsun You},
  title        = {Revisiting the Minrank Problem on Multivariate Cryptography},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {291--307},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_22},
  doi          = {10.1007/978-3-030-65299-9\_22},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WangINT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WonJB20,
  author       = {Yoo{-}Seung Won and
                  Dirmanto Jap and
                  Shivam Bhasin},
  editor       = {Ilsun You},
  title        = {Push for More: On Comparison of Data Augmentation and {SMOTE} with
                  Optimised Deep Learning Architecture for Side-Channel},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {227--241},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_18},
  doi          = {10.1007/978-3-030-65299-9\_18},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WonJB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WongY20,
  author       = {Shing Ki Wong and
                  Siu{-}Ming Yiu},
  editor       = {Ilsun You},
  title        = {Detection on {GPS} Spoofing in Location Based Mobile Games},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_17},
  doi          = {10.1007/978-3-030-65299-9\_17},
  timestamp    = {Thu, 17 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WongY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YoonNHJ20,
  author       = {Jaehyeon Yoon and
                  Ngoc{-}Tu Chau and
                  Hoang Nguyen Huy and
                  Souhwan Jung},
  editor       = {Ilsun You},
  title        = {Virtualization Technologies in the Android Framework and Compatibility
                  with SEAndroid},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {167--178},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_13},
  doi          = {10.1007/978-3-030-65299-9\_13},
  timestamp    = {Mon, 21 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/YoonNHJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhangLHZJ20,
  author       = {Yanhua Zhang and
                  Ximeng Liu and
                  Yupu Hu and
                  Qikun Zhang and
                  Huiwen Jia},
  editor       = {Ilsun You},
  title        = {Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature
                  Schemes with Verifier-Local Revocation from Lattices},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {334--346},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_25},
  doi          = {10.1007/978-3-030-65299-9\_25},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhangLHZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2019,
  editor       = {Ilsun You},
  title        = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-39303-8},
  doi          = {10.1007/978-3-030-39303-8},
  isbn         = {978-3-030-39302-1},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2020,
  editor       = {Ilsun You},
  title        = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9},
  doi          = {10.1007/978-3-030-65299-9},
  isbn         = {978-3-030-65298-2},
  timestamp    = {Sat, 12 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/0001MKWLN19,
  author       = {Jeman Park and
                  Aziz Mohaisen and
                  Charles A. Kamhoua and
                  Michael J. Weisman and
                  Nandi O. Leslie and
                  Laurent Njilla},
  editor       = {Ilsun You},
  title        = {Cyber Deception in the Internet of Battlefield Things: Techniques,
                  Instances, and Assessments},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {299--312},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_23},
  doi          = {10.1007/978-3-030-39303-8\_23},
  timestamp    = {Tue, 28 Jan 2020 10:04:20 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/0001MKWLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiV19,
  author       = {Gwangbae Choi and
                  Serge Vaudenay},
  editor       = {Ilsun You},
  title        = {Timed-Release Encryption with Master Time Bound Key},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {167--179},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_13},
  doi          = {10.1007/978-3-030-39303-8\_13},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChowSBK19,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joonsang Baek and
                  Jongkil Kim},
  editor       = {Ilsun You},
  title        = {{QR} Code Watermarking for Digital Images},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {25--37},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_3},
  doi          = {10.1007/978-3-030-39303-8\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChowSBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Dutta0FKS19,
  author       = {Sabyasachi Dutta and
                  Partha Sarathi Roy and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Ilsun You},
  title        = {Secret Sharing on Evolving Multi-level Access Structure},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_14},
  doi          = {10.1007/978-3-030-39303-8\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Dutta0FKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HalgasAN19,
  author       = {Lukas Halgas and
                  Ioannis Agrafiotis and
                  Jason R. C. Nurse},
  editor       = {Ilsun You},
  title        = {Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural
                  Networks (RNNs)},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {219--233},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_17},
  doi          = {10.1007/978-3-030-39303-8\_17},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HalgasAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongY19,
  author       = {Miyeon Hong and
                  Ji Won Yoon},
  editor       = {Ilsun You},
  title        = {Model Selection for Data Analysis in Encrypted Domain: Application
                  to Simple Linear Regression},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {155--166},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_12},
  doi          = {10.1007/978-3-030-39303-8\_12},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HongY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimBSC19,
  author       = {Jongkil Kim and
                  Joonsang Baek and
                  Willy Susilo and
                  Yang{-}Wai Chow},
  editor       = {Ilsun You},
  title        = {Efficient Decentralized Random Commitment Key Generation for Mixnet
                  Shuffle Proof},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {206--216},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_16},
  doi          = {10.1007/978-3-030-39303-8\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimBSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimWLS19,
  author       = {Hyuntae Kim and
                  Seongil Wi and
                  Hyunjoo Lee and
                  Sooel Son},
  editor       = {Ilsun You},
  title        = {{FSF:} Code Coverage-Driven Fuzzing for Software-Defined Networking},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_4},
  doi          = {10.1007/978-3-030-39303-8\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimWLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimYC19,
  author       = {Taehyuk Kim and
                  Taek{-}Young Youn and
                  Dooho Choi},
  editor       = {Ilsun You},
  title        = {Is It Possible to Hide My Key into Deep Neural Network?},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {259--272},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_20},
  doi          = {10.1007/978-3-030-39303-8\_20},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KoJ019,
  author       = {Youngjoo Ko and
                  Sangwoo Ji and
                  Jong Kim},
  editor       = {Ilsun You},
  title        = {Low-Noise {LLC} Side-Channel Attack with Perf},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {328--340},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_25},
  doi          = {10.1007/978-3-030-39303-8\_25},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KoJ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonYP19,
  author       = {Hyun Kwon and
                  Hyunsoo Yoon and
                  Ki{-}Woong Park},
  editor       = {Ilsun You},
  title        = {{CAPTCHA} Image Generation Using Style Transfer Learning in Deep Neural
                  Network},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {234--246},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_18},
  doi          = {10.1007/978-3-030-39303-8\_18},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonYP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeDS19,
  author       = {Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo},
  editor       = {Ilsun You},
  title        = {A Blind Ring Signature Based on the Short Integer Solution Problem},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {92--111},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_8},
  doi          = {10.1007/978-3-030-39303-8\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeDS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeHKH19,
  author       = {Jinhee Lee and
                  Younggee Hong and
                  Hyunsoo Kwon and
                  Junbeom Hur},
  editor       = {Ilsun You},
  title        = {Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of
                  the Dark Web in Korea},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {357--369},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_27},
  doi          = {10.1007/978-3-030-39303-8\_27},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeHKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeOKC19,
  author       = {Sangjae Lee and
                  Mi{-}Kyung Oh and
                  Yousung Kang and
                  Dooho Choi},
  editor       = {Ilsun You},
  title        = {{RC} {PUF:} {A} Low-Cost and an Easy-to-Design {PUF} for Resource-Constrained
                  IoT Devices},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {275--285},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_21},
  doi          = {10.1007/978-3-030-39303-8\_21},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeOKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LohHTK19,
  author       = {Jia{-}Ch'ng Loh and
                  Swee{-}Huay Heng and
                  Syh{-}Yuan Tan and
                  Kaoru Kurosawa},
  editor       = {Ilsun You},
  title        = {A Note on the Invisibility and Anonymity of Undeniable Signature Schemes},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {112--125},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_9},
  doi          = {10.1007/978-3-030-39303-8\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LohHTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MatheuPRS19,
  author       = {Sara Nieves Matheu and
                  Salvador P{\'{e}}rez and
                  Jos{\'{e}} Luis Hern{\'{a}}ndez Ramos and
                  Antonio F. Skarmeta},
  editor       = {Ilsun You},
  title        = {On the Automation of Security Testing for IoT Constrained Scenarios},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {286--298},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_22},
  doi          = {10.1007/978-3-030-39303-8\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MatheuPRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NamJM19,
  author       = {Sungyup Nam and
                  Seungho Jeon and
                  Jongsub Moon},
  editor       = {Ilsun You},
  title        = {A New Password Cracking Model with Generative Adversarial Networks},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {247--258},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_19},
  doi          = {10.1007/978-3-030-39303-8\_19},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/NamJM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkKKCPSKK19,
  author       = {Minkyung Park and
                  Jeongnyeo Kim and
                  Youngho Kim and
                  Eunsang Cho and
                  Soobin Park and
                  Sungmin Sohn and
                  Minhyeok Kang and
                  Ted "Taekyoung" Kwon},
  editor       = {Ilsun You},
  title        = {An SGX-Based Key Management Framework for Data Centric Networking},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {370--382},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_28},
  doi          = {10.1007/978-3-030-39303-8\_28},
  timestamp    = {Wed, 18 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkKKCPSKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkLK19,
  author       = {Kyung Ho Park and
                  Eunjo Lee and
                  Huy Kang Kim},
  editor       = {Ilsun You},
  title        = {Show Me Your Account: Detecting {MMORPG} Game Bot Leveraging Financial
                  Analysis with {LSTM}},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_1},
  doi          = {10.1007/978-3-030-39303-8\_1},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PereraNHY19,
  author       = {Maharage Nisansala Sevwandi Perera and
                  Toru Nakamura and
                  Masayuki Hashimoto and
                  Hiroyuki Yokoyama},
  editor       = {Ilsun You},
  title        = {Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group
                  Signatures from Lattices with {VLR}},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {126--140},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_10},
  doi          = {10.1007/978-3-030-39303-8\_10},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/PereraNHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoJA19,
  author       = {Hwajeong Seo and
                  Amir Jalali and
                  Reza Azarderakhsh},
  editor       = {Ilsun You},
  title        = {Optimized {SIKE} Round 2 on 64-bit {ARM}},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {341--353},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_26},
  doi          = {10.1007/978-3-030-39303-8\_26},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoJA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoJL19,
  author       = {Jeongeun Seo and
                  Minhee Joo and
                  Kyungho Lee},
  editor       = {Ilsun You},
  title        = {Turn On the Lights: User Behavior in Game Environment Using {CPTED}},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {14--24},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_2},
  doi          = {10.1007/978-3-030-39303-8\_2},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoKKKCKJ19,
  author       = {Hwajeong Seo and
                  Hyeokdong Kwon and
                  Yongbeen Kwon and
                  Kyungho Kim and
                  Seungju Choi and
                  Hyunjun Kim and
                  Kyoungbae Jang},
  editor       = {Ilsun You},
  title        = {Ring-LWE on 8-Bit {AVR} Embedded Processor},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {315--327},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_24},
  doi          = {10.1007/978-3-030-39303-8\_24},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoKKKCKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Shin0HIKOKT19,
  author       = {SeongHan Shin and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Yusuke Ishida and
                  Atsushi Kunii and
                  Junichi Oketani and
                  Shimpei Kunii and
                  Kiyoshi Tomomura},
  editor       = {Ilsun You},
  title        = {An Extended {CTRT} for {AES-256}},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {79--91},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_7},
  doi          = {10.1007/978-3-030-39303-8\_7},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Shin0HIKOKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Shin19,
  author       = {SeongHan Shin},
  editor       = {Ilsun You},
  title        = {Strengthened {PAKE} Protocols Secure Against Malicious Private Key
                  Generator},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {192--205},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_15},
  doi          = {10.1007/978-3-030-39303-8\_15},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Shin19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SimsekBSSKAAO19,
  author       = {Goksel Simsek and
                  Hakan Bostan and
                  Alper Kaan Sarica and
                  Egemen Sarikaya and
                  Alperen Keles and
                  Pelin Angin and
                  Hande Alemdar and
                  Ertan Onur},
  editor       = {Ilsun You},
  title        = {DroPPPP: {A} {P4} Approach to Mitigating DoS Attacks in {SDN}},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_5},
  doi          = {10.1007/978-3-030-39303-8\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SimsekBSSKAAO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WuCZT19,
  author       = {Hao{-}Tian Wu and
                  Yiu{-}ming Cheung and
                  Zhenwei Zhuang and
                  Shaohua Tang},
  editor       = {Ilsun You},
  title        = {Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {141--154},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_11},
  doi          = {10.1007/978-3-030-39303-8\_11},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WuCZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZengHY19,
  author       = {Gongxian Zeng and
                  Meiqi He and
                  Siu{-}Ming Yiu},
  editor       = {Ilsun You},
  title        = {A Secure and Self-tallying E-voting System Based on Blockchain},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {67--76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_6},
  doi          = {10.1007/978-3-030-39303-8\_6},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZengHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2018,
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17982-3},
  doi          = {10.1007/978-3-030-17982-3},
  isbn         = {978-3-030-17981-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AnCK18,
  author       = {Hyeongcheol An and
                  Rakyong Choi and
                  Kwangjo Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Blockchain-Based Decentralized Key Management System with Quantum
                  Resistance},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_18},
  doi          = {10.1007/978-3-030-17982-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AnCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoCKHR18,
  author       = {Geumhwan Cho and
                  Jusop Choi and
                  Hyoungshick Kim and
                  Sangwon Hyun and
                  Jungwoo Ryoo},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Threat Modeling and Analysis of Voice Assistant Applications},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {197--209},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_16},
  doi          = {10.1007/978-3-030-17982-3\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoCKHR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongLLCCC18,
  author       = {Jina Hong and
                  JinKi Lee and
                  HyunKyu Lee and
                  YoonHa Chang and
                  KwangHo Choi and
                  Sang Kil Cha},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {AlertVision: Visualizing Security Alerts},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {173--184},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_14},
  doi          = {10.1007/978-3-030-17982-3\_14},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HongLLCCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ImamuraO18,
  author       = {Mitsuyoshi Imamura and
                  Kazumasa Omote},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Network Deployments of Bitcoin Peers and Malicious Nodes Based on
                  Darknet Sensor},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_10},
  doi          = {10.1007/978-3-030-17982-3\_10},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ImamuraO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimEHLN18,
  author       = {SungCheol Kim and
                  IeckChae Euom and
                  ChangHyun Ha and
                  JooHyoung Lee and
                  BongNam Noh},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A Study on the Vulnerability Assessment for Digital I{\&}C System
                  in Nuclear Power Plant},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {68--80},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_6},
  doi          = {10.1007/978-3-030-17982-3\_6},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimEHLN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimK18,
  author       = {Kunwoo Kim and
                  Jungduk Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A Study on Analyzing Risk Scenarios About Vulnerabilities of Security
                  Monitoring System: Focused on Information Leakage by Insider},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {159--170},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_13},
  doi          = {10.1007/978-3-030-17982-3\_13},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KobayashiH18,
  author       = {Takumi Kobayashi and
                  Keisuke Hakuta},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Secure Comparison Protocol with Encrypted Output and the Computation
                  for Proceeding 2 Bits-by-2 Bits},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {213--228},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_17},
  doi          = {10.1007/978-3-030-17982-3\_17},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KobayashiH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KoderaKKN18,
  author       = {Yuta Kodera and
                  Minoru Kuribayashi and
                  Takuya Kusaka and
                  Yasuyuki Nogami},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A Construction of a Keyword Search to Allow Partial Matching with
                  a Block Cipher},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {241--252},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_19},
  doi          = {10.1007/978-3-030-17982-3\_19},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KoderaKKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonKYC18,
  author       = {Hyun Kwon and
                  Yongchul Kim and
                  Hyunsoo Yoon and
                  Daeseon Choi},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural
                  Networks},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {42--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_4},
  doi          = {10.1007/978-3-030-17982-3\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonKYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Lee18,
  author       = {Jong{-}Kwan Lee},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {{IP} Address Mutation Scheme Using Vector Projection for Tactical
                  Wireless Networks},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {81--92},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_7},
  doi          = {10.1007/978-3-030-17982-3\_7},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Lee18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeJK18,
  author       = {Sanghak Lee and
                  Sangwoo Ji and
                  Jong Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Security Analysis of Mobile Web Browser Hardware Accessibility: Study
                  with Ambient Light Sensors},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_1},
  doi          = {10.1007/978-3-030-17982-3\_1},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeJK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeK18,
  author       = {Sooyeon Lee and
                  Huy Kang Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {ADSaS: Comprehensive Real-Time Anomaly Detection System},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {29--41},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_3},
  doi          = {10.1007/978-3-030-17982-3\_3},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeSL18,
  author       = {Jae{-}Yung Lee and
                  Jae Hyuk Suk and
                  Dong Hoon Lee},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {{VODKA:} Virtualization Obfuscation Using Dynamic Key Approach},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {131--145},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_11},
  doi          = {10.1007/978-3-030-17982-3\_11},
  timestamp    = {Tue, 11 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NanjoKSKN18,
  author       = {Yuki Nanjo and
                  Md. Al{-}Amin Khandaker and
                  Masaaki Shirase and
                  Takuya Kusaka and
                  Yasuyuki Nogami},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Efficient Ate-Based Pairing over the Attractive Classes of {BN} Curves},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_5},
  doi          = {10.1007/978-3-030-17982-3\_5},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NanjoKSKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhK18,
  author       = {Saeyoung Oh and
                  Jong Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering
                  Memory Address Mapping Algorithms},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {146--158},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_12},
  doi          = {10.1007/978-3-030-17982-3\_12},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RatchasanW18,
  author       = {Trust Ratchasan and
                  Rungrat Wiangsripanawan},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {HapticPoints: The Extended PassPoints Graphical Password},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {16--28},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_2},
  doi          = {10.1007/978-3-030-17982-3\_2},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/RatchasanW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoAK18,
  author       = {Hwajeong Seo and
                  Kyuhwang An and
                  Hyeokdong Kwon},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Compact {LEA} and {HIGHT} Implementations on 8-Bit {AVR} and 16-Bit
                  {MSP} Processors},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {253--265},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_20},
  doi          = {10.1007/978-3-030-17982-3\_20},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoAK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoAKPHK18,
  author       = {Hwajeong Seo and
                  Kyuhwang An and
                  Hyeokdong Kwon and
                  Taehwan Park and
                  Zhi Hu and
                  Howon Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Parallel Implementations of {CHAM}},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {93--104},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_8},
  doi          = {10.1007/978-3-030-17982-3\_8},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoAKPHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShimY18,
  author       = {Shinwoo Shim and
                  Ji Won Yoon},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {A New Bayesian Approach to Exploring Damaged Assets by Monitoring
                  Mission Failures Caused by Undetected Attack},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {185--196},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_15},
  doi          = {10.1007/978-3-030-17982-3\_15},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShimY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YooSY18,
  author       = {Joon Soo Yoo and
                  Baek Kyung Song and
                  Ji Won Yoon},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Logarithm Design on Encrypted Data with Bitwise Operation},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {105--116},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_9},
  doi          = {10.1007/978-3-030-17982-3\_9},
  timestamp    = {Thu, 11 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YooSY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2017,
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93563-8},
  doi          = {10.1007/978-3-319-93563-8},
  isbn         = {978-3-319-93562-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AminantoK17,
  author       = {Muhamad Erza Aminanto and
                  Kwangjo Kim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep
                  Learning},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_18},
  doi          = {10.1007/978-3-319-93563-8\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AminantoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BiWW17,
  author       = {Jingguo Bi and
                  Mingqiang Wang and
                  Wei Wei},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {An Improved Algorithm to Solve the Systems of Univariate Modular Equations},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {51--60},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_5},
  doi          = {10.1007/978-3-319-93563-8\_5},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BiWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BoehmKH17,
  author       = {Vanesco A. J. Boehm and
                  Jong Kim and
                  James Won{-}Ki Hong},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Holistic Tracking of Products on the Blockchain Using {NFC} and Verified
                  Users},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {184--195},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_16},
  doi          = {10.1007/978-3-319-93563-8\_16},
  timestamp    = {Sat, 30 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BoehmKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FiroozjaeiLK17,
  author       = {Mahdi Daghmehchi Firoozjaei and
                  Sangmin Lee and
                  Hyoungshick Kim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {O\({}^{\mbox{2}}\)TR: Offline Off-the-Record {(OTR)} Messaging},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {61--71},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_6},
  doi          = {10.1007/978-3-319-93563-8\_6},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FiroozjaeiLK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GrimmARBH17,
  author       = {Jonathan Grimm and
                  Irfan Ahmed and
                  Vassil Roussev and
                  Manish Bhatt and
                  Manpyo Hong},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Automatic Mitigation of Kernel Rootkits in Cloud Environments},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {137--149},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_12},
  doi          = {10.1007/978-3-319-93563-8\_12},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/GrimmARBH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HouJPL17,
  author       = {Jong{-}Uk Hou and
                  Han{-}Ul Jang and
                  Jin{-}Seok Park and
                  Heung{-}Kyu Lee},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Exposing Digital Forgeries by Detecting a Contextual Violation Using
                  Deep Neural Networks},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {16--24},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_2},
  doi          = {10.1007/978-3-319-93563-8\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HouJPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HouYSL17,
  author       = {Jong{-}Uk Hou and
                  In{-}Jae Yu and
                  Hyun{-}Ji Song and
                  Heung{-}Kyu Lee},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint
                  Code},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {25--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_3},
  doi          = {10.1007/978-3-319-93563-8\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HouYSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HwangK17,
  author       = {Da Mi Hwang and
                  In Seok Kim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {The Digits Hidden in the Virtual World: Approximate Estimation Applying
                  Capture and Recapture},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {310--322},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_26},
  doi          = {10.1007/978-3-319-93563-8\_26},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HwangK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JohSKK17,
  author       = {Jungwoo Joh and
                  Yezee Seo and
                  Hoon{-}Kyu Kim and
                  Taekyoung Kwon},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Glitch Recall: {A} Hardware Trojan Exploiting Natural Glitches in
                  Logic Circuits},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_13},
  doi          = {10.1007/978-3-319-93563-8\_13},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/JohSKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KasuyaS17,
  author       = {Momoka Kasuya and
                  Kazuo Sakiyama},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Improved {EM} Side-Channel Authentication Using Profile-Based {XOR}
                  Model},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {173--183},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_15},
  doi          = {10.1007/978-3-319-93563-8\_15},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KasuyaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimLY17,
  author       = {Hyunki Kim and
                  Jae{-}Hoon Lee and
                  Okyeon Yi},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Key Managements of Underwater Acoustic Communication Environments},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {274--282},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_23},
  doi          = {10.1007/978-3-319-93563-8\_23},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKL17,
  author       = {Keun Young Lee and
                  Hun Yeong Kwon and
                  Jong In Lim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Legal Consideration on the Use of Artificial Intelligence Technology
                  and Self-regulation in Financial Sector: Focused on Robo-Advisors},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {323--335},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_27},
  doi          = {10.1007/978-3-319-93563-8\_27},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeLS17,
  author       = {Minsu Lee and
                  Hyun{-}Gu Lee and
                  Ji Sun Shin},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Evolution of Spamming Attacks on Facebook},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {101--111},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_9},
  doi          = {10.1007/978-3-319-93563-8\_9},
  timestamp    = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeY17,
  author       = {Saetbyeol Lee and
                  Jiwon Yoon},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Model Parameter Estimation and Inference on Encrypted Domain: Application
                  to Noise Reduction in Encrypted Images},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {115--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_10},
  doi          = {10.1007/978-3-319-93563-8\_10},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeYC17,
  author       = {Namsup Lee and
                  Hyunsoo Yoon and
                  Daeseon Choi},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Detecting Online Game Chargeback Fraud Based on Transaction Sequence
                  Modeling Using Recurrent Neural Network},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {297--309},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_25},
  doi          = {10.1007/978-3-319-93563-8\_25},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeYC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiP17,
  author       = {Haoyu Li and
                  Yanbin Pan},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {The Search Successive Minima Problem Is Equivalent to Its Optimization
                  Version},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_4},
  doi          = {10.1007/978-3-319-93563-8\_4},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MaL17,
  author       = {Sha Ma and
                  Yunhao Ling},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {A General Two-Server Cryptosystem Supporting Complex Queries},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {249--260},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_21},
  doi          = {10.1007/978-3-319-93563-8\_21},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MaL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MiyamotoSS17,
  author       = {Eito Miyamoto and
                  Takeshi Sugawara and
                  Kazuo Sakiyama},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Efficient Software Implementation of Modular Multiplication in Prime
                  Fields on TI's {DSP} {TMS320C6678}},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {261--273},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_22},
  doi          = {10.1007/978-3-319-93563-8\_22},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MiyamotoSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NguyenMT17,
  author       = {Son Duc Nguyen and
                  Mamoru Mimura and
                  Hidema Tanaka},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Abusing {TCP} Retransmission for DoS Attack Inside Virtual Network},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {199--211},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_17},
  doi          = {10.1007/978-3-319-93563-8\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NguyenMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhLY17,
  author       = {Insu Oh and
                  Kyungroul Lee and
                  Kangbin Yim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {A Protection Technique for Screen Image-Based Authentication Protocols
                  Utilizing the SetCursorPos Function},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {236--245},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_20},
  doi          = {10.1007/978-3-319-93563-8\_20},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkPL17,
  author       = {Mookyu Park and
                  Moosung Park and
                  Kyungho Lee},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian
                  Hacking Incident},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {224--235},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_19},
  doi          = {10.1007/978-3-319-93563-8\_19},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkSLKNK17,
  author       = {Taehwan Park and
                  Hwajeong Seo and
                  Garam Lee and
                  Md. Al{-}Amin Khandaker and
                  Yasuyuki Nogami and
                  Howon Kim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Parallel Implementations of {SIMON} and SPECK, Revisited},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {283--294},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_24},
  doi          = {10.1007/978-3-319-93563-8\_24},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkSLKNK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkY017,
  author       = {Joon Young Park and
                  Jong Pil Yun and
                  Dong Hoon Lee},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {WheelLogger: Driver Tracing Using Smart Watch},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_8},
  doi          = {10.1007/978-3-319-93563-8\_8},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkY017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoPJHK17,
  author       = {Hwajeong Seo and
                  Taehwan Park and
                  Janghyun Ji and
                  Zhi Hu and
                  Howon Kim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {{ARM/NEON} Co-design of Multiplication/Squaring},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {72--84},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_7},
  doi          = {10.1007/978-3-319-93563-8\_7},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoPJHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoPJK17,
  author       = {Hwajeong Seo and
                  Taehwan Park and
                  Janghyun Ji and
                  Howon Kim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Lightweight Fault Attack Resistance in Software Using Intra-instruction
                  Redundancy, Revisited},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_1},
  doi          = {10.1007/978-3-319-93563-8\_1},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoPJK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WooPL17,
  author       = {Jae Hyeon Woo and
                  Moosung Park and
                  Kyungho Lee},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Breaking Text {CAPTCHA} by Repeated Information},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {127--136},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_11},
  doi          = {10.1007/978-3-319-93563-8\_11},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WooPL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YoonYJ17,
  author       = {Kwon{-}Jin Yoon and
                  Jaehyeon Yoon and
                  Souhwan Jung},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Design and Implementation of Android Container Monitoring Server and
                  Agent},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {162--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_14},
  doi          = {10.1007/978-3-319-93563-8\_14},
  timestamp    = {Wed, 27 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YoonYJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2016,
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56549-1},
  doi          = {10.1007/978-3-319-56549-1},
  isbn         = {978-3-319-56548-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AminantoK16,
  author       = {Muhamad Erza Aminanto and
                  Kwangjo Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Detecting Impersonation Attack in WiFi Networks Using Deep Learning
                  Approach},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {136--147},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_12},
  doi          = {10.1007/978-3-319-56549-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AminantoK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChaK16,
  author       = {Seunghun Cha and
                  Hyoungshick Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Detecting Encrypted Traffic: {A} Machine Learning Approach},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {54--65},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_5},
  doi          = {10.1007/978-3-319-56549-1\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChaK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiPHPK16,
  author       = {Jongseok Choi and
                  Jong{-}gyu Park and
                  Shinwook Heo and
                  Namje Park and
                  Howon Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Slowloris DoS Countermeasure over WebSocket},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {42--53},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_4},
  doi          = {10.1007/978-3-319-56549-1\_4},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiPHPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FaugereP16,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {The Quantum-Safe Revolution},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {258--266},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_22},
  doi          = {10.1007/978-3-319-56549-1\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FaugereP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FengHS16,
  author       = {Yaokai Feng and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {79--89},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_7},
  doi          = {10.1007/978-3-319-56549-1\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FengHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GiaoLMK16,
  author       = {Pham Ngoc Giao and
                  Suk{-}Hwan Lee and
                  Kwang{-}Seok Moon and
                  Ki{-}Ryong Kwon},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {{GIS} Vector Map Perceptual Encryption Scheme Using Geometric Objects},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {210--220},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_18},
  doi          = {10.1007/978-3-319-56549-1\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/GiaoLMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HomoliakSH16,
  author       = {Ivan Homoliak and
                  Ladislav Sulak and
                  Petr Han{\'{a}}cek},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Features for Behavioral Anomaly Detection of Connectionless Network
                  Buffer Overflow Attacks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {66--78},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_6},
  doi          = {10.1007/978-3-319-56549-1\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HomoliakSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongKHKCLK16,
  author       = {Hyunwook Hong and
                  Hongil Kim and
                  Byeongdo Hong and
                  Dongkwan Kim and
                  Hyunwoo Choi and
                  Eunkyu Lee and
                  Yongdae Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Pay as You Want: Bypassing Charging System in Operational Cellular
                  Networks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {148--160},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_13},
  doi          = {10.1007/978-3-319-56549-1\_13},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HongKHKCLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JegedeUAM16,
  author       = {Abayomi Jegede and
                  Nur Izura Udzir and
                  Azizol Abdullah and
                  Ramlan Mahmod},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Secure and Privacy Preserving Iris Biometric Authentication Scheme
                  with Matrix Transformation},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {341--352},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_29},
  doi          = {10.1007/978-3-319-56549-1\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JegedeUAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeongKSH16,
  author       = {Jongmin Jeong and
                  Hyunsoo Kwon and
                  Hyungjune Shin and
                  Junbeom Hur},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Practical Analysis of {TLS} Vulnerabilities in Korea Web Environment},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {112--123},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_10},
  doi          = {10.1007/978-3-319-56549-1\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JeongKSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JungKY16,
  author       = {Jisoo Jung and
                  Joo{-}Im Kim and
                  Ji Won Yoon},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Practical Approach to Constructing Triple-Blind Review Process with
                  Maximal Anonymity and Fairness},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {198--209},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_17},
  doi          = {10.1007/978-3-319-56549-1\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JungKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KhandakerNSD16,
  author       = {Md. Al{-}Amin Khandaker and
                  Yasuyuki Nogami and
                  Hwajeong Seo and
                  Sylvain Duquesne},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Efficient Scalar Multiplication for Ate Based Pairing over {KSS} Curve
                  of Embedding Degree 18},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {221--232},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_19},
  doi          = {10.1007/978-3-319-56549-1\_19},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KhandakerNSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KosugeT16,
  author       = {Haruhisa Kosuge and
                  Hidema Tanaka},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Algebraic Degree Estimation for Integral Attack by Randomized Algorithm},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {292--304},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_25},
  doi          = {10.1007/978-3-319-56549-1\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KosugeT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KownJLDBC16,
  author       = {Su{-}kyung Kown and
                  Bongsoo Jang and
                  Byoung{-}Dai Lee and
                  Younghae Do and
                  Hunki Baek and
                  Yoon{-}Ho Choi},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Influence Evaluation of Centrality-Based Random Scanning Strategy
                  on Early Worm Propagation Rate},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {90--101},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_8},
  doi          = {10.1007/978-3-319-56549-1\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KownJLDBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonKSCK16,
  author       = {Yujin Kwon and
                  Dohyun Kim and
                  Yunmok Son and
                  Jaeyeong Choi and
                  Yongdae Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication
                  Share Attack},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {124--135},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_11},
  doi          = {10.1007/978-3-319-56549-1\_11},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonKSCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeP16,
  author       = {Donghyeok Lee and
                  Namje Park},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Geocasting-Based Almanac Synchronization Method for Secure Maritime
                  Cloud},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {376--387},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_32},
  doi          = {10.1007/978-3-319-56549-1\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeRKJ16,
  author       = {Sung{-}Hoon Lee and
                  Jong{-}Hyuk Roh and
                  Soo{-}Hyung Kim and
                  Seung{-}Hun Jin},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Study on Feature of Keystroke Dynamics for Improving Accuracy in
                  Mobile Environment},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {366--375},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_31},
  doi          = {10.1007/978-3-319-56549-1\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeRKJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuCK16,
  author       = {Xinyu Liu and
                  Beumjin Cho and
                  Jong Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {{SD-OVS:} {SYN} Flooding Attack Defending Open vSwitch for {SDN}},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {29--41},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_3},
  doi          = {10.1007/978-3-319-56549-1\_3},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MohaisenKR16,
  author       = {Aziz Mohaisen and
                  Ah Reum Kang and
                  Kui Ren},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Does Query Blocking Improve {DNS} Privacy? - Quantifying Privacy Under
                  Partial Blocking Deployment},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_1},
  doi          = {10.1007/978-3-319-56549-1\_1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MohaisenKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhKC16,
  author       = {Eun Oh and
                  Tae{-}Sung Kim and
                  Tae{-}Hee Cho},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Development of Information Security Management Assessment Model for
                  the Financial Sector},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {186--197},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_16},
  doi          = {10.1007/978-3-319-56549-1\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhKK16,
  author       = {Sanghak Oh and
                  Eunsoo Kim and
                  Hyoungshick Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Empirical Analysis of {SSL/TLS} Weaknesses in Real Websites: Who Cares?},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {174--185},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_15},
  doi          = {10.1007/978-3-319-56549-1\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhLC16,
  author       = {Seung{-}Hee Oh and
                  Byung{-}Gil Lee and
                  Byungho Chung},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {The Vessel Trajectory Mechanism for Marine Accidents Analysis},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {388--396},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_33},
  doi          = {10.1007/978-3-319-56549-1\_33},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/OhLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Picek16,
  author       = {Stjepan Picek},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Applications of Soft Computing in Cryptology},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {305--317},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_26},
  doi          = {10.1007/978-3-319-56549-1\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Picek16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RuffellHKK16,
  author       = {Matthew Ruffell and
                  Jin B. Hong and
                  Hyoungshick Kim and
                  Dong Seong Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Towards Automated Exploit Generation for Embedded Systems},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {161--173},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_14},
  doi          = {10.1007/978-3-319-56549-1\_14},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/RuffellHKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Sadiah016,
  author       = {Shahidatul Sadiah and
                  Toru Nakanishi},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Revocable Group Signatures with Compact Revocation List Using Vector
                  Commitments},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {245--257},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_21},
  doi          = {10.1007/978-3-319-56549-1\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Sadiah016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoPHSBHZNZK16,
  author       = {Hwajeong Seo and
                  Taehwan Park and
                  Shinwook Heo and
                  Gyuwon Seo and
                  Bongjin Bae and
                  Zhi Hu and
                  Lu Zhou and
                  Yasuyuki Nogami and
                  Youwen Zhu and
                  Howon Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Parallel Implementations of LEA, Revisited},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {318--330},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_27},
  doi          = {10.1007/978-3-319-56549-1\_27},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoPHSBHZNZK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoPHSBZK16,
  author       = {Hwajeong Seo and
                  Taehwan Park and
                  Shinwook Heo and
                  Gyuwon Seo and
                  Bongjin Bae and
                  Lu Zhou and
                  Howon Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors,
                  a Step Forward},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {331--340},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_28},
  doi          = {10.1007/978-3-319-56549-1\_28},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoPHSBZK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Skorski16,
  author       = {Maciej Skorski},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {On Pseudorandomness in Stateless Sources},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {280--291},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_24},
  doi          = {10.1007/978-3-319-56549-1\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Skorski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SugioIKH16,
  author       = {Nobuyuki Sugio and
                  Yasutaka Igarashi and
                  Toshinobu Kaneko and
                  Kenichi Higuchi},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {New Integral Characteristics of {KASUMI} Derived by Division Property},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {267--279},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_23},
  doi          = {10.1007/978-3-319-56549-1\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SugioIKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangMCC16,
  author       = {An Wang and
                  Aziz Mohaisen and
                  Wentao Chang and
                  Songqing Chen},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Measuring and Analyzing Trends in Recent Distributed Denial of Service
                  Attacks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {15--28},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_2},
  doi          = {10.1007/978-3-319-56549-1\_2},
  timestamp    = {Sat, 06 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WangMCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WooKYK16,
  author       = {Simon S. Woo and
                  Jingul Kim and
                  Duoduo Yu and
                  Beomjun Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Exploration of 3D Texture and Projection for New {CAPTCHA} Design},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {353--365},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_30},
  doi          = {10.1007/978-3-319-56549-1\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WooKYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YangKO16,
  author       = {Jeong Yoon Yang and
                  So{-}Jeong Kim and
                  Il Seok Oh(Luke)},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Analysis on South Korean Cybersecurity Readiness Regarding North Korean
                  Cyber Capabilities},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {102--111},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_9},
  doi          = {10.1007/978-3-319-56549-1\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YangKO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YuCZZY16,
  author       = {Xiaoqi Yu and
                  Nairen Cao and
                  Gongxian Zeng and
                  Ruoqing Zhang and
                  Siu{-}Ming Yiu},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {{LRCRYPT:} Leakage-Resilient Cryptographic System (Design and Implementation)},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {233--244},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_20},
  doi          = {10.1007/978-3-319-56549-1\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YuCZZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2015,
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31875-2},
  doi          = {10.1007/978-3-319-31875-2},
  isbn         = {978-3-319-31874-5},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AhnC15,
  author       = {Sungjun Ahn and
                  Dooho Choi},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {An Improved Masking Scheme for S-Box Software Implementations},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {200--212},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_17},
  doi          = {10.1007/978-3-319-31875-2\_17},
  timestamp    = {Thu, 02 Mar 2023 10:53:05 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AhnC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AhnHOH15,
  author       = {Hyunjin Ahn and
                  Neil Hanley and
                  M{\'{a}}ire O'Neill and
                  Dong{-}Guk Han},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {An Improved Second-Order Power Analysis Attack Based on a New Refined
                  Expecter - - Case Study on Protected {AES} -},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {174--186},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_15},
  doi          = {10.1007/978-3-319-31875-2\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AhnHOH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiCHK15,
  author       = {Kyu Young Choi and
                  Jihoon Cho and
                  Jung Yeon Hwang and
                  Taekyoung Kwon},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Constructing Efficient {PAKE} Protocols from Identity-Based {KEM/DEM}},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {411--422},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_34},
  doi          = {10.1007/978-3-319-31875-2\_34},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiCHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiSLKK15,
  author       = {Kibum Choi and
                  Yunmok Son and
                  Jangjun Lee and
                  Suryeon Kim and
                  Yongdae Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Frying {PAN:} Dissecting Customized Protocol for Personal Area Network},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {300--312},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_25},
  doi          = {10.1007/978-3-319-31875-2\_25},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiSLKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/El-HadidiEAO15,
  author       = {Mahmoud T. El{-}Hadidi and
                  Hany El{-}Sayed and
                  Heba Kamal Aslan and
                  Karim Osama},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Structured Design Approach for an Optimal Programmable Synchronous
                  Security Processor},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {313--325},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_26},
  doi          = {10.1007/978-3-319-31875-2\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/El-HadidiEAO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/EngelstadHKYNB15,
  author       = {Paal E. Engelstad and
                  Hugo Hammer and
                  Kyrre Wahl Kongsg{\aa}rd and
                  Anis Yazidi and
                  Nils Agne Nordbotten and
                  Aleksander Bai},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Automatic Security Classification with Lasso},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {399--410},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_33},
  doi          = {10.1007/978-3-319-31875-2\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/EngelstadHKYNB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GordonMSS15,
  author       = {Steven Gordon and
                  Atsuko Miyaji and
                  Chunhua Su and
                  Karin Sumongkayothin},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {{M-ORAM:} {A} Matrix {ORAM} with Log {N} Bandwidth Cost},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_1},
  doi          = {10.1007/978-3-319-31875-2\_1},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GordonMSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HeJH15,
  author       = {Wei He and
                  Dirmanto Jap and
                  Alexander Herrmann},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Process Variation Evaluation Using {RO} {PUF} for Enhancing SCA-Resistant
                  Dual-Rail Implementation},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_2},
  doi          = {10.1007/978-3-319-31875-2\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HeJH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HidanoK15,
  author       = {Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {On Partitioning Secret Data Based on Concept of Functional Safety},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {110--121},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_10},
  doi          = {10.1007/978-3-319-31875-2\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HidanoK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HuangL15,
  author       = {Guifang Huang and
                  Hongda Li},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {On Zero Knowledge Argument with {PQT} Soundness},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {326--335},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_27},
  doi          = {10.1007/978-3-319-31875-2\_27},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HuangL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangOCO15,
  author       = {You Sung Kang and
                  Elizabeth O'Sullivan and
                  Dooho Choi and
                  M{\'{a}}ire O'Neill},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Security Analysis on {RFID} Mutual Authentication Protocol},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {65--74},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_6},
  doi          = {10.1007/978-3-319-31875-2\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangOCO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Kim15,
  author       = {Kwangho Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Cyber Security Considerations for Designing IoT-Based Control Systems},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {288--299},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_24},
  doi          = {10.1007/978-3-319-31875-2\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Kim15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimK15,
  author       = {Jihyun Kim and
                  Howon Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Applying Recurrent Neural Network to Intrusion Detection with Hessian
                  Free Optimization},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {357--369},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_30},
  doi          = {10.1007/978-3-319-31875-2\_30},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimKKY15,
  author       = {Se Hwan Kim and
                  Yonggon Kim and
                  Ohmin Kwon and
                  Hyunsoo Yoon},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Fully Batch Processing Enabled Memory Integrity Verification Algorithm
                  Based on Merkle Tree},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {386--398},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_32},
  doi          = {10.1007/978-3-319-31875-2\_32},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimKKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimPCK15,
  author       = {Dongkwan Kim and
                  Suwan Park and
                  Kibum Choi and
                  Yongdae Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {BurnFit: Analyzing and Exploiting Wearable Devices},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {227--239},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_19},
  doi          = {10.1007/978-3-319-31875-2\_19},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimPCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimPL15,
  author       = {Kwangho Kim and
                  Sangdon Park and
                  Jongin Lim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison
                  Between Korea and Japan},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {348--356},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_29},
  doi          = {10.1007/978-3-319-31875-2\_29},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonLACK15,
  author       = {Hyeokchan Kwon and
                  Kwangil Lee and
                  Gaeil An and
                  Byung{-}Ho Chung and
                  Jeong{-}Nyeo Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Detection of Rogue Devices in {WLAN} by Analyzing {RF} Features and
                  Indoor Location of the Device},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {54--61},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_5},
  doi          = {10.1007/978-3-319-31875-2\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonLACK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonPK15,
  author       = {Hyeokjin Kwon and
                  Jiye Park and
                  Namhi Kang},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Challenges in Deploying CoAP Over {DTLS} in Resource Constrained Environments},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {269--280},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_22},
  doi          = {10.1007/978-3-319-31875-2\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKY15,
  author       = {Eunchong Lee and
                  Hyunsoo Kim and
                  Ji Won Yoon},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Various Threat Models to Circumvent Air-Gapped Systems for Preventing
                  Network Attack},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_16},
  doi          = {10.1007/978-3-319-31875-2\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuP15,
  author       = {Renzhang Liu and
                  Yanbin Pan},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Two Types of Special Bases for Integral Lattices},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {87--95},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_8},
  doi          = {10.1007/978-3-319-31875-2\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NguyenNKK15,
  author       = {Binh P. Nguyen and
                  Hoa Ngo and
                  Jihun Kim and
                  Jong Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Publishing Graph Data with Subgraph Differential Privacy},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {134--145},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_12},
  doi          = {10.1007/978-3-319-31875-2\_12},
  timestamp    = {Thu, 28 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NguyenNKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkK15,
  author       = {Kyungwon Park and
                  Hyoungshick Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Encryption is Not Enough: Inferring User Activities on KakaoTalk with
                  Traffic Analysis},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {254--265},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_21},
  doi          = {10.1007/978-3-319-31875-2\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkKPJ15,
  author       = {Jungsoo Park and
                  Jinouk Kim and
                  Minho Park and
                  Souhwan Jung},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource
                  Server},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {281--287},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_23},
  doi          = {10.1007/978-3-319-31875-2\_23},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkKPJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkS0CK15,
  author       = {Taehwan Park and
                  Hwajeong Seo and
                  Zhe Liu and
                  Jongseok Choi and
                  Howon Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Compact Implementations of {LSH}},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {41--53},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_4},
  doi          = {10.1007/978-3-319-31875-2\_4},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkS0CK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RheeL15,
  author       = {Hyun Sook Rhee and
                  Dong Hoon Lee},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Keyword Updatable {PEKS}},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {96--109},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_9},
  doi          = {10.1007/978-3-319-31875-2\_9},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/RheeL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RyuLPL15,
  author       = {Geumsook Ryu and
                  Kwangsu Lee and
                  Seunghwan Park and
                  Dong Hoon Lee},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_11},
  doi          = {10.1007/978-3-319-31875-2\_11},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/RyuLPL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Seo0CPK15,
  author       = {Hwajeong Seo and
                  Zhe Liu and
                  Jongseok Choi and
                  Taehwan Park and
                  Howon Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Compact Implementations of {LEA} Block Cipher for Low-End Microprocessors},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_3},
  doi          = {10.1007/978-3-319-31875-2\_3},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Seo0CPK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Seo0SPCK15,
  author       = {Hwajeong Seo and
                  Zhe Liu and
                  Gyuwon Seo and
                  Taehwan Park and
                  Jongseok Choi and
                  Howon Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Open Sesame! Hacking the Password},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_18},
  doi          = {10.1007/978-3-319-31875-2\_18},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Seo0SPCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoC0NPCK15,
  author       = {Hwajeong Seo and
                  Chien{-}Ning Chen and
                  Zhe Liu and
                  Yasuyuki Nogami and
                  Taehwan Park and
                  Jongseok Choi and
                  Howon Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Secure Binary Field Multiplication},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {161--173},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_14},
  doi          = {10.1007/978-3-319-31875-2\_14},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoC0NPCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShinCPCK15,
  author       = {Hocheol Shin and
                  Kibum Choi and
                  Young{-}Seok Park and
                  Jaeyeong Choi and
                  Yongdae Kim},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Security Analysis of FHSS-type Drone Controller},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {240--253},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_20},
  doi          = {10.1007/978-3-319-31875-2\_20},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ShinCPCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Skorski15,
  author       = {Maciej Skorski},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {How Much Randomness Can Be Extracted from Memoryless Shannon Entropy
                  Sources?},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {75--86},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_7},
  doi          = {10.1007/978-3-319-31875-2\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Skorski15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SusukiY15,
  author       = {Hiroya Susuki and
                  Rie Shigetomi Yamaguchi},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Cost-Effective Modeling for Authentication and Its Application to
                  Activity Tracker},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {373--385},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_31},
  doi          = {10.1007/978-3-319-31875-2\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SusukiY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TamaR15,
  author       = {Bayu Adhi Tama and
                  Kyung Hyune Rhee},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {Performance Analysis of Multiple Classifier System in DoS Attack Detection},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {339--347},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_28},
  doi          = {10.1007/978-3-319-31875-2\_28},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TamaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Wang15,
  author       = {Maoning Wang},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {An Improved Analysis of Broadcast Attacks on the {GGH} Cryptosystem},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {146--158},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_13},
  doi          = {10.1007/978-3-319-31875-2\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Wang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhuangHW15,
  author       = {Yunhui Zhuang and
                  Gerhard P. Hancke and
                  Duncan S. Wong},
  editor       = {Howon Kim and
                  Dooho Choi},
  title        = {How to Demonstrate Our Presence Without Disclosing Identity? Evidence
                  from a Grouping-Proof Protocol},
  booktitle    = {Information Security Applications - 16th International Workshop, {WISA}
                  2015, Jeju Island, Korea, August 20-22, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9503},
  pages        = {423--435},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31875-2\_35},
  doi          = {10.1007/978-3-319-31875-2\_35},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhuangHW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2014,
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-15087-1},
  doi          = {10.1007/978-3-319-15087-1},
  isbn         = {978-3-319-15086-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AbbasRHEO14,
  author       = {Fizza Abbas and
                  Ubaidullah Rajput and
                  Rasheed Hussain and
                  Hasoo Eun and
                  Heekuck Oh},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {A Trustless Broker Based Protocol to Discover Friends in Proximity-Based
                  Mobile Social Networks},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {216--227},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_17},
  doi          = {10.1007/978-3-319-15087-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AbbasRHEO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChauNJJ14,
  author       = {Ngoc{-}Tu Chau and
                  Minh{-}Duong Nguyen and
                  Seung Wook Jung and
                  Souhwan Jung},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {SecaaS Framework and Architecture: {A} Design of Dynamic Packet Control},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {190--201},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_15},
  doi          = {10.1007/978-3-319-15087-1\_15},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChauNJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChenCCL14,
  author       = {Chao{-}Lieh Chen and
                  Shen{-}Chien Chen and
                  Chun{-}Ruei Chang and
                  Chia{-}Fei Lin},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Scalable and Autonomous Mobile Device-Centric Cloud for Secured {D2D}
                  Sharing},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {177--189},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_14},
  doi          = {10.1007/978-3-319-15087-1\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChenCCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiCYK14,
  author       = {Seungoh Choi and
                  Yeop Chang and
                  Jeong{-}Han Yun and
                  Woonyon Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Multivariate Statistic Approach to Field Specifications of Binary
                  Protocols in {SCADA} System},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {345--357},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_27},
  doi          = {10.1007/978-3-319-15087-1\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiCYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ElashryMS14,
  author       = {Ibrahim F. Elashry and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {An Efficient Variant of Boneh-Gentry-Hamburg's Identity-Based Encryption
                  Without Pairing},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {257--268},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_20},
  doi          = {10.1007/978-3-319-15087-1\_20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ElashryMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ItoM14,
  author       = {Ryoma Ito and
                  Atsuko Miyaji},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {New Integrated Long-Term Glimpse of {RC4}},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {137--149},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_11},
  doi          = {10.1007/978-3-319-15087-1\_11},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ItoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JavedS14,
  author       = {Ashar Javed and
                  J{\"{o}}rg Schwenk},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Systematically Breaking Online {WYSIWYG} Editors},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_10},
  doi          = {10.1007/978-3-319-15087-1\_10},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JavedS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JooL14,
  author       = {Minkyu Joo and
                  Pil Joong Lee},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Shared and Searchable Encrypted Data for Semi-trusted Servers with
                  Controllable Sharing Property},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {231--243},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_18},
  doi          = {10.1007/978-3-319-15087-1\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JooL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangKKH14,
  author       = {Jina Kang and
                  Daehyun Kim and
                  Hyoungshick Kim and
                  Jun Ho Huh},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Analyzing Unnecessary Permissions Requested by Android Apps Based
                  on Users' Opinions},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_6},
  doi          = {10.1007/978-3-319-15087-1\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangKKH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangOI14,
  author       = {Dongwan Kang and
                  JooHyung Oh and
                  Chaetae Im},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Context Based Smart Access Control on {BYOD} Environments},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {165--176},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_13},
  doi          = {10.1007/978-3-319-15087-1\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangOI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Kim14,
  author       = {Yongdae Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Successful Profiling Attacks with Different Measurement Environments
                  for Each Phase},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {321--330},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_25},
  doi          = {10.1007/978-3-319-15087-1\_25},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimALC14,
  author       = {Taesung Kim and
                  Sungjun Ahn and
                  Seungkwang Lee and
                  Dooho Choi},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Function Masking: {A} New Countermeasure Against Side Channel Attack},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {331--342},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_26},
  doi          = {10.1007/978-3-319-15087-1\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimALC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimK14,
  author       = {Ji{-}Yeon Kim and
                  Hyung{-}Jong Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Defining Security Primitives for Eliciting Flexible Attack Scenarios
                  Through {CAPEC} Analysis},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {370--382},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_29},
  doi          = {10.1007/978-3-319-15087-1\_29},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimPKS14,
  author       = {Eunhyun Kim and
                  Kyungwon Park and
                  Hyoungshick Kim and
                  Jaeseung Song},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {I've Got Your Number: - Harvesting Users' Personal Data via Contacts
                  Sync for the KakaoTalk Messenger},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_5},
  doi          = {10.1007/978-3-319-15087-1\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimPKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimYCK14,
  author       = {Kyoung{-}Ho Kim and
                  Jeong{-}Han Yun and
                  Yeop Chang and
                  Woonyon Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Packet Loss Consideration for Burst-Based Anomaly Detection in {SCADA}
                  Network},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {358--369},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_28},
  doi          = {10.1007/978-3-319-15087-1\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimYCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KosbaMWTK14,
  author       = {Ahmed E. Kosba and
                  Aziz Mohaisen and
                  Andrew G. West and
                  Trevor Tonn and
                  Huy Kang Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {{ADAM:} Automated Detection and Attribution of Malicious Webpages},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_1},
  doi          = {10.1007/978-3-319-15087-1\_1},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KosbaMWTK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeSK14,
  author       = {Yeoncheol Lee and
                  Hwajeong Seo and
                  Howon Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {The Unified Hardware Design for {GCM} and {SGCM}},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {307--320},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_24},
  doi          = {10.1007/978-3-319-15087-1\_24},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MatsumotoOKS14,
  author       = {Shinichi Matsumoto and
                  Yuya Onitsuka and
                  Junpei Kawamoto and
                  Kouichi Sakurai},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {83--94},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_7},
  doi          = {10.1007/978-3-319-15087-1\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MatsumotoOKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MohaisenA14,
  author       = {Aziz Mohaisen and
                  Omar Alrawi},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {{AMAL:} High-Fidelity, Behavior-Based Automated Malware Analysis and
                  Classification},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_9},
  doi          = {10.1007/978-3-319-15087-1\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MohaisenA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MohaisenBL14,
  author       = {Aziz Mohaisen and
                  Mansurul Bhuiyan and
                  Yannis Labrou},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Name Server Switching: Anomaly Signatures, Usage, Clustering, and
                  Prediction},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {202--215},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_16},
  doi          = {10.1007/978-3-319-15087-1\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MohaisenBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Muller-QuadeA14,
  author       = {J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Antonio Sobreira de Almeida},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Wireless Key Exchange Using Frequency Impairments},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {283--294},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_22},
  doi          = {10.1007/978-3-319-15087-1\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Muller-QuadeA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkPYKK14,
  author       = {Shinjo Park and
                  Suwan Park and
                  Insu Yun and
                  Dongkwan Kim and
                  Yongdae Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Analyzing Security of Korean USIM-Based {PKI} Certificate Service},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {95--106},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_8},
  doi          = {10.1007/978-3-319-15087-1\_8},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkPYKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RajputAHEO14,
  author       = {Ubaidullah Rajput and
                  Fizza Abbas and
                  Rasheed Hussain and
                  Hasoo Eun and
                  Heekuck Oh},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {A Simple Yet Efficient Approach to Combat Transaction Malleability
                  in Bitcoin},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {27--37},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_3},
  doi          = {10.1007/978-3-319-15087-1\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/RajputAHEO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Seo0NCK14,
  author       = {Hwajeong Seo and
                  Zhe Liu and
                  Yasuyuki Nogami and
                  Jongseok Choi and
                  Howon Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Improved Modular Multiplication for Optimal Prime Fields},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_12},
  doi          = {10.1007/978-3-319-15087-1\_12},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Seo0NCK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SongSK14,
  author       = {Jaehyeok Song and
                  Jonghyuk Song and
                  Jong Kim},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Detection of Heap-Spraying Attacks Using String Trace Graph},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {17--26},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_2},
  doi          = {10.1007/978-3-319-15087-1\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SongSK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SongSL14,
  author       = {Misun Song and
                  JunSeok Seo and
                  Kyungho Lee},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Study on the Effectiveness of the Security Countermeasures Against
                  Spear Phishing},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {394--404},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_31},
  doi          = {10.1007/978-3-319-15087-1\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SongSL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TangL14,
  author       = {Fei Tang and
                  Hongda Li},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Joint Signature and Encryption in the Presence of Continual Leakage},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {269--280},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_21},
  doi          = {10.1007/978-3-319-15087-1\_21},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TangL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM14,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Fair Multi-signature},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {244--256},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_19},
  doi          = {10.1007/978-3-319-15087-1\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YouOL14,
  author       = {Youngin You and
                  Sangkyo Oh and
                  Kyungho Lee},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Advanced Security Assessment for Control Effectiveness},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {383--393},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_30},
  doi          = {10.1007/978-3-319-15087-1\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YouOL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Zhang14,
  author       = {Zhongwen Zhang},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Before Unrooting your Android Phone, Patching up Permission System
                  First!},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {41--54},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_4},
  doi          = {10.1007/978-3-319-15087-1\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhengPLJZ14,
  author       = {Fangyu Zheng and
                  Wuqiong Pan and
                  Jingqiang Lin and
                  Jiwu Jing and
                  Yuan Zhao},
  editor       = {Kyung Hyune Rhee and
                  Jeong Hyun Yi},
  title        = {Exploiting the Potential of GPUs for Modular Multiplication in {ECC}},
  booktitle    = {Information Security Applications - 15th International Workshop, {WISA}
                  2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8909},
  pages        = {295--306},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15087-1\_23},
  doi          = {10.1007/978-3-319-15087-1\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhengPLJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2013,
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-05149-9},
  doi          = {10.1007/978-3-319-05149-9},
  isbn         = {978-3-319-05148-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AthreyaWKTT13,
  author       = {Arjun P. Athreya and
                  Xiao Wang and
                  Yu Seung Kim and
                  Yuan Tian and
                  Patrick Tague},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {174--188},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_11},
  doi          = {10.1007/978-3-319-05149-9\_11},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AthreyaWKTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChinW13,
  author       = {Erika Chin and
                  David A. Wagner},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Bifocals: Analyzing WebView Vulnerabilities in Android Applications},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {138--159},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_9},
  doi          = {10.1007/978-3-319-05149-9\_9},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChinW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DoCL13,
  author       = {Heesung Do and
                  Peter Choi and
                  Heejo Lee},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Dynamic Surveillance: {A} Case Study with Enron Email Data Set},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {81--99},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_6},
  doi          = {10.1007/978-3-319-05149-9\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DoCL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FanCG13,
  author       = {Limin Fan and
                  Hua Chen and
                  Si Gao},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {A General Method to Evaluate the Correlation of Randomness Tests},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {52--62},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_4},
  doi          = {10.1007/978-3-319-05149-9\_4},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FanCG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongLKKRL13,
  author       = {Deukjo Hong and
                  Jung{-}Keun Lee and
                  Dong{-}Chan Kim and
                  Daesung Kwon and
                  Kwon Ho Ryu and
                  Donggeon Lee},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {{LEA:} {A} 128-Bit Block Cipher for Fast Encryption on Common Processors},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_1},
  doi          = {10.1007/978-3-319-05149-9\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HongLKKRL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HuP13,
  author       = {Gengran Hu and
                  Yanbin Pan},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Improvements on Reductions among Different Variants of {SVP} and {CVP}},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {39--51},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_3},
  doi          = {10.1007/978-3-319-05149-9\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HuP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JavedS13,
  author       = {Ashar Javed and
                  J{\"{o}}rg Schwenk},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Towards Elimination of Cross-Site Scripting on Mobile Versions of
                  Web Applications},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {103--123},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_7},
  doi          = {10.1007/978-3-319-05149-9\_7},
  timestamp    = {Thu, 04 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JavedS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimK13,
  author       = {Daehyun Kim and
                  Hyoungshick Kim},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {We Are Still Vulnerable to Clickjacking Attacks: About 99 {\%} of
                  Korean Websites Are Dangerous},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {163--173},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_10},
  doi          = {10.1007/978-3-319-05149-9\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKLKK13,
  author       = {Hayoung Lee and
                  Taeho Kang and
                  Sangho Lee and
                  Jong Kim and
                  Yoonho Kim},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Punobot: Mobile Botnet Using Push Notification Service in Android},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {124--137},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_8},
  doi          = {10.1007/978-3-319-05149-9\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKLKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LvZL13,
  author       = {Jing Lv and
                  Bin Zhang and
                  Dongdai Lin},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Some New Weaknesses in the {RC4} Stream Cipher},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {28--38},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_2},
  doi          = {10.1007/978-3-319-05149-9\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LvZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MeyerS13,
  author       = {Christopher Meyer and
                  J{\"{o}}rg Schwenk},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {SoK: Lessons Learned from {SSL/TLS} Attacks},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {189--209},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_12},
  doi          = {10.1007/978-3-319-05149-9\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MeyerS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MohaisenALM13,
  author       = {Aziz Mohaisen and
                  Omar Alrawi and
                  Matt Larson and
                  Danny McPherson},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Towards a Methodical Evaluation of Antivirus Scans and Labels - "If
                  You're Not Confused, You're Not Paying Attention"},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {231--241},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_15},
  doi          = {10.1007/978-3-319-05149-9\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MohaisenALM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MohaisenH13,
  author       = {Aziz Mohaisen and
                  Scott Hollenbeck},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting
                  Social Graphs},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_5},
  doi          = {10.1007/978-3-319-05149-9\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MohaisenH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoonCE13,
  author       = {Cheolmin Sky Moon and
                  Sam Chung and
                  Barbara Endicott{-}Popovsky},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection
                  System from Insider Attacks},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {260--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_17},
  doi          = {10.1007/978-3-319-05149-9\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MoonCE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MosunovSCACK13,
  author       = {Anton Mosunov and
                  Vineet Sinha and
                  Heather Crawford and
                  John Aycock and
                  Daniel Medeiros Nunes de Castro and
                  Rashmi Kumari},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Assured Supraliminal Steganography in Computer Games},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_16},
  doi          = {10.1007/978-3-319-05149-9\_16},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MosunovSCACK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SongSC13,
  author       = {YongJoo Song and
                  Seungwon Shin and
                  Yongjin Choi},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Network Iron Curtain: Hide Enterprise Networks with OpenFlow},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {218--230},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_14},
  doi          = {10.1007/978-3-319-05149-9\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SongSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/VassermanH13,
  author       = {Eugene Y. Vasserman and
                  John Hatcliff},
  editor       = {Yongdae Kim and
                  Heejo Lee and
                  Adrian Perrig},
  title        = {Foundational Security Principles for Medical Application Platforms
                  - (Extended Abstract)},
  booktitle    = {Information Security Applications - 14th International Workshop, {WISA}
                  2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8267},
  pages        = {213--217},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05149-9\_13},
  doi          = {10.1007/978-3-319-05149-9\_13},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/VassermanH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AszalosH12,
  author       = {L{\'{a}}szl{\'{o}} Aszal{\'{o}}s and
                  Andrea Huszti},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Payment Approval for PayWord},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_12},
  doi          = {10.1007/978-3-642-35416-8\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AszalosH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiKKK12,
  author       = {Jaeun Choi and
                  Gisung Kim and
                  Tae Ghyoon Kim and
                  Sehun Kim},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {An Efficient Filtering Method for Detecting Malicous Web Pages},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {241--253},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_17},
  doi          = {10.1007/978-3-642-35416-8\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiKKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiKOJ12,
  author       = {Yangseo Choi and
                  Ik{-}Kyun Kim and
                  Jintae Oh and
                  Jongsoo Jang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {{AIGG} Threshold Based {HTTP} {GET} Flooding Attack Detection},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {270--284},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_19},
  doi          = {10.1007/978-3-642-35416-8\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiKOJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DurvauxGKKS12,
  author       = {Fran{\c{c}}ois Durvaux and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  St{\'{e}}phanie Kerckhof and
                  Fran{\c{c}}ois Koeune and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Intellectual Property Protection for Integrated Systems Using Soft
                  Physical Hash Functions},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {208--225},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_15},
  doi          = {10.1007/978-3-642-35416-8\_15},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/DurvauxGKKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HussainKO12,
  author       = {Rasheed Hussain and
                  Sangjin Kim and
                  Heekuck Oh},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Privacy-Aware {VANET} Security: Putting Data-Centric Misbehavior and
                  Sybil Attack Detection Schemes into Practice},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {296--311},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_21},
  doi          = {10.1007/978-3-642-35416-8\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HussainKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HwangECLN12,
  author       = {Jung Yeon Hwang and
                  Sungwook Eom and
                  Ku{-}Young Chang and
                  Pil Joong Lee and
                  DaeHun Nyang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Anonymity-Based Authenticated Key Agreement with Full Binding Property},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_13},
  doi          = {10.1007/978-3-642-35416-8\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HwangECLN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JiaL12,
  author       = {Keting Jia and
                  Leibo Li},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Improved Impossible Differential Attacks on Reduced-Round {MISTY1}},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {15--27},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_2},
  doi          = {10.1007/978-3-642-35416-8\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JiaL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangP12,
  author       = {Hyun{-}Sun Kang and
                  Chang{-}Seop Park},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {An Authentication and Key Management Scheme for the Proxy Mobile IPv6},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {144--160},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_11},
  doi          = {10.1007/978-3-642-35416-8\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimD12,
  author       = {Yukyong Kim and
                  Kyung{-}Goo Doh},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {A Trust Management Model for QoS-Based Service Selection},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {345--357},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_24},
  doi          = {10.1007/978-3-642-35416-8\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimKKKC12,
  author       = {Hyunjoo Kim and
                  Byoung{-}Koo Kim and
                  Daewon Kim and
                  Ik{-}Kyun Kim and
                  Tai{-}Myoung Chung},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Implementation of {GESNIC} for Web Server Protection against {HTTP}
                  {GET} Flooding Attacks},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {285--295},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_20},
  doi          = {10.1007/978-3-642-35416-8\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimKKKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimRV12,
  author       = {Hyunmin Kim and
                  Vladimir Rozic and
                  Ingrid Verbauwhede},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Three Phase Dynamic Current Mode Logic: {A} More Secure DyCML to Achieve
                  a More Balanced Power Consumption},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {68--81},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_6},
  doi          = {10.1007/978-3-642-35416-8\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimRV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimmS12,
  author       = {Haklin Kimm and
                  Norkee Sherpa},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Multilevel Secure Database on Security Enhanced Linux for System High
                  Distributed Systems},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {358--370},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_25},
  doi          = {10.1007/978-3-642-35416-8\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimmS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LarangeiraT12,
  author       = {Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Reduction-Centric Non-programmable Security Proof for the Full Domain
                  Hash in the Random Oracle Model},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {124--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_10},
  doi          = {10.1007/978-3-642-35416-8\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LarangeiraT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiZ12,
  author       = {Liangze Li and
                  Fan Zhang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Tate Pairing Computation on Generalized Hessian Curves},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {111--123},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_9},
  doi          = {10.1007/978-3-642-35416-8\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LinAM12,
  author       = {Eric Lin and
                  John Aycock and
                  Mohammad Mannan},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Lightweight Client-Side Methods for Detecting Email Forgery},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {254--269},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_18},
  doi          = {10.1007/978-3-642-35416-8\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LinAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuCH12,
  author       = {Shun{-}Te Liu and
                  Yi{-}Ming Chen and
                  Hui{-}Ching Hung},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {N-Victims: An Approach to Determine N-Victims for {APT} Investigations},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_16},
  doi          = {10.1007/978-3-642-35416-8\_16},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuCH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhSLL12,
  author       = {Junghoon Oh and
                  Namheun Son and
                  Sangjin Lee and
                  Kyungho Lee},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {A Study for Classification of Web Browser Log and Timeline Visualization},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {192--207},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_14},
  doi          = {10.1007/978-3-642-35416-8\_14},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhSLL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkH12,
  author       = {JeaHoon Park and
                  JaeCheol Ha},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Improved Differential Fault Analysis on Block Cipher {ARIA}},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {82--95},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_7},
  doi          = {10.1007/978-3-642-35416-8\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoK12,
  author       = {Hwajeong Seo and
                  Howon Kim},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Multi-precision Multiplication for Public-Key Cryptography on Embedded
                  Microprocessors},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {55--67},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_5},
  doi          = {10.1007/978-3-642-35416-8\_5},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShinKS12,
  author       = {Incheol Shin and
                  Sinkyu Kim and
                  Jungtaek Seo},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {On Trigger Detection against Reactive Jamming Attacks: {A} Localized
                  Solution},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {312--327},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_22},
  doi          = {10.1007/978-3-642-35416-8\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShinKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TanakaCYCS12,
  author       = {Satoshi Tanaka and
                  Tung Chou and
                  Bo{-}Yin Yang and
                  Chen{-}Mou Cheng and
                  Kouichi Sakurai},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Efficient Parallel Evaluation of Multivariate Quadratic Polynomials
                  on GPUs},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {28--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_3},
  doi          = {10.1007/978-3-642-35416-8\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TanakaCYCS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM12,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Multi-Level Controlled Signature},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {96--110},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_8},
  doi          = {10.1007/978-3-642-35416-8\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangWYZ12,
  author       = {Yanfeng Wang and
                  Wenling Wu and
                  Xiaoli Yu and
                  Lei Zhang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Security on LBlock against Biclique Cryptanalysis},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_1},
  doi          = {10.1007/978-3-642-35416-8\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WangWYZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WeiC12,
  author       = {Yu{-}Chih Wei and
                  Yi{-}Ming Chen},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Efficient Self-organized Trust Management in Location Privacy Enhanced
                  VANETs},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {328--344},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_23},
  doi          = {10.1007/978-3-642-35416-8\_23},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WeiC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhaoHFLW12,
  author       = {Wentao Zhao and
                  Xin Hai and
                  Shaojing Fu and
                  Chao Li and
                  Yanfeng Wang},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Enumeration of Even-Variable Boolean Functions with Maximum Algebraic
                  Immunity},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {43--54},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_4},
  doi          = {10.1007/978-3-642-35416-8\_4},
  timestamp    = {Mon, 11 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhaoHFLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2011,
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27890-7},
  doi          = {10.1007/978-3-642-27890-7},
  isbn         = {978-3-642-27889-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2012,
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8},
  doi          = {10.1007/978-3-642-35416-8},
  isbn         = {978-3-642-35415-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoL11,
  author       = {Kwantae Cho and
                  Dong Hoon Lee},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Biometric Based Secure Communications without Pre-deployed Key for
                  Biosensor Implanted in Body Sensor Networks},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_17},
  doi          = {10.1007/978-3-642-27890-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DongWWZ11,
  author       = {Le Dong and
                  Wenling Wu and
                  Shuang Wu and
                  Jian Zou},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Known-Key Distinguisher on Round-Reduced 3D Block Cipher},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_5},
  doi          = {10.1007/978-3-642-27890-7\_5},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/DongWWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HegazySW11,
  author       = {Islam Hegazy and
                  Reihaneh Safavi{-}Naini and
                  Carey Williamson},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Exploiting Routing Tree Construction in {CTP}},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {256--270},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_21},
  doi          = {10.1007/978-3-642-27890-7\_21},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HegazySW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongBP11,
  author       = {Insung Hong and
                  Jinsung Byun and
                  Sehyun Park},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Lightweight Middleware-Based ZigBee Security in Building Energy Management
                  System},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {151--156},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_13},
  doi          = {10.1007/978-3-642-27890-7\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HongBP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangKYI11,
  author       = {Boojoong Kang and
                  Hye Seon Kim and
                  Ji Su Yang and
                  Eul Gyu Im},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Rule Indexing for Efficient Intrusion Detection Systems},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {136--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_11},
  doi          = {10.1007/978-3-642-27890-7\_11},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangKYI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimCJLB11,
  author       = {Chung{-}Hyo Kim and
                  Moon{-}Seok Choi and
                  Seongho Ju and
                  Yong{-}Hun Lim and
                  Jong{-}mock Baek},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Security Data Extraction from {IEC} 61850 {ACSI} Models for Network
                  and System Management},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {142--150},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_12},
  doi          = {10.1007/978-3-642-27890-7\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimCJLB11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimLC11,
  author       = {Myungsun Kim and
                  Hyung Tae Lee and
                  Jung Hee Cheon},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Mutual Private Set Intersection with Linear Complexity},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {219--231},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_18},
  doi          = {10.1007/978-3-642-27890-7\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KiribuchiKNEY11,
  author       = {Naoto Kiribuchi and
                  Ryo Kato and
                  Takashi Nishide and
                  Tsukasa Endo and
                  Hiroshi Yoshiura},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing
                  Protocols},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_16},
  doi          = {10.1007/978-3-642-27890-7\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KiribuchiKNEY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KogureKY11,
  author       = {Jun Kogure and
                  Noboru Kunihiro and
                  Hirosuke Yamamoto},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Generalized Security Analysis of the Random Key Bits Leakage Attack},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_2},
  doi          = {10.1007/978-3-642-27890-7\_2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KogureKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeSL11,
  author       = {Woomyo Lee and
                  Jae Woo Seo and
                  Pil Joong Lee},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Identity-Based Signcryption from Identity-Based Cryptography},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {70--83},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_6},
  doi          = {10.1007/978-3-642-27890-7\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiWZ11,
  author       = {Yanjun Li and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Improved Integral Attacks on Reduced-Round {CLEFIA} Block Cipher},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {28--39},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_3},
  doi          = {10.1007/978-3-642-27890-7\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MatsushitaYZ11,
  author       = {Tatsuyuki Matsushita and
                  Shinji Yamanaka and
                  Fangming Zhao},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {A Peer-to-Peer Content-Distribution Scheme Resilient to Key Leakage},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_10},
  doi          = {10.1007/978-3-642-27890-7\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MatsushitaYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhtaharaOSS11,
  author       = {Chiaki Ohtahara and
                  Keita Okada and
                  Yu Sasaki and
                  Takeshi Shimoyama},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle
                  Feed-Forward},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_4},
  doi          = {10.1007/978-3-642-27890-7\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhtaharaOSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhtakeO11,
  author       = {Go Ohtake and
                  Kazuto Ogawa},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Application Authentication for Hybrid Services of Broadcasting and
                  Communications Networks},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_15},
  doi          = {10.1007/978-3-642-27890-7\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhtakeO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PanD11,
  author       = {Yanbin Pan and
                  Yingpu Deng},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {A General NTRU-Like Framework for Constructing Lattice-Based Public-Key
                  Cryptosystems},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {109--120},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_9},
  doi          = {10.1007/978-3-642-27890-7\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PanD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SakemiITY11,
  author       = {Yumi Sakemi and
                  Tetsuya Izu and
                  Masahiko Takenaka and
                  Masaya Yasuda},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Solving a {DLP} with Auxiliary Input with the {\(\rho\)}-Algorithm},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {98--108},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_8},
  doi          = {10.1007/978-3-642-27890-7\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SakemiITY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Salonen11,
  author       = {Jarno Salonen},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Evaluating the Security and Privacy of Near Field Communication -
                  Case: Public Transportation},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {242--255},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_20},
  doi          = {10.1007/978-3-642-27890-7\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Salonen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SekarP11,
  author       = {Gautham Sekar and
                  Bart Preneel},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Practical Attacks on a Cryptosystem Proposed in Patent {WO/2009/066313}},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_1},
  doi          = {10.1007/978-3-642-27890-7\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SekarP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SunC11,
  author       = {Chung Il Sun and
                  Tae Ho Cho},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Advanced Path Selection Method for Detection of False Reports in Statistical
                  Filtering Based WSNs},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {232--241},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_19},
  doi          = {10.1007/978-3-642-27890-7\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SunC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YumKKLH11,
  author       = {Dae Hyun Yum and
                  Duk Soo Kim and
                  Jin Seok Kim and
                  Pil Joong Lee and
                  Sung Je Hong},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Order-Preserving Encryption for Non-uniformly Distributed Plaintexts},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {84--97},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_7},
  doi          = {10.1007/978-3-642-27890-7\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YumKKLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhangZC11,
  author       = {Yingjun Zhang and
                  Yang Zhang and
                  Kai Chen},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {A Map-Layer-Based Access Control Model},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_14},
  doi          = {10.1007/978-3-642-27890-7\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhangZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2010,
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-17955-6},
  doi          = {10.1007/978-3-642-17955-6},
  isbn         = {978-3-642-17954-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AllailouMM10,
  author       = {Boufeldja Allailou and
                  Abdelaziz Marjane and
                  Abdellah Mokrane},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Design of a Novel Pseudo-Random Generator Based on Vectorial FCSRs},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_6},
  doi          = {10.1007/978-3-642-17955-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AllailouMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AmakiHMO10,
  author       = {Takehiko Amaki and
                  Masanori Hashimoto and
                  Yukio Mitsuyama and
                  Takao Onoye},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {A Design Procedure for Oscillator-Based Hardware Random Number Generator
                  with Stochastic Behavior Modeling},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_8},
  doi          = {10.1007/978-3-642-17955-6\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/AmakiHMO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BaoZ10,
  author       = {Kehua Bao and
                  Zhenfeng Zhang},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Collusion Attack on a Self-healing Key Distribution with Revocation
                  in Wireless Sensor Networks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {221--233},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_16},
  doi          = {10.1007/978-3-642-17955-6\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BaoZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DottlingLMA10,
  author       = {Nico D{\"{o}}ttling and
                  Dejan E. Lazich and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Antonio Sobreira de Almeida},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {206--220},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_15},
  doi          = {10.1007/978-3-642-17955-6\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DottlingLMA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DowsleyGMN10,
  author       = {Rafael Dowsley and
                  Jeroen van de Graaf and
                  Davidson Marques and
                  Anderson C. A. Nascimento},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {A Two-Party Protocol with Trusted Initializer for Computing the Inner
                  Product},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {337--350},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_25},
  doi          = {10.1007/978-3-642-17955-6\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DowsleyGMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/DowsleyHIN10,
  author       = {Rafael Dowsley and
                  Goichiro Hanaoka and
                  Hideki Imai and
                  Anderson C. A. Nascimento},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Round-Optimal Deniable Ring Authentication in the Presence of Big
                  Brother},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_23},
  doi          = {10.1007/978-3-642-17955-6\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/DowsleyHIN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ElaabidMGD10,
  author       = {M. Abdelaziz Elaabid and
                  Olivier Meynard and
                  Sylvain Guilley and
                  Jean{-}Luc Danger},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combined Side-Channel Attacks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_13},
  doi          = {10.1007/978-3-642-17955-6\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ElaabidMGD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FujiokaSY10,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Predicate-Based Authenticated Key Exchange Resilient to Ephemeral
                  Key Leakage},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {15--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_2},
  doi          = {10.1007/978-3-642-17955-6\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FujiokaSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GallaisKT10,
  author       = {Jean{-}Fran{\c{c}}ois Gallais and
                  Ilya Kizhvatov and
                  Michael Tunstall},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Improved Trace-Driven Cache-Collision Attacks against Embedded {AES}
                  Implementations},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_18},
  doi          = {10.1007/978-3-642-17955-6\_18},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/GallaisKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JangYLY10,
  author       = {Jae{-}hoon Jang and
                  Don{-}Gu Yeo and
                  Dong{-}hee Lee and
                  Heung{-}Youl Youm},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {An {IP} Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {150--159},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_11},
  doi          = {10.1007/978-3-642-17955-6\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JangYLY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JinLKP10,
  author       = {Changlong Jin and
                  Shengzhe Li and
                  Hakil Kim and
                  Eunsoo Park},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Fingerprint Liveness Detection Based on Multiple Image Quality Features},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {281--291},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_21},
  doi          = {10.1007/978-3-642-17955-6\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JinLKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JingXL10,
  author       = {Wenpan Jing and
                  Haixia Xu and
                  Bao Li},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {A New Efficient Construction for Non-Malleable Zero-Knowledge Sets},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {31--43},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_3},
  doi          = {10.1007/978-3-642-17955-6\_3},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JingXL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Kabasele-Tenday10,
  author       = {Jean{-}Marie Kabasele{-}Tenday},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Using Special Use Cases for Security in the Software Development Life
                  Cycle},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {122--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_9},
  doi          = {10.1007/978-3-642-17955-6\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Kabasele-Tenday10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeCKP10,
  author       = {Hansung Lee and
                  Yunsu Chung and
                  Jeongnyeo Kim and
                  Daihee Park},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Face Image Retrieval Using Sparse Representation Classifier with Gabor-LBP
                  Histogram},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {273--280},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_20},
  doi          = {10.1007/978-3-642-17955-6\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeCKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuQGT10,
  author       = {Hongying Liu and
                  Guoyu Qian and
                  Satoshi Goto and
                  Yukiyasu Tsunoo},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Correlation Power Analysis Based on Switching Glitch Model},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {191--205},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_14},
  doi          = {10.1007/978-3-642-17955-6\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuQGT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MiyajiO10,
  author       = {Atsuko Miyaji and
                  Kazumasa Omote},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Efficient and Optimally Secure In-Network Aggregation in Wireless
                  Sensor Networks},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_10},
  doi          = {10.1007/978-3-642-17955-6\_10},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MiyajiO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MiyajiRS10,
  author       = {Atsuko Miyaji and
                  Mohammad Shahriar Rahman and
                  Masakazu Soshi},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Hidden Credential Retrieval without Random Oracles},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_12},
  doi          = {10.1007/978-3-642-17955-6\_12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MiyajiRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NakatsuLSO10,
  author       = {Daisuke Nakatsu and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA}
                  against Power Analysis},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {258--272},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_19},
  doi          = {10.1007/978-3-642-17955-6\_19},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NguyenNK10,
  author       = {Thi Hai Binh Nguyen and
                  Van Huan Nguyen and
                  Hakil Kim},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Robust Feature Extraction for Facial Image Quality Assessment},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {292--306},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_22},
  doi          = {10.1007/978-3-642-17955-6\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NguyenNK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NishideS10,
  author       = {Takashi Nishide and
                  Kouichi Sakurai},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Distributed Paillier Cryptosystem without Trusted Dealer},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {44--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_4},
  doi          = {10.1007/978-3-642-17955-6\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NishideS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PandeyB10,
  author       = {Sumit Kumar Pandey and
                  Rana Barua},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Construction of Identity Based Signcryption Schemes},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_1},
  doi          = {10.1007/978-3-642-17955-6\_1},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PandeyB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SuWZL10,
  author       = {Bozhan Su and
                  Wenling Wu and
                  Lei Zhang and
                  Yanjun Li},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Full-Round Differential Attack on {TWIS} Block Cipher},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {234--242},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_17},
  doi          = {10.1007/978-3-642-17955-6\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SuWZL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Walter10,
  author       = {Colin D. Walter},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Fast Scalar Multiplication for {ECC} over GF(\emph{p}) Using Division
                  Chains},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_5},
  doi          = {10.1007/978-3-642-17955-6\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Walter10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WengerFF10,
  author       = {Erich Wenger and
                  Martin Feldhofer and
                  Norbert Felber},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Low-Resource Hardware Design of an Elliptic Curve Processor for Contactless
                  Devices},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {92--106},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_7},
  doi          = {10.1007/978-3-642-17955-6\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WengerFF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Yoneyama10,
  author       = {Kazuki Yoneyama},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Cross-Realm Password-Based Server Aided Key Exchange},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_24},
  doi          = {10.1007/978-3-642-17955-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Yoneyama10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AkdemirHS09,
  author       = {Kahraman D. Akdemir and
                  Ghaith Hammouri and
                  Berk Sunar},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Non-linear Error Detection for Finite State Machines},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {226--238},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_17},
  doi          = {10.1007/978-3-642-10838-9\_17},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AkdemirHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AkramMM09,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Application Management Framework in User Centric Smart Card Ownership
                  Model},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_3},
  doi          = {10.1007/978-3-642-10838-9\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AkramMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AvoineLM09,
  author       = {Gildas Avoine and
                  C{\'{e}}dric Lauradoux and
                  Tania Martin},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {When Compromised Readers Meet {RFID}},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_4},
  doi          = {10.1007/978-3-642-10838-9\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AvoineLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BuschKB09,
  author       = {Heike Busch and
                  Stefan Katzenbeisser and
                  Paul Baecher},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {PUF-Based Authentication Protocols - Revisited},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {296--308},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_22},
  doi          = {10.1007/978-3-642-10838-9\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BuschKB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/CaoH09,
  author       = {Weiwei Cao and
                  Lei Hu},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Cryptanalysis of a Multivariate Public Key Encryption Scheme with
                  Internal Perturbation Structure},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {254--267},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_19},
  doi          = {10.1007/978-3-642-10838-9\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/CaoH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/EmuraMO09,
  author       = {Keita Emura and
                  Atsuko Miyaji and
                  Kazumasa Omote},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {A Selectable \emph{k}-Times Relaxed Anonymous Authentication Scheme},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {281--295},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_21},
  doi          = {10.1007/978-3-642-10838-9\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/EmuraMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FuQL09,
  author       = {Shaojing Fu and
                  Longjiang Qu and
                  Chao Li},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Construction of Odd-Variable Boolean Function with Maximum Algebraic
                  Immunity},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {109--117},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_9},
  doi          = {10.1007/978-3-642-10838-9\_9},
  timestamp    = {Mon, 11 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FuQL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HanleyTM09,
  author       = {Neil Hanley and
                  Michael Tunstall and
                  William P. Marnane},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Unknown Plaintext Template Attacks},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_12},
  doi          = {10.1007/978-3-642-10838-9\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HanleyTM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HussainKO09,
  author       = {Rasheed Hussain and
                  Sangjin Kim and
                  Heekuck Oh},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Towards Privacy Aware Pseudonymless Strategy for Avoiding Profile
                  Generation in {VANET}},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {268--280},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_20},
  doi          = {10.1007/978-3-642-10838-9\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HussainKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IbraimiPNHJ09,
  author       = {Luan Ibraimi and
                  Milan Petkovic and
                  Svetla Nikova and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_23},
  doi          = {10.1007/978-3-642-10838-9\_23},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IbraimiPNHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KasperOP09,
  author       = {Timo Kasper and
                  David F. Oswald and
                  Christof Paar},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {{EM} Side-Channel Attacks on Commercial Contactless Smartcards Using
                  Low-Cost Equipment},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {79--93},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_7},
  doi          = {10.1007/978-3-642-10838-9\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KasperOP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimYJY09,
  author       = {Mijoo Kim and
                  Miyeon Yoon and
                  Hyun Cheol Jeong and
                  Heung Youl Youm},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {{USN} Middleware Security Model},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {354--365},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_26},
  doi          = {10.1007/978-3-642-10838-9\_26},
  timestamp    = {Wed, 22 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimYJY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KoKKLCJ09,
  author       = {KyoungHee Ko and
                  Hwan{-}Kuk Kim and
                  JeongWook Kim and
                  Chang{-}Yong Lee and
                  Soo{-}Gil Cha and
                  Hyun{-}Cheol Jeong},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Design and Implementation of SIP-aware Security Management System},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {10--19},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_2},
  doi          = {10.1007/978-3-642-10838-9\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KoKKLCJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonMNS09,
  author       = {Hyeokchan Kwon and
                  Yong{-}Hyuk Moon and
                  Jaehoon Nah and
                  Dongil Seo},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Protecting {IPTV} Service Network against Malicious Rendezvous Point},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_1},
  doi          = {10.1007/978-3-642-10838-9\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonMNS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Lim09,
  author       = {Chae Hoon Lim},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Practical Broadcast Authentication Using Short-Lived Signatures in
                  WSNs},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {366--383},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_27},
  doi          = {10.1007/978-3-642-10838-9\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Lim09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Manulis09,
  author       = {Mark Manulis},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Securing Remote Access Inside Wireless Mesh Networks},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_24},
  doi          = {10.1007/978-3-642-10838-9\_24},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Manulis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MedwedS09,
  author       = {Marcel Medwed and
                  J{\"{o}}rn{-}Marc Schmidt},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Coding Schemes for Arithmetic and Logic Operations - How Robust Are
                  They?},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_5},
  doi          = {10.1007/978-3-642-10838-9\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MedwedS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoradiMPS09,
  author       = {Amir Moradi and
                  Nima Mousavi and
                  Christof Paar and
                  Mahmoud Salmasizadeh},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {A Comparative Study of Mutual Information Analysis under a Gaussian
                  Assumption},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {193--205},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_15},
  doi          = {10.1007/978-3-642-10838-9\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MoradiMPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MouhaCIP09,
  author       = {Nicky Mouha and
                  Christophe De Canni{\`{e}}re and
                  Sebastiaan Indesteege and
                  Bart Preneel},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Finding Collisions for a 45-Step Simplified {HAS-V}},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {206--225},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_16},
  doi          = {10.1007/978-3-642-10838-9\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MouhaCIP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PanHL09,
  author       = {Jing Pan and
                  J. I. den Hartog and
                  Jiqiang Lu},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {You Cannot Hide behind the Mask: Power Analysis on a Provably Secure
                  \emph{S}-Box Implementation},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_14},
  doi          = {10.1007/978-3-642-10838-9\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PanHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PengB09,
  author       = {Kun Peng and
                  Feng Bao},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Efficient Publicly Verifiable Secret Sharing with Correctness, Soundness
                  and {ZK} Privacy},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {118--132},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_10},
  doi          = {10.1007/978-3-642-10838-9\_10},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/PengB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PlosHF09,
  author       = {Thomas Plos and
                  Michael Hutter and
                  Martin Feldhofer},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {On Comparing Side-Channel Preprocessing Techniques for Attacking {RFID}
                  Devices},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_13},
  doi          = {10.1007/978-3-642-10838-9\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PlosHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SugawaraHHMASS09,
  author       = {Takeshi Sugawara and
                  Yu{-}ichi Hayashi and
                  Naofumi Homma and
                  Takaaki Mizuki and
                  Takafumi Aoki and
                  Hideaki Sone and
                  Akashi Satoh},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Mechanism behind Information Leakage in Electromagnetic Analysis of
                  Cryptographic Modules},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {66--78},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_6},
  doi          = {10.1007/978-3-642-10838-9\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SugawaraHHMASS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ThorncharoensriSM09,
  author       = {Pairat Thorncharoensri and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Identity-Based Identification Scheme Secure against Concurrent-Reset
                  Attacks without Random Oracles},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {94--108},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_8},
  doi          = {10.1007/978-3-642-10838-9\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ThorncharoensriSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/XieCW09,
  author       = {Jia Xie and
                  Weiwei Cao and
                  TianZe Wang},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Quadratic Equations from a Kind of S-boxes},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_18},
  doi          = {10.1007/978-3-642-10838-9\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/XieCW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YumKMKRL09,
  author       = {Dae Hyun Yum and
                  Sun Young Kim and
                  Ho{-}Kun Moon and
                  Mi{-}Yeon Kim and
                  Jae{-}Hoon Roh and
                  Pil Joong Lee},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_25},
  doi          = {10.1007/978-3-642-10838-9\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YumKMKRL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhangZC09,
  author       = {Fangguo Zhang and
                  Xingwen Zhao and
                  Xiaofeng Chen},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {ID-Based Adaptive Oblivious Transfer},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_11},
  doi          = {10.1007/978-3-642-10838-9\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhangZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2008,
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00306-6},
  doi          = {10.1007/978-3-642-00306-6},
  isbn         = {978-3-642-00305-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2009,
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9},
  doi          = {10.1007/978-3-642-10838-9},
  isbn         = {978-3-642-10837-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChaeLCJLM08,
  author       = {Sooyoung Chae and
                  Hosub Lee and
                  Jaeik Cho and
                  Manhyun Jung and
                  Jongin Lim and
                  Jongsub Moon},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {A Regression Method to Compare Network Data and Modeling Data Using
                  Generalized Additive Model},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {190--200},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_14},
  doi          = {10.1007/978-3-642-00306-6\_14},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChaeLCJLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiCWK08,
  author       = {Donghyun Choi and
                  Sungkyu Cho and
                  Dongho Won and
                  Seungjoo Kim},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Protection Profile for Connected Interoperable {DRM} Framework},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {320--332},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_24},
  doi          = {10.1007/978-3-642-00306-6\_24},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiCWK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FukushimaKTS08,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Ternary Subset Difference Method and Its Quantitative Analysis},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_17},
  doi          = {10.1007/978-3-642-00306-6\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FukushimaKTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HerbstM08,
  author       = {Christoph Herbst and
                  Marcel Medwed},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Using Templates to Attack Masked Montgomery Ladder Implementations
                  of Modular Exponentiation},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_1},
  doi          = {10.1007/978-3-642-00306-6\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HerbstM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Hirose08,
  author       = {Shoichi Hirose},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Security Analysis of {DRBG} Using {HMAC} in {NIST} {SP} 800-90},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {278--291},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_21},
  doi          = {10.1007/978-3-642-00306-6\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Hirose08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IslamHCH08,
  author       = {Md. Shariful Islam and
                  Md. Abdul Hamid and
                  Byung Goo Choi and
                  Choong Seon Hong},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Securing Layer-2 Path Selection in Wireless Mesh Networks},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_6},
  doi          = {10.1007/978-3-642-00306-6\_6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IslamHCH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IzuKOST08,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Makoto Sano and
                  Masahiko Takenaka},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Sanitizable and Deletable Signature},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_10},
  doi          = {10.1007/978-3-642-00306-6\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IzuKOST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JameelSHWRCLLSF08,
  author       = {Hassan Jameel and
                  Riaz Ahmed Shaikh and
                  Le Xuan Hung and
                  Weiwei Yuan and
                  Syed Muhammad Khaliq{-}ur{-}Rahman Raazi and
                  Ngo Trong Canh and
                  Sungyoung Lee and
                  Heejo Lee and
                  Yuseung Son and
                  Miguel Fernandes},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Image-Feature Based Human Identification Protocols on Limited Display
                  Devices},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_16},
  doi          = {10.1007/978-3-642-00306-6\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JameelSHWRCLLSF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08,
  author       = {Yutaka Kawai and
                  Shotaro Tanno and
                  Takahiro Kondo and
                  Kazuki Yoneyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
                  Condition},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_12},
  doi          = {10.1007/978-3-642-00306-6\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimRJ08,
  author       = {Mooseop Kim and
                  Jaecheol Ryou and
                  Sungik Jun},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Compact Implementation of {SHA-1} Hash Function for Mobile Trusted
                  Module},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_22},
  doi          = {10.1007/978-3-642-00306-6\_22},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimRJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KlonowskiPS08,
  author       = {Marek Klonowski and
                  Michal Przykucki and
                  Tomasz Struminski},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Data Deletion with Provable Security},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {240--255},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_18},
  doi          = {10.1007/978-3-642-00306-6\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KlonowskiPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KuwakadoH08,
  author       = {Hidenori Kuwakado and
                  Shoichi Hirose},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Pseudorandom-Function Property of the Step-Reduced Compression Functions
                  of {SHA-256} and {SHA-512}},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {174--189},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_13},
  doi          = {10.1007/978-3-642-00306-6\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KuwakadoH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MedwedO08,
  author       = {Marcel Medwed and
                  Elisabeth Oswald},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Template Attacks on {ECDSA}},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {14--27},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_2},
  doi          = {10.1007/978-3-642-00306-6\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MedwedO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MiretSTTV08,
  author       = {Josep M. Miret and
                  Daniel Sadornil and
                  Juan Tena and
                  Rosana Tom{\`{a}}s and
                  Magda Valls},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {On Avoiding ZVP-Attacks Using Isogeny Volcanoes},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {266--277},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_20},
  doi          = {10.1007/978-3-642-00306-6\_20},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MiretSTTV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkKN08,
  author       = {Jun{-}Hyung Park and
                  Minsoo Kim and
                  Bong{-}Nam Noh},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {A Visualization Technique for Installation Evidences Containing Malicious
                  Executable Files Using Machine Language Sequence},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {201--210},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_15},
  doi          = {10.1007/978-3-642-00306-6\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkKN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Peris-LopezCER08,
  author       = {Pedro Peris{-}Lopez and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Juan M. Est{\'{e}}vez{-}Tapiador and
                  Arturo Ribagorda},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Advances in Ultralightweight Cryptography for Low-Cost {RFID} Tags:
                  Gossamer Protocol},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {56--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_5},
  doi          = {10.1007/978-3-642-00306-6\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Peris-LopezCER08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SchmidtK08,
  author       = {J{\"{o}}rn{-}Marc Schmidt and
                  Chong Hee Kim},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {A Probing Attack on {AES}},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {256--265},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_19},
  doi          = {10.1007/978-3-642-00306-6\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SchmidtK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SelviVGKR08,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  Ragavendran Gopalakrishnan and
                  Naga Naresh Karuturi and
                  C. Pandu Rangan},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably
                  Secure ID-Based Broadcast Signcryption {(IBBSC)} Scheme},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_9},
  doi          = {10.1007/978-3-642-00306-6\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SelviVGKR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SugawaraHAS08,
  author       = {Takeshi Sugawara and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Akashi Satoh},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Compact {ASIC} Architectures for the 512-Bit Hash Function Whirlpool},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {28--40},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_3},
  doi          = {10.1007/978-3-642-00306-6\_3},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SugawaraHAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/VuillaumeODB08,
  author       = {Camille Vuillaume and
                  Katsuyuki Okeya and
                  Erik Dahmen and
                  Johannes Buchmann},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Public Key Authentication with Memory Tokens},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {84--98},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_7},
  doi          = {10.1007/978-3-642-00306-6\_7},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/VuillaumeODB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangWP08,
  author       = {Peishun Wang and
                  Huaxiong Wang and
                  Josef Pieprzyk},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {An Efficient Scheme of Common Secure Indices for Conjunctive Keyword-Based
                  Retrieval on Encrypted Data},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_11},
  doi          = {10.1007/978-3-642-00306-6\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WangWP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WuMSH08,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Certificate-Based Signatures: New Definitions and a Generic Construction
                  from Certificateless Signatures},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {99--114},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_8},
  doi          = {10.1007/978-3-642-00306-6\_8},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WuMSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/XuH08,
  author       = {Qingyu Xu and
                  Mingxing He},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Improved Constant Storage Self-healing Key Distribution with Revocation
                  in Wireless Sensor Network},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_4},
  doi          = {10.1007/978-3-642-00306-6\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/XuH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhouH08,
  author       = {Jun Zhou and
                  Mingxing He},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {An Improved Distributed Key Management Scheme in Wireless Sensor Networks},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_23},
  doi          = {10.1007/978-3-642-00306-6\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhouH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2007,
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-77535-5},
  doi          = {10.1007/978-3-540-77535-5},
  isbn         = {978-3-540-77534-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChangWYT07,
  author       = {Junsheng Chang and
                  Huaimin Wang and
                  Gang Yin and
                  Yang{-}Bin Tang},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {ICRep: An Incentive Compatible Reputation Mechanism for {P2P} Systems},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {371--386},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_27},
  doi          = {10.1007/978-3-540-77535-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChangWYT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiS07,
  author       = {Myeonggil Choi and
                  Sangmun Shin},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Optimizing Quality Levels and Development Costs for Developing an
                  Integrated Information Security System},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {359--370},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_26},
  doi          = {10.1007/978-3-540-77535-5\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HaPMY07,
  author       = {JaeCheol Ha and
                  JeaHoon Park and
                  Sang{-}Jae Moon and
                  Sung{-}Ming Yen},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Provably Secure Countermeasure Resistant to Several Types of Power
                  Attack for {ECC}},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {333--344},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_24},
  doi          = {10.1007/978-3-540-77535-5\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HaPMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HanLY07,
  author       = {Lilong Han and
                  Qingtang Liu and
                  Zongkai Yang},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Authorization Constraints Specification of {RBAC}},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {266--276},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_19},
  doi          = {10.1007/978-3-540-77535-5\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HanLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HashimotoIUISKI07,
  author       = {Toru Hashimoto and
                  Takashi Itoh and
                  Masazumi Ueba and
                  Hisato Iwai and
                  Hideichi Sasaoka and
                  Kazukuni Kobara and
                  Hideki Imai},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Comparative Studies in Key Disagreement Correction Process on Wireless
                  Key Agreement System},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {173--187},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_13},
  doi          = {10.1007/978-3-540-77535-5\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HashimotoIUISKI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JangEK07,
  author       = {Jihyeon Jang and
                  Stephen J. Elliott and
                  Hakil Kim},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Implementation of BioAPI Conformance Test Suite Using {BSP} Testing
                  Model},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {48--60},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_4},
  doi          = {10.1007/978-3-540-77535-5\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JangEK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeCV07,
  author       = {Yong Ki Lee and
                  Herwin Chan and
                  Ingrid Verbauwhede},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Iteration Bound Analysis and Throughput Optimum Architecture of {SHA-256}
                  (384, 512) for Hardware Implementations},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {102--114},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_8},
  doi          = {10.1007/978-3-540-77535-5\_8},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeCV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeCYY07,
  author       = {Byoungcheon Lee and
                  Kim{-}Kwang Raymond Choo and
                  Jeongmo Yang and
                  Seungjae Yoo},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Secret Signatures: How to Achieve Business Privacy Efficiently?},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {30--47},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_3},
  doi          = {10.1007/978-3-540-77535-5\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeCYY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeV07,
  author       = {Yong Ki Lee and
                  Ingrid Verbauwhede},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication
                  Processor},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {115--127},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_9},
  doi          = {10.1007/978-3-540-77535-5\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LimUKL07,
  author       = {Jae{-}Deok Lim and
                  Sung{-}Kyong Un and
                  Jeong{-}Nyeo Kim and
                  ChoelHoon Lee},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Implementation of LSM-Based {RBAC} Module for Embedded System},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {91--101},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_7},
  doi          = {10.1007/978-3-540-77535-5\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LimUKL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LoPG07,
  author       = {Swee{-}Won Lo and
                  Raphael C.{-}W. Phan and
                  Bok{-}Min Goi},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {On the Security of a Popular Web Submission and Review Software (WSaR)
                  for Cryptology Conferences},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {245--265},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_18},
  doi          = {10.1007/978-3-540-77535-5\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LoPG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/McEvoyTMM07,
  author       = {Robert P. McEvoy and
                  Michael Tunstall and
                  Colin C. Murphy and
                  William P. Marnane},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Differential Power Analysis of {HMAC} Based on SHA-2, and Countermeasures},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {317--332},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_23},
  doi          = {10.1007/978-3-540-77535-5\_23},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/McEvoyTMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ProuffR07,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {A Generic Method for Secure SBox Implementation},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {227--244},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_17},
  doi          = {10.1007/978-3-540-77535-5\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ProuffR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SameshimaSMK07,
  author       = {Yoshiki Sameshima and
                  Hideaki Saisho and
                  Tsutomu Matsumoto and
                  Norihisa Komoda},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Windows Vault: Prevention of Virus Infection and Secret Leakage with
                  Secure {OS} and Virtual Machine},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {128--141},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_10},
  doi          = {10.1007/978-3-540-77535-5\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SameshimaSMK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShiraseKTO07,
  author       = {Masaaki Shirase and
                  Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Universal \emph{eta}\({}_{\mbox{T}}\) Pairing Algorithm over Arbitrary
                  Extension Degree},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_1},
  doi          = {10.1007/978-3-540-77535-5\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShiraseKTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/StumpfRE07,
  author       = {Frederic Stumpf and
                  Patrick R{\"{o}}der and
                  Claudia Eckert},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {An Architecture Providing Virtualization-Based Protection Mechanisms
                  Against Insider Attacks},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {142--156},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_11},
  doi          = {10.1007/978-3-540-77535-5\_11},
  timestamp    = {Fri, 15 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/StumpfRE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TanakaHSK07,
  author       = {Hidema Tanaka and
                  Yasuo Hatano and
                  Nobuyuki Sugio and
                  Toshinobu Kaneko},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Security Analysis of {MISTY1}},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_16},
  doi          = {10.1007/978-3-540-77535-5\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TanakaHSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TangLLW07,
  author       = {Zhuo Tang and
                  Ruixuan Li and
                  Zhengding Lu and
                  Zhumu Wen},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Dynamic Access Control Research for Inter-operation in Multi-domain
                  Environment Based on Risk},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {277--290},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_20},
  doi          = {10.1007/978-3-540-77535-5\_20},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TangLLW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TewsWP07,
  author       = {Erik Tews and
                  Ralf{-}Philipp Weinmann and
                  Andrei Pyshkin},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Breaking 104 Bit {WEP} in Less Than 60 Seconds},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_14},
  doi          = {10.1007/978-3-540-77535-5\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TewsWP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Walter07,
  author       = {Colin D. Walter},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Longer Randomly Blinded {RSA} Keys May Be Weaker Than Shorter Ones},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {303--316},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_22},
  doi          = {10.1007/978-3-540-77535-5\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Walter07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WilsonFA07,
  author       = {William O. Wilson and
                  Jan Feyereisl and
                  Uwe Aickelin},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Detecting Motifs in System Call Sequences},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {157--172},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_12},
  doi          = {10.1007/978-3-540-77535-5\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WilsonFA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WuMSH07,
  author       = {Wei Wu and
                  Yi Mu and
                  Willy Susilo and
                  Xinyi Huang},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Convertible Undeniable Proxy Signatures: Security Models and Efficient
                  Construction},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {16--29},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_2},
  doi          = {10.1007/978-3-540-77535-5\_2},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WuMSH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/XiaHH07,
  author       = {Lei Xia and
                  Wei Huang and
                  Hao Huang},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {A Compositional Multiple Policies Operating System Security Model},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_21},
  doi          = {10.1007/978-3-540-77535-5\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/XiaHH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/XiangK07,
  author       = {Shijun Xiang and
                  Hyoung{-}Joong Kim},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Geometrically Invariant Image Watermarking in the {DWT} Domain},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {76--90},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_6},
  doi          = {10.1007/978-3-540-77535-5\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/XiangK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/XuY07,
  author       = {Shenkun Xu and
                  Xiaojun Ye},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Risk {\&} Distortion Based K-Anonymity},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {345--358},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_25},
  doi          = {10.1007/978-3-540-77535-5\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/XuY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YoshitomiTKT07,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_15},
  doi          = {10.1007/978-3-540-77535-5\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YoshitomiTKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ZhouMGJ07,
  author       = {Yongxin Zhou and
                  Alec Main and
                  Yuan Xiang Gu and
                  Harold Johnson},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Information Hiding in Software with Mixed Boolean-Arithmetic Transforms},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_5},
  doi          = {10.1007/978-3-540-77535-5\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ZhouMGJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2006,
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71093-6},
  doi          = {10.1007/978-3-540-71093-6},
  isbn         = {978-3-540-71092-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/CarluccioLPS06,
  author       = {Dario Carluccio and
                  Kerstin Lemke{-}Rust and
                  Christof Paar and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {E-Passport: The Global Traceability Or How to Feel Like a {UPS} Package},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {391--404},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_30},
  doi          = {10.1007/978-3-540-71093-6\_30},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/CarluccioLPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChangW06,
  author       = {Chin{-}Chen Chang and
                  Chia{-}Chi Wu},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {A Novel Key Agreement Scheme in a Multiple Server Environment},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {187--197},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_15},
  doi          = {10.1007/978-3-540-71093-6\_15},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChangW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChengC06,
  author       = {Bo{-}Chao Cheng and
                  Huan Chen},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Quality Assurance for Evidence Collection in Network Forensics},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {121--132},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_10},
  doi          = {10.1007/978-3-540-71093-6\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChengC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChengM06,
  author       = {Feng Cheng and
                  Christoph Meinel},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Deployment of Virtual Machines in Lock-Keeper},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {147--159},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_12},
  doi          = {10.1007/978-3-540-71093-6\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChengM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GaoWWX06,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Dongqing Xie},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Controllable Ring Signatures},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_1},
  doi          = {10.1007/978-3-540-71093-6\_1},
  timestamp    = {Sat, 09 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GaoWWX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GuNCLJ06,
  author       = {Jabeom Gu and
                  Jaehoon Nah and
                  Cheoljoo Chae and
                  Jae{-}Kwang Lee and
                  Jongsoo Jang},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Random Visitor: {A} Defense Against Identity Attacks in {P2P} Overlay
                  Networks},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_22},
  doi          = {10.1007/978-3-540-71093-6\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GuNCLJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeongHKSKK06,
  author       = {Youngok Jeong and
                  Younggoo Han and
                  Hyunwoo Kim and
                  Woochul Shim and
                  Jaehong Kim and
                  Sehun Kim},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Cost-Effective {IDS} Operating Scheme in MANETs},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {198--210},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_16},
  doi          = {10.1007/978-3-540-71093-6\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JeongHKSKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Juang06,
  author       = {Wen{-}Shenq Juang},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Efficient User Authentication and Key Agreement in Wireless Sensor
                  Networks},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {15--29},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_2},
  doi          = {10.1007/978-3-540-71093-6\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Juang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangP06,
  author       = {Hyun{-}Sun Kang and
                  Chang{-}Seop Park},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Authenticated Fast Handover Scheme in the Hierarchical Mobile IPv6},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_17},
  doi          = {10.1007/978-3-540-71093-6\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KikuchiT06,
  author       = {Hiroaki Kikuchi and
                  Masato Terada},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {How Many Malicious Scanners Are in the Internet?},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {381--390},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_29},
  doi          = {10.1007/978-3-540-71093-6\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KikuchiT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimC06,
  author       = {Yoonkyung Kim and
                  Byeong{-}Mo Chang},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Visualization of Permission Checks in Java Using Static Analysis},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {133--146},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_11},
  doi          = {10.1007/978-3-540-71093-6\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimDC06,
  author       = {Mihui Kim and
                  Inshil Doh and
                  Kijoon Chae},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {A Key Management Based on Multiple Regression in Hierarchical Sensor
                  Network},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {267--281},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_21},
  doi          = {10.1007/978-3-540-71093-6\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimDC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonCKL06,
  author       = {Taekyoung Kwon and
                  Jung Hee Cheon and
                  Yongdae Kim and
                  Jaeil Lee},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Privacy Protection in PKIs: {A} Separation-of-Authority Approach},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_23},
  doi          = {10.1007/978-3-540-71093-6\_23},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonCKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonL06,
  author       = {Saeran Kwon and
                  Sang{-}Ho Lee},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Identity-Based Key Issuing Without Secure Channel in a Broad Area},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {30--44},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_3},
  doi          = {10.1007/978-3-540-71093-6\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonL06a,
  author       = {Taekyoung Kwon and
                  Dong Hoon Lee},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Three-Party Password Authenticated Key Agreement Resistant to Server
                  Compromise},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {312--323},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_24},
  doi          = {10.1007/978-3-540-71093-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonL06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKHK06,
  author       = {Ki Hun Lee and
                  Yuna Kim and
                  Sung Je Hong and
                  Jong Kim},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {45--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_4},
  doi          = {10.1007/978-3-540-71093-6\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKHK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeMKCKK06,
  author       = {Mun{-}Kyu Lee and
                  Jung Ki Min and
                  Seok Hun Kang and
                  Sang{-}Hwa Chung and
                  Howon Kim and
                  Dong Kyue Kim},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Efficient Implementation of Pseudorandom Functions for Electronic
                  Seal Protection Protocols},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {173--186},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_14},
  doi          = {10.1007/978-3-540-71093-6\_14},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeMKCKK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MaZZT06,
  author       = {Jianqing Ma and
                  Shiyong Zhang and
                  YiPing Zhong and
                  Xiaowen Tong},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {{SAID:} {A} Self-Adaptive Intrusion Detection System in Wireless Sensor
                  Networks},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {60--73},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_5},
  doi          = {10.1007/978-3-540-71093-6\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MaZZT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoonLJCYLM06,
  author       = {Daesung Moon and
                  Sungju Lee and
                  Seunghwan Jung and
                  Yongwha Chung and
                  Okyeon Yi and
                  Namil Lee and
                  Kiyoung Moon},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates
                  with Passwords},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {100--109},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_8},
  doi          = {10.1007/978-3-540-71093-6\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MoonLJCYLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PaekOL06,
  author       = {Seung{-}Hyun Paek and
                  Yoon{-}Keun Oh and
                  Do{-}Hoon Lee},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting
                  Decision Tree Classification Algorithm},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {83--99},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_7},
  doi          = {10.1007/978-3-540-71093-6\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PaekOL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkHKSY06,
  author       = {Chanil Park and
                  Junbeom Hur and
                  Chanoe Kim and
                  Young{-}joo Shin and
                  Hyunsoo Yoon},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Pre-authentication for Fast Handoff in Wireless Mesh Networks with
                  Mobile APs},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {349--363},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_27},
  doi          = {10.1007/978-3-540-71093-6\_27},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkHKSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkMCP06,
  author       = {Byungkwan Park and
                  Daesung Moon and
                  Yongwha Chung and
                  Jin{-}Won Park},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Impact of Embedding Scenarios on the Smart Card-Based Fingerprint
                  Verification},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {110--120},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_9},
  doi          = {10.1007/978-3-540-71093-6\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkMCP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkN06,
  author       = {Jae{-}Chul Park and
                  Bong{-}Nam Noh},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {{SQL} Injection Attack Detection: Profiling of Web Application Parameter
                  Using the Sequence Pairwise Alignment},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {74--82},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_6},
  doi          = {10.1007/978-3-540-71093-6\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Ryu06,
  author       = {Jongho Ryu},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {{EAP} Using the Split Password-Based Authenticated Key Agreement},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {364--380},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_28},
  doi          = {10.1007/978-3-540-71093-6\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Ryu06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TanakaT06,
  author       = {Michiru Tanaka and
                  Yoshimi Teshigawara},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {A Method and Its Usability for User Authentication by Utilizing a
                  Matrix Code Reader on Mobile Phones},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {225--236},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_18},
  doi          = {10.1007/978-3-540-71093-6\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TanakaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TobitaYDM06,
  author       = {Takayuki Tobita and
                  Hironori Yamamoto and
                  Hiroshi Doi and
                  Keigo Majima},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Privacy-Enhanced Content Distribution and Charging Scheme Using Group
                  Signature},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {324--338},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_25},
  doi          = {10.1007/978-3-540-71093-6\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TobitaYDM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/VasantaSSS06,
  author       = {Harikrishna Vasanta and
                  Reihaneh Safavi{-}Naini and
                  Nicholas Paul Sheppard and
                  Jan Martin Surminen},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Distributed Management of {OMA} {DRM} Domains},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_19},
  doi          = {10.1007/978-3-540-71093-6\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/VasantaSSS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YagiMH06,
  author       = {Hideki Yagi and
                  Toshiyasu Matsushima and
                  Shigeichi Hirasawa},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {New Traceability Codes Against a Generalized Collusion Attack for
                  Digital Fingerprinting},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_20},
  doi          = {10.1007/978-3-540-71093-6\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YagiMH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YamashitaT06,
  author       = {Naoyuki Yamashita and
                  Keisuke Tanaka},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Secret Handshake with Multiple Groups},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {339--348},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_26},
  doi          = {10.1007/978-3-540-71093-6\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YamashitaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YooHMOM06,
  author       = {HyungSo Yoo and
                  Christoph Herbst and
                  Stefan Mangard and
                  Elisabeth Oswald and
                  Sang{-}Jae Moon},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Investigations of Power Analysis Attacks and Countermeasures for {ARIA}},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {160--172},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_13},
  doi          = {10.1007/978-3-540-71093-6\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YooHMOM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2005,
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11604938},
  doi          = {10.1007/11604938},
  isbn         = {3-540-31012-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChaeKK05,
  author       = {Song{-}hwa Chae and
                  Wonil Kim and
                  Dong{-}Kyoo Kim},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Role-Based Access Control Model for Ubiquitous Computing Environment},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {354--363},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_28},
  doi          = {10.1007/11604938\_28},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChaeKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChengHCW05,
  author       = {Bo{-}Chao Cheng and
                  Ching{-}Fu Huang and
                  Wei{-}Chi Chang and
                  Cheng{-}Shong Wu},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Developing and Implementing {IHPM} on {IXP} 425 Network Processor
                  Platforms},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {218--231},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_17},
  doi          = {10.1007/11604938\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChengHCW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GuoWZYL05,
  author       = {Fei Guo and
                  Jianmin Wang and
                  Zhihao Zhang and
                  Xiaojun Ye and
                  Deyi Li},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {An Improved Algorithm to Watermark Numeric Relational Data},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {138--149},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_11},
  doi          = {10.1007/11604938\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GuoWZYL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongJW05,
  author       = {Kihun Hong and
                  Souhwan Jung and
                  Shyhtsun Felix Wu},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {A Hash-Chain Based Authentication Scheme for Fast Handover in Wireless
                  Network},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {96--107},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_8},
  doi          = {10.1007/11604938\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HongJW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IzuKOS05,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Takeshi Shimoyama},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Analysis on the Clockwise Transposition Routing for Dedicated Factoring
                  Devices},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {232--242},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_18},
  doi          = {10.1007/11604938\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IzuKOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Juang05,
  author       = {Wen{-}Shenq Juang},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {A Simple and Efficient Conference Scheme for Mobile Communications},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_7},
  doi          = {10.1007/11604938\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Juang05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangKPLSYK05,
  author       = {Hyun{-}Ho Kang and
                  Brian M. Kurkoski and
                  Young{-}Ran Park and
                  Hyejoo Lee and
                  Sanguk Shin and
                  Kazuhiko Yamaguchi and
                  Kingo Kobayashi},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Video Fingerprinting System Using Wavelet and Error Correcting Code},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_12},
  doi          = {10.1007/11604938\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KangKPLSYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KanlayasiriS05,
  author       = {Urupoj Kanlayasiri and
                  Surasak Sanguanpong},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Key Factors Influencing Worm Infection in Enterprise Networks},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {54--67},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_5},
  doi          = {10.1007/11604938\_5},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KanlayasiriS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKKK05,
  author       = {Mun{-}Kyu Lee and
                  Keon Tae Kim and
                  Howon Kim and
                  Dong Kyue Kim},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Efficient Hardware Implementation of Elliptic Curve Cryptography over
                  \emph{GF}(\emph{p}\({}^{\mbox{\emph{m}}}\))},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {207--217},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_16},
  doi          = {10.1007/11604938\_16},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeePS05,
  author       = {Minsoo Lee and
                  Sehyun Park and
                  Ohyoung Song},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Elastic Security QoS Provisioning for Telematics Applications},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {126--137},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_10},
  doi          = {10.1007/11604938\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeePS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeS05,
  author       = {Ho Lee and
                  Jung Hwan Song},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Designing Security Auditing Protocol with Web Browsers},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {364--376},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_29},
  doi          = {10.1007/11604938\_29},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LimK05,
  author       = {Chae Hoon Lim and
                  Tymur Korkishko},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {mCrypton - {A} Lightweight Block Cipher for Security of Low-Cost {RFID}
                  Tags and Sensors},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_19},
  doi          = {10.1007/11604938\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LimK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MadouAMDSB05,
  author       = {Matias Madou and
                  Bertrand Anckaert and
                  Patrick Moseley and
                  Saumya K. Debray and
                  Bjorn De Sutter and
                  Koen De Bosschere},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Software Protection Through Dynamic Code Mutation},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {194--206},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_15},
  doi          = {10.1007/11604938\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MadouAMDSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MukhopadhyayS05,
  author       = {Sourav Mukhopadhyay and
                  Palash Sarkar},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Application of LFSRs in Time/Memory Trade-Off Cryptanalysis},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {25--37},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_3},
  doi          = {10.1007/11604938\_3},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MukhopadhyayS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NamKW05,
  author       = {Junghyun Nam and
                  Seungjoo Kim and
                  Dongho Won},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Security Weakness in Ren et al.'s Group Key Agreement Scheme Built
                  on Secure Two-Party Protocols},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {1--9},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_1},
  doi          = {10.1007/11604938\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NamKW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Oh05,
  author       = {Sejong Oh},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {New Concept of Authority Range for Flexible Management of Role Hierarchy},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {343--353},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_27},
  doi          = {10.1007/11604938\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Oh05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OkadaK05,
  author       = {Mitsuo Okada and
                  Hiroaki Kikuchi},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Secure Asymmetric Watermark Detection Without Secret of Modified Pixels},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_13},
  doi          = {10.1007/11604938\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OkadaK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OntuaP05,
  author       = {Marife G. Ontua and
                  Susan Pancho{-}Festin},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Evaluation of the Unified Modeling Language for Security Requirements
                  Analysis},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {68--80},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_6},
  doi          = {10.1007/11604938\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OntuaP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OswaldS05,
  author       = {Elisabeth Oswald and
                  Kai Schramm},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {An Efficient Masking Scheme for {AES} Software Implementations},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {292--305},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_23},
  doi          = {10.1007/11604938\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OswaldS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkKP05,
  author       = {Je Hong Park and
                  Bo Gyeong Kang and
                  Sangwoo Park},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Cryptanalysis of Some Group-Oriented Proxy Signature Schemes},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {10--24},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_2},
  doi          = {10.1007/11604938\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkKP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkLHC05,
  author       = {Tae{-}Jun Park and
                  Mun{-}Kyu Lee and
                  Dowon Hong and
                  Kyoil Chung},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {A {DPA} Countermeasure by Randomized Frobenius Decomposition},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_21},
  doi          = {10.1007/11604938\_21},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkLHC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RheeBLL05,
  author       = {Hyun Sook Rhee and
                  Jin Wook Byun and
                  Dong Hoon Lee and
                  Jongin Lim},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Oblivious Conjunctive Keyword Search},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {318--327},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_25},
  doi          = {10.1007/11604938\_25},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/RheeBLL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShinJ05,
  author       = {Moon Sun Shin and
                  Kyeong Ja Jeong},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {An Alert Data Mining Framework for Network-Based Intrusion Detection
                  System},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {38--53},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_4},
  doi          = {10.1007/11604938\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShinJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShinPL05,
  author       = {Jong Hoon Shin and
                  Dong Jin Park and
                  Pil Joong Lee},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {{DPA} Attack on the Improved Ha-Moon Algorithm},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {283--291},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_22},
  doi          = {10.1007/11604938\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShinPL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SuzukiY05,
  author       = {Koutarou Suzuki and
                  Makoto Yokoo},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Secure Multi-attribute Procurement Auction},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {306--317},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_24},
  doi          = {10.1007/11604938\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SuzukiY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Takashima05,
  author       = {Katsuyuki Takashima},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel
                  Analysis on {(EC)DSA}},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {259--270},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_20},
  doi          = {10.1007/11604938\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Takashima05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TartaryW05,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Efficient Multicast Stream Authentication for the Fully Adversarial
                  Network Model},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {108--125},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_9},
  doi          = {10.1007/11604938\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TartaryW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YamamotoCNSU05,
  author       = {Go Yamamoto and
                  Koji Chida and
                  Anderson C. A. Nascimento and
                  Koutarou Suzuki and
                  Shigenori Uchiyama},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal
                  Encryption},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {328--342},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_26},
  doi          = {10.1007/11604938\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YamamotoCNSU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YouSKCLK05,
  author       = {Jin Ho You and
                  Seong Chae Seo and
                  Young Dae Kim and
                  Jun Yong Choi and
                  Sang Jun Lee and
                  Byung Ki Kim},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Kimchi: {A} Binary Rewriting Defense Against Format String Attacks},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {179--193},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_14},
  doi          = {10.1007/11604938\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YouSKCLK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BechlaghemR04,
  author       = {Malek Bechlaghem and
                  Vincent Rijmen},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Proving Key Usage},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {65--72},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_6},
  doi          = {10.1007/978-3-540-31815-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BechlaghemR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiK04,
  author       = {Young Jae Choi and
                  Soon{-}Ja Kim},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {An Improvement on Privacy and Authentication in {GSM}},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {14--26},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_2},
  doi          = {10.1007/978-3-540-31815-6\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChongRDEHC04,
  author       = {Cheun Ngen Chong and
                  Bin Ren and
                  Jeroen Doumen and
                  Sandro Etalle and
                  Pieter H. Hartel and
                  Ricardo Corin},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {License Protection with a Tamper-Resistant Token},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {223--237},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_19},
  doi          = {10.1007/978-3-540-31815-6\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChongRDEHC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Chow04,
  author       = {Sherman S. M. Chow},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Verifiable Pairing and Its Applications},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {170--187},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_15},
  doi          = {10.1007/978-3-540-31815-6\_15},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/Chow04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GodinezHM04,
  author       = {Fernando God{\'{\i}}nez and
                  Dieter Hutter and
                  Ra{\'{u}}l Monroy},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Service Discrimination and Audit File Reduction for Effective Intrusion
                  Detection},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_9},
  doi          = {10.1007/978-3-540-31815-6\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GodinezHM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GomulkiewiczKK04,
  author       = {Marcin Gomulkiewicz and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Onions Based on Universal Re-encryption - Anonymous Communication
                  Immune Against Repetitive Attack},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {400--410},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_32},
  doi          = {10.1007/978-3-540-31815-6\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GomulkiewiczKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GuptaS04,
  author       = {Kishan Chand Gupta and
                  Palash Sarkar},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Efficient Representation and Software Implementation of Resilient
                  Maiorana-McFarland S-boxes},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {317--331},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_26},
  doi          = {10.1007/978-3-540-31815-6\_26},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GuptaS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HaagdorensVG04,
  author       = {Bart Haagdorens and
                  Tim Vermeiren and
                  Marnix Goossens},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Improving the Performance of Signature-Based Network Intrusion Detection
                  Sensors by Multi-threading},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {188--203},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_16},
  doi          = {10.1007/978-3-540-31815-6\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HaagdorensVG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongJIR04,
  author       = {Kihun Hong and
                  Souhwan Jung and
                  Luigi Lo Iacono and
                  Christoph Ruland},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Impacts of Security Protocols on Real-Time Multimedia Communications},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_1},
  doi          = {10.1007/978-3-540-31815-6\_1},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HongJIR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HuangLCCS04,
  author       = {Yi{-}Yuan Huang and
                  Kwok{-}Yan Lam and
                  Siu Leung Chung and
                  Chi{-}Hung Chi and
                  Jia{-}Guang Sun},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Application of Content Computing in Honeyfarm},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {211--222},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_18},
  doi          = {10.1007/978-3-540-31815-6\_18},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HuangLCCS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Hwang0HR04,
  author       = {SangCheol Hwang and
                  Dong Hoon Lee and
                  Daewan Han and
                  Jae{-}Cheol Ryou},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Vulnerability of a Mobile Payment System Proposed at {WISA} 2002},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {278--285},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_23},
  doi          = {10.1007/978-3-540-31815-6\_23},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Hwang0HR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ImamotoS04,
  author       = {Kenji Imamoto and
                  Kouichi Sakurai},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Key-Exchange Protocol Using Pre-agreed Session-ID},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {375--387},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_30},
  doi          = {10.1007/978-3-540-31815-6\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ImamotoS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IwanagaTS04,
  author       = {Manabu Iwanaga and
                  Toshihiro Tabata and
                  Kouichi Sakurai},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {135--143},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_12},
  doi          = {10.1007/978-3-540-31815-6\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IwanagaTS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeongCK04,
  author       = {Seok Bong Jeong and
                  Young{-}Woo Choi and
                  Sehun Kim},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {An Effective Placement of Detection Systems for Distributed Attack
                  Detection in Large Scale Networks},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {204--210},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_17},
  doi          = {10.1007/978-3-540-31815-6\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JeongCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KatagiKAT04,
  author       = {Masanobu Katagi and
                  Izuru Kitamura and
                  Toru Akishita and
                  Tsuyoshi Takagi},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems
                  Using Degenerate Divisors},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {345--359},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_28},
  doi          = {10.1007/978-3-540-31815-6\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KatagiKAT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimHL04,
  author       = {Chong Hee Kim and
                  Yong Ho Hwang and
                  Pil Joong Lee},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple
                  Channels},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {264--277},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_22},
  doi          = {10.1007/978-3-540-31815-6\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimHL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimKI04,
  author       = {Mira Kim and
                  Kazukuni Kobara and
                  Hideki Imai},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Dynamic Fingerprinting over Broadcast Using Revocation Scheme},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {251--263},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_21},
  doi          = {10.1007/978-3-540-31815-6\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimKI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimO04,
  author       = {Sangjin Kim and
                  Heekuck Oh},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Fair Offline Payment Using Verifiable Encryption},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {286--301},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_24},
  doi          = {10.1007/978-3-540-31815-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimWCCP04,
  author       = {Howon Kim and
                  Thomas J. Wollinger and
                  YongJe Choi and
                  Kyoil Chung and
                  Christof Paar},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Hyperelliptic Curve Coprocessors on a {FPGA}},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {360--374},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_29},
  doi          = {10.1007/978-3-540-31815-6\_29},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KimWCCP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KungpisdanLS04,
  author       = {Supakorn Kungpisdan and
                  Phu Dung Le and
                  Bala Srinivasan},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {A Limited-Used Key Generation Scheme for Internet Transactions},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {302--316},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_25},
  doi          = {10.1007/978-3-540-31815-6\_25},
  timestamp    = {Sun, 05 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KungpisdanLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Kwon04,
  author       = {Soonhak Kwon},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Signed Digit Representation with {NAF} and Balanced Ternary Form and
                  Efficient Exponentiation in GF(q\({}^{\mbox{n}}\)) Using a Gaussian
                  Normal Basis of Type {II}},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {332--344},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_27},
  doi          = {10.1007/978-3-540-31815-6\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Kwon04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LawK04,
  author       = {Kwok Ho Law and
                  Lam For Kwok},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {{IDS} False Alarm Filtering Using {KNN} Classifier},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {114--121},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_10},
  doi          = {10.1007/978-3-540-31815-6\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LawK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKLS04,
  author       = {Hae{-}Yeoun Lee and
                  Jong{-}Tae Kim and
                  Heung{-}Kyu Lee and
                  Young{-}Ho Suh},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Content-Based Synchronization Using the Local Invariant Feature for
                  Robust Watermarking},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {122--134},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_11},
  doi          = {10.1007/978-3-540-31815-6\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuWW04,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Custodian-Hiding Verifiable Encryption},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_5},
  doi          = {10.1007/978-3-540-31815-6\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoonI04,
  author       = {Chang{-}Joo Moon and
                  Hoh Peter In},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Inconsistency Detection of Authorization Policies in Distributed Component
                  Environment},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_4},
  doi          = {10.1007/978-3-540-31815-6\_4},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MoonI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkKL04,
  author       = {Dong Jin Park and
                  Kihyun Kim and
                  Pil Joong Lee},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Public Key Encryption with Conjunctive Field Keyword Search},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_7},
  doi          = {10.1007/978-3-540-31815-6\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkKL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RechbergerO04,
  author       = {Christian Rechberger and
                  Elisabeth Oswald},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Practical Template Attacks},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {440--456},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_35},
  doi          = {10.1007/978-3-540-31815-6\_35},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/RechbergerO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RenLKY04,
  author       = {Kui Ren and
                  Hyunrok Lee and
                  Kwangjo Kim and
                  Taewhan Yoo},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Efficient Authenticated Key Agreement Protocol for Dynamic Groups},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_13},
  doi          = {10.1007/978-3-540-31815-6\_13},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/RenLKY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Saarinen04,
  author       = {Markku{-}Juhani Olavi Saarinen},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Encrypted Watermarks and Linux Laptop Security},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {27--38},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_3},
  doi          = {10.1007/978-3-540-31815-6\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Saarinen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TanakaTY04,
  author       = {Hidema Tanaka and
                  Osamu Takizawa and
                  Akihiro Yamamura},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Evaluation and Improvement of the Tempest Fonts},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {457--469},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_36},
  doi          = {10.1007/978-3-540-31815-6\_36},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TanakaTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TataraTS04,
  author       = {Kohei Tatara and
                  Toshihiro Tabata and
                  Kouichi Sakurai},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {A Probabilistic Method for Detecting Anomalous Program Behavior},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_8},
  doi          = {10.1007/978-3-540-31815-6\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TataraTS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/TrichinaK04,
  author       = {Elena Trichina and
                  Lesya Korkishko},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Secure and Efficient {AES} Software Implementation for Smart Cards},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {425--439},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_34},
  doi          = {10.1007/978-3-540-31815-6\_34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/TrichinaK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/XuZF04,
  author       = {Jing Xu and
                  Zhenfeng Zhang and
                  Dengguo Feng},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {A Ring Signature Scheme Using Bilinear Pairings},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {160--169},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_14},
  doi          = {10.1007/978-3-540-31815-6\_14},
  timestamp    = {Wed, 18 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/XuZF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YaoF04,
  author       = {Gang Yao and
                  Dengguo Feng},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {A New k-Anonymous Message Transmission Protocol},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {388--399},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_31},
  doi          = {10.1007/978-3-540-31815-6\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YaoF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YooKHMP04,
  author       = {HyungSo Yoo and
                  ChangKyun Kim and
                  JaeCheol Ha and
                  Sang{-}Jae Moon and
                  IlHwan Park},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Side Channel Cryptanalysis on {SEED}},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_33},
  doi          = {10.1007/978-3-540-31815-6\_33},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YooKHMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YuT04,
  author       = {Yinyan Yu and
                  Zhi Tang},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {An Adaptive Approach to Hardware Alteration for Digital Rights Management},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {238--250},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_20},
  doi          = {10.1007/978-3-540-31815-6\_20},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YuT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2003,
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b95188},
  doi          = {10.1007/B95188},
  isbn         = {3-540-20827-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wisa/2004,
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b103174},
  doi          = {10.1007/B103174},
  isbn         = {3-540-24015-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Asano03,
  author       = {Tomoyuki Asano},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Reducing Storage at Receivers in {SD} and {LSD} Broadcast Encryption
                  Schemes},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {317--332},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_24},
  doi          = {10.1007/978-3-540-24591-9\_24},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Asano03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AvoineV03,
  author       = {Gildas Avoine and
                  Serge Vaudenay},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Optimal Fair Exchange with Guardian Angels},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {188--202},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_15},
  doi          = {10.1007/978-3-540-24591-9\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AvoineV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/BidouBS03,
  author       = {Renaud Bidou and
                  Julien Bourgeois and
                  Fran{\c{c}}ois Spies},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Towards a Global Security Architecture for Intrusion Detection and
                  Reaction Management},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {111--123},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_9},
  doi          = {10.1007/978-3-540-24591-9\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/BidouBS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChiLSKOK03,
  author       = {Suyoung Chi and
                  Jaeyeon Lee and
                  Jung Soh and
                  Do{-}Hyung Kim and
                  Weon{-}Geun Oh and
                  Changhun Kim},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Visualization of Dynamic Characteristics in Two-Dimensional Time Series
                  Patterns: An Application to Online Signature Verification},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_30},
  doi          = {10.1007/978-3-540-24591-9\_30},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChiLSKOK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChiPL03,
  author       = {Sung{-}Do Chi and
                  Jong Sou Park and
                  Jang{-}Se Lee},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {A Role of {DEVS} Simulation for Information Assurance},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {27--41},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_3},
  doi          = {10.1007/978-3-540-24591-9\_3},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChiPL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoCCJCP03,
  author       = {Yeongsub Cho and
                  Sangrae Cho and
                  Daeseon Choi and
                  Seunghun Jin and
                  Kyoil Chung and
                  Cheehang Park},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {A Location Privacy Protection Mechanism for Smart Space},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {162--173},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_13},
  doi          = {10.1007/978-3-540-24591-9\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoCCJCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiIL03,
  author       = {Dae{-}Sik Choi and
                  Eul{-}Gyu Im and
                  Cheol Won Lee},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Intrusion-Tolerant System Design for Web Server Survivability},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {124--134},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_10},
  doi          = {10.1007/978-3-540-24591-9\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiIL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiKK03,
  author       = {SuGil Choi and
                  Kwangjo Kim and
                  ByeongGon Kim},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Practical Solution for Location Privacy in Mobile IPv6},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_6},
  doi          = {10.1007/978-3-540-24591-9\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FukushimaS03,
  author       = {Kazuhide Fukushima and
                  Kouichi Sakurai},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {303--316},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_23},
  doi          = {10.1007/978-3-540-24591-9\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FukushimaS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GrossschadlK03,
  author       = {Johann Gro{\ss}sch{\"{a}}dl and
                  Guy{-}Armand Kamendje},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Low-Power Design of a Functional Unit for Arithmetic in Finite Fields
                  GF(p) and GF(2\({}^{\mbox{m}}\))},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {227--243},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_18},
  doi          = {10.1007/978-3-540-24591-9\_18},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GrossschadlK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KangHKCC03,
  author       = {Hyosup Kang and
                  Y. Han and
                  Hakil Kim and
                  W. Choi and
                  Yongwha Chung},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {An Empirical Study of Multi-mode Biometric Systems Using Face and
                  Fingerprint},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {348--354},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_26},
  doi          = {10.1007/978-3-540-24591-9\_26},
  timestamp    = {Sat, 16 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KangHKCC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimAB03,
  author       = {Kyoil Kim and
                  Jacob A. Abraham and
                  Jayanta Bhadra},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Model Checking of Security Protocols with Pre-configuration},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_1},
  doi          = {10.1007/978-3-540-24591-9\_1},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimAB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KimLSR03,
  author       = {Jin Suk Kim and
                  Hohn Gyu Lee and
                  Sungbo Seo and
                  Keun Ho Ryu},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {{CTAR:} Classification Based on Temporal Class-Association Rules for
                  Intrusion Detection},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_7},
  doi          = {10.1007/978-3-540-24591-9\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KimLSR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/King03,
  author       = {Brian King},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {A Comment on Group Independent Threshold Sharing},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {425--441},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_32},
  doi          = {10.1007/978-3-540-24591-9\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/King03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KooC03,
  author       = {Ja{-}Min Koo and
                  Sung{-}Bae Cho},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection
                  System},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {97--110},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_8},
  doi          = {10.1007/978-3-540-24591-9\_8},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KooC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KooJS03,
  author       = {Bonwook Koo and
                  Hwan Seok Jang and
                  Jung Hwan Song},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Constructing and Cryptanalysis of a 16 {\texttimes} 16 Binary Matrix
                  as a Diffusion Layer},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {489--503},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_36},
  doi          = {10.1007/978-3-540-24591-9\_36},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KooJS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonL03,
  author       = {Taekyoung Kwon and
                  Seongan Lim},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Automation-Considered Logic of Authentication and Key Distribution},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {442--457},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_33},
  doi          = {10.1007/978-3-540-24591-9\_33},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LamZCGS03,
  author       = {Kwok{-}Yan Lam and
                  Xibin Zhao and
                  Siu Leung Chung and
                  Ming Gu and
                  Jia{-}Guang Sun},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Enhancing Grid Security Infrastructure to Support Mobile Computing
                  Nodes},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {42--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_4},
  doi          = {10.1007/978-3-540-24591-9\_4},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LamZCGS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeKE03,
  author       = {Hyun Suk Lee and
                  Hyeog Man Kwon and
                  Young Ik Eom},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Reliable Cascaded Delegation Scheme for Mobile Agent Environments},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {55--68},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_5},
  doi          = {10.1007/978-3-540-24591-9\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeKE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MinKC03,
  author       = {Byoung{-}Joon Min and
                  Sung Ki Kim and
                  Joong{-}Sup Choi},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Secure System Architecture Based on Dynamic Resource Reallocation},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {174--187},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_14},
  doi          = {10.1007/978-3-540-24591-9\_14},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MinKC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoonGAPCP03,
  author       = {Daesung Moon and
                  Youn{-}Hee Gil and
                  Dosung Ahn and
                  Sung Bum Pan and
                  Yongwha Chung and
                  Chee{-}Hang Park},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Fingerprint-Based Authentication for {USB} Token Systems},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {355--364},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_27},
  doi          = {10.1007/978-3-540-24591-9\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MoonGAPCP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MoonK03,
  author       = {Hyeonjoon Moon and
                  Jaihie Kim},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Biometrics Identification and Verification Using Projection-Based
                  Face Recognition System},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {380--394},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_29},
  doi          = {10.1007/978-3-540-24591-9\_29},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/MoonK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MunozFES03,
  author       = {Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza and
                  Miguel Soriano},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {{E-MHT.} An Efficient Protocol for Certificate Status Checking},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {410--424},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_31},
  doi          = {10.1007/978-3-540-24591-9\_31},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MunozFES03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NahKSPH03,
  author       = {Jaehoon Nah and
                  Hyeokchan Kwon and
                  Sungwon Sohn and
                  Cheehang Park and
                  ChiMoon Han},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {An Automatic Security Evaluation System for IPv6 Network},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_12},
  doi          = {10.1007/978-3-540-24591-9\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NahKSPH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NakaharaRPV03,
  author       = {Jorge Nakahara Jr. and
                  Vincent Rijmen and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {The {MESH} Block Ciphers},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {458--473},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_34},
  doi          = {10.1007/978-3-540-24591-9\_34},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NakaharaRPV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Novak03,
  author       = {Roman Novak},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Sign-Based Differential Power Analysis},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {203--216},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_16},
  doi          = {10.1007/978-3-540-24591-9\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Novak03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PagliusiM03,
  author       = {Paulo S. Pagliusi and
                  Chris J. Mitchell},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {PANA/IKEv2: An Internet Authentication Protocol for Heterogeneous
                  Access},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_11},
  doi          = {10.1007/978-3-540-24591-9\_11},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PagliusiM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkSL03,
  author       = {Dong Jin Park and
                  Sang Gyoo Sim and
                  Pil Joong Lee},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Fast Scalar Multiplication Method Using Change-of-Basis Matrix to
                  Prevent Power Analysis Attacks on Koblitz Curves},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {474--488},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_35},
  doi          = {10.1007/978-3-540-24591-9\_35},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkSL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PengBDV03,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapalee Viswanathan},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Efficient Implementation of Relative Bid Privacy in Sealed-Bid Auction},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {244--256},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_19},
  doi          = {10.1007/978-3-540-24591-9\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PengBDV03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/PrakobpolP03,
  author       = {Navapot Prakobpol and
                  Yongyuth Permpoontanalarp},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Multi-dimensional Hash Chain For Sealed-Bid Auction},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {257--271},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_20},
  doi          = {10.1007/978-3-540-24591-9\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/PrakobpolP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SadeghiS03,
  author       = {Ahmad{-}Reza Sadeghi and
                  Christian St{\"{u}}ble},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Taming "Trusted Platforms" by Operating System Design},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {286--302},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_22},
  doi          = {10.1007/978-3-540-24591-9\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SadeghiS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShiraishiFM03,
  author       = {Yoshiaki Shiraishi and
                  Youji Fukuta and
                  Masakatu Morii},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Remote Access {VPN} with Port Protection Function by Mobile Codes},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {16--26},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_2},
  doi          = {10.1007/978-3-540-24591-9\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShiraishiFM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SonKL03,
  author       = {Byungjun Son and
                  Gyundo Kee and
                  Yillbyung Lee},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Iris Recognition System Using Wavelet Packet and Support Vector Machines},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {365--379},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_28},
  doi          = {10.1007/978-3-540-24591-9\_28},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SonKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SongKL03,
  author       = {Geun{-}Sil Song and
                  Mi{-}Ae Kim and
                  Won{-}Hyung Lee},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Asymmetric Watermarking Scheme Using Permutation Braids},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {217--226},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_17},
  doi          = {10.1007/978-3-540-24591-9\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SongKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SongYS03,
  author       = {Hwanjong Song and
                  Ukil Yang and
                  Kwanghoon Sohn},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {3D Face Recognition under Pose Varying Environments},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {333--347},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_25},
  doi          = {10.1007/978-3-540-24591-9\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SongYS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YaoFPD03,
  author       = {Ming Yao and
                  Ernest Foo and
                  Kun Peng and
                  Ed Dawson},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {An Improved Forward Integrity Protocol for Mobile Agents},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {272--285},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_21},
  doi          = {10.1007/978-3-540-24591-9\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YaoFPD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics