default search action
Search dblp for Publications
export results for "toc:db/conf/wisa/wisa2013.bht:"
@proceedings{DBLP:conf/wisa/2013, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-05149-9}, doi = {10.1007/978-3-319-05149-9}, isbn = {978-3-319-05148-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AthreyaWKTT13, author = {Arjun P. Athreya and Xiao Wang and Yu Seung Kim and Yuan Tian and Patrick Tague}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {174--188}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_11}, doi = {10.1007/978-3-319-05149-9\_11}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/AthreyaWKTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChinW13, author = {Erika Chin and David A. Wagner}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Bifocals: Analyzing WebView Vulnerabilities in Android Applications}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {138--159}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_9}, doi = {10.1007/978-3-319-05149-9\_9}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChinW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/DoCL13, author = {Heesung Do and Peter Choi and Heejo Lee}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Dynamic Surveillance: {A} Case Study with Enron Email Data Set}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {81--99}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_6}, doi = {10.1007/978-3-319-05149-9\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/DoCL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FanCG13, author = {Limin Fan and Hua Chen and Si Gao}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {A General Method to Evaluate the Correlation of Randomness Tests}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {52--62}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_4}, doi = {10.1007/978-3-319-05149-9\_4}, timestamp = {Fri, 04 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FanCG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongLKKRL13, author = {Deukjo Hong and Jung{-}Keun Lee and Dong{-}Chan Kim and Daesung Kwon and Kwon Ho Ryu and Donggeon Lee}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {{LEA:} {A} 128-Bit Block Cipher for Fast Encryption on Common Processors}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {3--27}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_1}, doi = {10.1007/978-3-319-05149-9\_1}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HongLKKRL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HuP13, author = {Gengran Hu and Yanbin Pan}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Improvements on Reductions among Different Variants of {SVP} and {CVP}}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {39--51}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_3}, doi = {10.1007/978-3-319-05149-9\_3}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HuP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JavedS13, author = {Ashar Javed and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {103--123}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_7}, doi = {10.1007/978-3-319-05149-9\_7}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JavedS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KimK13, author = {Daehyun Kim and Hyoungshick Kim}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {We Are Still Vulnerable to Clickjacking Attacks: About 99 {\%} of Korean Websites Are Dangerous}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {163--173}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_10}, doi = {10.1007/978-3-319-05149-9\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KimK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKLKK13, author = {Hayoung Lee and Taeho Kang and Sangho Lee and Jong Kim and Yoonho Kim}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Punobot: Mobile Botnet Using Push Notification Service in Android}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {124--137}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_8}, doi = {10.1007/978-3-319-05149-9\_8}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKLKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LvZL13, author = {Jing Lv and Bin Zhang and Dongdai Lin}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Some New Weaknesses in the {RC4} Stream Cipher}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {28--38}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_2}, doi = {10.1007/978-3-319-05149-9\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LvZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MeyerS13, author = {Christopher Meyer and J{\"{o}}rg Schwenk}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {SoK: Lessons Learned from {SSL/TLS} Attacks}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {189--209}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_12}, doi = {10.1007/978-3-319-05149-9\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MeyerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenALM13, author = {Aziz Mohaisen and Omar Alrawi and Matt Larson and Danny McPherson}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention"}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {231--241}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_15}, doi = {10.1007/978-3-319-05149-9\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenALM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenH13, author = {Aziz Mohaisen and Scott Hollenbeck}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {65--80}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_5}, doi = {10.1007/978-3-319-05149-9\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MoonCE13, author = {Cheolmin Sky Moon and Sam Chung and Barbara Endicott{-}Popovsky}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {260--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_17}, doi = {10.1007/978-3-319-05149-9\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MoonCE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MosunovSCACK13, author = {Anton Mosunov and Vineet Sinha and Heather Crawford and John Aycock and Daniel Medeiros Nunes de Castro and Rashmi Kumari}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Assured Supraliminal Steganography in Computer Games}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {245--259}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_16}, doi = {10.1007/978-3-319-05149-9\_16}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/MosunovSCACK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SongSC13, author = {YongJoo Song and Seungwon Shin and Yongjin Choi}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Network Iron Curtain: Hide Enterprise Networks with OpenFlow}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {218--230}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_14}, doi = {10.1007/978-3-319-05149-9\_14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SongSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/VassermanH13, author = {Eugene Y. Vasserman and John Hatcliff}, editor = {Yongdae Kim and Heejo Lee and Adrian Perrig}, title = {Foundational Security Principles for Medical Application Platforms - (Extended Abstract)}, booktitle = {Information Security Applications - 14th International Workshop, {WISA} 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8267}, pages = {213--217}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05149-9\_13}, doi = {10.1007/978-3-319-05149-9\_13}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/VassermanH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.