Search dblp for Publications

export results for "toc:db/conf/wisa/wisa2016.bht:"

 download as .bib file

@proceedings{DBLP:conf/wisa/2016,
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56549-1},
  doi          = {10.1007/978-3-319-56549-1},
  isbn         = {978-3-319-56548-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AminantoK16,
  author       = {Muhamad Erza Aminanto and
                  Kwangjo Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Detecting Impersonation Attack in WiFi Networks Using Deep Learning
                  Approach},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {136--147},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_12},
  doi          = {10.1007/978-3-319-56549-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AminantoK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChaK16,
  author       = {Seunghun Cha and
                  Hyoungshick Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Detecting Encrypted Traffic: {A} Machine Learning Approach},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {54--65},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_5},
  doi          = {10.1007/978-3-319-56549-1\_5},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChaK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiPHPK16,
  author       = {Jongseok Choi and
                  Jong{-}gyu Park and
                  Shinwook Heo and
                  Namje Park and
                  Howon Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Slowloris DoS Countermeasure over WebSocket},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {42--53},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_4},
  doi          = {10.1007/978-3-319-56549-1\_4},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiPHPK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FaugereP16,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {The Quantum-Safe Revolution},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {258--266},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_22},
  doi          = {10.1007/978-3-319-56549-1\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FaugereP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FengHS16,
  author       = {Yaokai Feng and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {79--89},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_7},
  doi          = {10.1007/978-3-319-56549-1\_7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FengHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GiaoLMK16,
  author       = {Pham Ngoc Giao and
                  Suk{-}Hwan Lee and
                  Kwang{-}Seok Moon and
                  Ki{-}Ryong Kwon},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {{GIS} Vector Map Perceptual Encryption Scheme Using Geometric Objects},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {210--220},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_18},
  doi          = {10.1007/978-3-319-56549-1\_18},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/GiaoLMK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HomoliakSH16,
  author       = {Ivan Homoliak and
                  Ladislav Sulak and
                  Petr Han{\'{a}}cek},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Features for Behavioral Anomaly Detection of Connectionless Network
                  Buffer Overflow Attacks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {66--78},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_6},
  doi          = {10.1007/978-3-319-56549-1\_6},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HomoliakSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HongKHKCLK16,
  author       = {Hyunwook Hong and
                  Hongil Kim and
                  Byeongdo Hong and
                  Dongkwan Kim and
                  Hyunwoo Choi and
                  Eunkyu Lee and
                  Yongdae Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Pay as You Want: Bypassing Charging System in Operational Cellular
                  Networks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {148--160},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_13},
  doi          = {10.1007/978-3-319-56549-1\_13},
  timestamp    = {Thu, 23 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/HongKHKCLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JegedeUAM16,
  author       = {Abayomi Jegede and
                  Nur Izura Udzir and
                  Azizol Abdullah and
                  Ramlan Mahmod},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Secure and Privacy Preserving Iris Biometric Authentication Scheme
                  with Matrix Transformation},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {341--352},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_29},
  doi          = {10.1007/978-3-319-56549-1\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JegedeUAM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JeongKSH16,
  author       = {Jongmin Jeong and
                  Hyunsoo Kwon and
                  Hyungjune Shin and
                  Junbeom Hur},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Practical Analysis of {TLS} Vulnerabilities in Korea Web Environment},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {112--123},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_10},
  doi          = {10.1007/978-3-319-56549-1\_10},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JeongKSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/JungKY16,
  author       = {Jisoo Jung and
                  Joo{-}Im Kim and
                  Ji Won Yoon},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Practical Approach to Constructing Triple-Blind Review Process with
                  Maximal Anonymity and Fairness},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {198--209},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_17},
  doi          = {10.1007/978-3-319-56549-1\_17},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/JungKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KhandakerNSD16,
  author       = {Md. Al{-}Amin Khandaker and
                  Yasuyuki Nogami and
                  Hwajeong Seo and
                  Sylvain Duquesne},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Efficient Scalar Multiplication for Ate Based Pairing over {KSS} Curve
                  of Embedding Degree 18},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {221--232},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_19},
  doi          = {10.1007/978-3-319-56549-1\_19},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KhandakerNSD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KosugeT16,
  author       = {Haruhisa Kosuge and
                  Hidema Tanaka},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Algebraic Degree Estimation for Integral Attack by Randomized Algorithm},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {292--304},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_25},
  doi          = {10.1007/978-3-319-56549-1\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KosugeT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KownJLDBC16,
  author       = {Su{-}kyung Kown and
                  Bongsoo Jang and
                  Byoung{-}Dai Lee and
                  Younghae Do and
                  Hunki Baek and
                  Yoon{-}Ho Choi},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Influence Evaluation of Centrality-Based Random Scanning Strategy
                  on Early Worm Propagation Rate},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {90--101},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_8},
  doi          = {10.1007/978-3-319-56549-1\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KownJLDBC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KwonKSCK16,
  author       = {Yujin Kwon and
                  Dohyun Kim and
                  Yunmok Son and
                  Jaeyeong Choi and
                  Yongdae Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication
                  Share Attack},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {124--135},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_11},
  doi          = {10.1007/978-3-319-56549-1\_11},
  timestamp    = {Mon, 02 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KwonKSCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeP16,
  author       = {Donghyeok Lee and
                  Namje Park},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Geocasting-Based Almanac Synchronization Method for Secure Maritime
                  Cloud},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {376--387},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_32},
  doi          = {10.1007/978-3-319-56549-1\_32},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LeeRKJ16,
  author       = {Sung{-}Hoon Lee and
                  Jong{-}Hyuk Roh and
                  Soo{-}Hyung Kim and
                  Seung{-}Hun Jin},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {A Study on Feature of Keystroke Dynamics for Improving Accuracy in
                  Mobile Environment},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {366--375},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_31},
  doi          = {10.1007/978-3-319-56549-1\_31},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LeeRKJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LiuCK16,
  author       = {Xinyu Liu and
                  Beumjin Cho and
                  Jong Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {{SD-OVS:} {SYN} Flooding Attack Defending Open vSwitch for {SDN}},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {29--41},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_3},
  doi          = {10.1007/978-3-319-56549-1\_3},
  timestamp    = {Thu, 17 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LiuCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/MohaisenKR16,
  author       = {Aziz Mohaisen and
                  Ah Reum Kang and
                  Kui Ren},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Does Query Blocking Improve {DNS} Privacy? - Quantifying Privacy Under
                  Partial Blocking Deployment},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {1--14},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_1},
  doi          = {10.1007/978-3-319-56549-1\_1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/MohaisenKR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhKC16,
  author       = {Eun Oh and
                  Tae{-}Sung Kim and
                  Tae{-}Hee Cho},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Development of Information Security Management Assessment Model for
                  the Financial Sector},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {186--197},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_16},
  doi          = {10.1007/978-3-319-56549-1\_16},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhKC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhKK16,
  author       = {Sanghak Oh and
                  Eunsoo Kim and
                  Hyoungshick Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Empirical Analysis of {SSL/TLS} Weaknesses in Real Websites: Who Cares?},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {174--185},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_15},
  doi          = {10.1007/978-3-319-56549-1\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhLC16,
  author       = {Seung{-}Hee Oh and
                  Byung{-}Gil Lee and
                  Byungho Chung},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {The Vessel Trajectory Mechanism for Marine Accidents Analysis},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {388--396},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_33},
  doi          = {10.1007/978-3-319-56549-1\_33},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/OhLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Picek16,
  author       = {Stjepan Picek},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Applications of Soft Computing in Cryptology},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {305--317},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_26},
  doi          = {10.1007/978-3-319-56549-1\_26},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Picek16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RuffellHKK16,
  author       = {Matthew Ruffell and
                  Jin B. Hong and
                  Hyoungshick Kim and
                  Dong Seong Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Towards Automated Exploit Generation for Embedded Systems},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {161--173},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_14},
  doi          = {10.1007/978-3-319-56549-1\_14},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/RuffellHKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Sadiah016,
  author       = {Shahidatul Sadiah and
                  Toru Nakanishi},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Revocable Group Signatures with Compact Revocation List Using Vector
                  Commitments},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {245--257},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_21},
  doi          = {10.1007/978-3-319-56549-1\_21},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Sadiah016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoPHSBHZNZK16,
  author       = {Hwajeong Seo and
                  Taehwan Park and
                  Shinwook Heo and
                  Gyuwon Seo and
                  Bongjin Bae and
                  Zhi Hu and
                  Lu Zhou and
                  Yasuyuki Nogami and
                  Youwen Zhu and
                  Howon Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Parallel Implementations of LEA, Revisited},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {318--330},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_27},
  doi          = {10.1007/978-3-319-56549-1\_27},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoPHSBHZNZK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SeoPHSBZK16,
  author       = {Hwajeong Seo and
                  Taehwan Park and
                  Shinwook Heo and
                  Gyuwon Seo and
                  Bongjin Bae and
                  Lu Zhou and
                  Howon Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors,
                  a Step Forward},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {331--340},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_28},
  doi          = {10.1007/978-3-319-56549-1\_28},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/SeoPHSBZK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Skorski16,
  author       = {Maciej Skorski},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {On Pseudorandomness in Stateless Sources},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {280--291},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_24},
  doi          = {10.1007/978-3-319-56549-1\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Skorski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/SugioIKH16,
  author       = {Nobuyuki Sugio and
                  Yasutaka Igarashi and
                  Toshinobu Kaneko and
                  Kenichi Higuchi},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {New Integral Characteristics of {KASUMI} Derived by Division Property},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {267--279},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_23},
  doi          = {10.1007/978-3-319-56549-1\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/SugioIKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangMCC16,
  author       = {An Wang and
                  Aziz Mohaisen and
                  Wentao Chang and
                  Songqing Chen},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Measuring and Analyzing Trends in Recent Distributed Denial of Service
                  Attacks},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {15--28},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_2},
  doi          = {10.1007/978-3-319-56549-1\_2},
  timestamp    = {Sat, 06 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WangMCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WooKYK16,
  author       = {Simon S. Woo and
                  Jingul Kim and
                  Duoduo Yu and
                  Beomjun Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Exploration of 3D Texture and Projection for New {CAPTCHA} Design},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {353--365},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_30},
  doi          = {10.1007/978-3-319-56549-1\_30},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/WooKYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YangKO16,
  author       = {Jeong Yoon Yang and
                  So{-}Jeong Kim and
                  Il Seok Oh(Luke)},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Analysis on South Korean Cybersecurity Readiness Regarding North Korean
                  Cyber Capabilities},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {102--111},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_9},
  doi          = {10.1007/978-3-319-56549-1\_9},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YangKO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YuCZZY16,
  author       = {Xiaoqi Yu and
                  Nairen Cao and
                  Gongxian Zeng and
                  Ruoqing Zhang and
                  Siu{-}Ming Yiu},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {{LRCRYPT:} Leakage-Resilient Cryptographic System (Design and Implementation)},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {233--244},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_20},
  doi          = {10.1007/978-3-319-56549-1\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YuCZZY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics