![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/conf/wisa/wisa2016.bht:"
@proceedings{DBLP:conf/wisa/2016, editor = {Dooho Choi and Sylvain Guilley}, title = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56549-1}, doi = {10.1007/978-3-319-56549-1}, isbn = {978-3-319-56548-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/AminantoK16, author = {Muhamad Erza Aminanto and Kwangjo Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {136--147}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_12}, doi = {10.1007/978-3-319-56549-1\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/AminantoK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChaK16, author = {Seunghun Cha and Hyoungshick Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Detecting Encrypted Traffic: {A} Machine Learning Approach}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {54--65}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_5}, doi = {10.1007/978-3-319-56549-1\_5}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ChaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ChoiPHPK16, author = {Jongseok Choi and Jong{-}gyu Park and Shinwook Heo and Namje Park and Howon Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Slowloris DoS Countermeasure over WebSocket}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {42--53}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_4}, doi = {10.1007/978-3-319-56549-1\_4}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/ChoiPHPK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FaugereP16, author = {Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, editor = {Dooho Choi and Sylvain Guilley}, title = {The Quantum-Safe Revolution}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {258--266}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_22}, doi = {10.1007/978-3-319-56549-1\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FaugereP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FengHS16, author = {Yaokai Feng and Yoshiaki Hori and Kouichi Sakurai}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {79--89}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_7}, doi = {10.1007/978-3-319-56549-1\_7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FengHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GiaoLMK16, author = {Pham Ngoc Giao and Suk{-}Hwan Lee and Kwang{-}Seok Moon and Ki{-}Ryong Kwon}, editor = {Dooho Choi and Sylvain Guilley}, title = {{GIS} Vector Map Perceptual Encryption Scheme Using Geometric Objects}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {210--220}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_18}, doi = {10.1007/978-3-319-56549-1\_18}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/GiaoLMK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HomoliakSH16, author = {Ivan Homoliak and Ladislav Sulak and Petr Han{\'{a}}cek}, editor = {Dooho Choi and Sylvain Guilley}, title = {Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {66--78}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_6}, doi = {10.1007/978-3-319-56549-1\_6}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HomoliakSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HongKHKCLK16, author = {Hyunwook Hong and Hongil Kim and Byeongdo Hong and Dongkwan Kim and Hyunwoo Choi and Eunkyu Lee and Yongdae Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Pay as You Want: Bypassing Charging System in Operational Cellular Networks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {148--160}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_13}, doi = {10.1007/978-3-319-56549-1\_13}, timestamp = {Thu, 23 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/HongKHKCLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JegedeUAM16, author = {Abayomi Jegede and Nur Izura Udzir and Azizol Abdullah and Ramlan Mahmod}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {341--352}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_29}, doi = {10.1007/978-3-319-56549-1\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JegedeUAM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JeongKSH16, author = {Jongmin Jeong and Hyunsoo Kwon and Hyungjune Shin and Junbeom Hur}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Practical Analysis of {TLS} Vulnerabilities in Korea Web Environment}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {112--123}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_10}, doi = {10.1007/978-3-319-56549-1\_10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JeongKSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/JungKY16, author = {Jisoo Jung and Joo{-}Im Kim and Ji Won Yoon}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {198--209}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_17}, doi = {10.1007/978-3-319-56549-1\_17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/JungKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KhandakerNSD16, author = {Md. Al{-}Amin Khandaker and Yasuyuki Nogami and Hwajeong Seo and Sylvain Duquesne}, editor = {Dooho Choi and Sylvain Guilley}, title = {Efficient Scalar Multiplication for Ate Based Pairing over {KSS} Curve of Embedding Degree 18}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {221--232}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_19}, doi = {10.1007/978-3-319-56549-1\_19}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KhandakerNSD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KosugeT16, author = {Haruhisa Kosuge and Hidema Tanaka}, editor = {Dooho Choi and Sylvain Guilley}, title = {Algebraic Degree Estimation for Integral Attack by Randomized Algorithm}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {292--304}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_25}, doi = {10.1007/978-3-319-56549-1\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KosugeT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KownJLDBC16, author = {Su{-}kyung Kown and Bongsoo Jang and Byoung{-}Dai Lee and Younghae Do and Hunki Baek and Yoon{-}Ho Choi}, editor = {Dooho Choi and Sylvain Guilley}, title = {Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {90--101}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_8}, doi = {10.1007/978-3-319-56549-1\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KownJLDBC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonKSCK16, author = {Yujin Kwon and Dohyun Kim and Yunmok Son and Jaeyeong Choi and Yongdae Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {124--135}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_11}, doi = {10.1007/978-3-319-56549-1\_11}, timestamp = {Mon, 02 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonKSCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeP16, author = {Donghyeok Lee and Namje Park}, editor = {Dooho Choi and Sylvain Guilley}, title = {Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {376--387}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_32}, doi = {10.1007/978-3-319-56549-1\_32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeRKJ16, author = {Sung{-}Hoon Lee and Jong{-}Hyuk Roh and Soo{-}Hyung Kim and Seung{-}Hun Jin}, editor = {Dooho Choi and Sylvain Guilley}, title = {A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {366--375}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_31}, doi = {10.1007/978-3-319-56549-1\_31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeRKJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LiuCK16, author = {Xinyu Liu and Beumjin Cho and Jong Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {{SD-OVS:} {SYN} Flooding Attack Defending Open vSwitch for {SDN}}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {29--41}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_3}, doi = {10.1007/978-3-319-56549-1\_3}, timestamp = {Thu, 17 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LiuCK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/MohaisenKR16, author = {Aziz Mohaisen and Ah Reum Kang and Kui Ren}, editor = {Dooho Choi and Sylvain Guilley}, title = {Does Query Blocking Improve {DNS} Privacy? - Quantifying Privacy Under Partial Blocking Deployment}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {1--14}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_1}, doi = {10.1007/978-3-319-56549-1\_1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/MohaisenKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhKC16, author = {Eun Oh and Tae{-}Sung Kim and Tae{-}Hee Cho}, editor = {Dooho Choi and Sylvain Guilley}, title = {Development of Information Security Management Assessment Model for the Financial Sector}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {186--197}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_16}, doi = {10.1007/978-3-319-56549-1\_16}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhKC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhKK16, author = {Sanghak Oh and Eunsoo Kim and Hyoungshick Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Empirical Analysis of {SSL/TLS} Weaknesses in Real Websites: Who Cares?}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {174--185}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_15}, doi = {10.1007/978-3-319-56549-1\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/OhKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/OhLC16, author = {Seung{-}Hee Oh and Byung{-}Gil Lee and Byungho Chung}, editor = {Dooho Choi and Sylvain Guilley}, title = {The Vessel Trajectory Mechanism for Marine Accidents Analysis}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {388--396}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_33}, doi = {10.1007/978-3-319-56549-1\_33}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/OhLC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Picek16, author = {Stjepan Picek}, editor = {Dooho Choi and Sylvain Guilley}, title = {Applications of Soft Computing in Cryptology}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {305--317}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_26}, doi = {10.1007/978-3-319-56549-1\_26}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Picek16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/RuffellHKK16, author = {Matthew Ruffell and Jin B. Hong and Hyoungshick Kim and Dong Seong Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Towards Automated Exploit Generation for Embedded Systems}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {161--173}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_14}, doi = {10.1007/978-3-319-56549-1\_14}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/RuffellHKK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Sadiah016, author = {Shahidatul Sadiah and Toru Nakanishi}, editor = {Dooho Choi and Sylvain Guilley}, title = {Revocable Group Signatures with Compact Revocation List Using Vector Commitments}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {245--257}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_21}, doi = {10.1007/978-3-319-56549-1\_21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Sadiah016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoPHSBHZNZK16, author = {Hwajeong Seo and Taehwan Park and Shinwook Heo and Gyuwon Seo and Bongjin Bae and Zhi Hu and Lu Zhou and Yasuyuki Nogami and Youwen Zhu and Howon Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Parallel Implementations of LEA, Revisited}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {318--330}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_27}, doi = {10.1007/978-3-319-56549-1\_27}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoPHSBHZNZK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SeoPHSBZK16, author = {Hwajeong Seo and Taehwan Park and Shinwook Heo and Gyuwon Seo and Bongjin Bae and Lu Zhou and Howon Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {331--340}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_28}, doi = {10.1007/978-3-319-56549-1\_28}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisa/SeoPHSBZK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Skorski16, author = {Maciej Skorski}, editor = {Dooho Choi and Sylvain Guilley}, title = {On Pseudorandomness in Stateless Sources}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {280--291}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_24}, doi = {10.1007/978-3-319-56549-1\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Skorski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/SugioIKH16, author = {Nobuyuki Sugio and Yasutaka Igarashi and Toshinobu Kaneko and Kenichi Higuchi}, editor = {Dooho Choi and Sylvain Guilley}, title = {New Integral Characteristics of {KASUMI} Derived by Division Property}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {267--279}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_23}, doi = {10.1007/978-3-319-56549-1\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/SugioIKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangMCC16, author = {An Wang and Aziz Mohaisen and Wentao Chang and Songqing Chen}, editor = {Dooho Choi and Sylvain Guilley}, title = {Measuring and Analyzing Trends in Recent Distributed Denial of Service Attacks}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {15--28}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_2}, doi = {10.1007/978-3-319-56549-1\_2}, timestamp = {Sat, 06 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WangMCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WooKYK16, author = {Simon S. Woo and Jingul Kim and Duoduo Yu and Beomjun Kim}, editor = {Dooho Choi and Sylvain Guilley}, title = {Exploration of 3D Texture and Projection for New {CAPTCHA} Design}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {353--365}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_30}, doi = {10.1007/978-3-319-56549-1\_30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/WooKYK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YangKO16, author = {Jeong Yoon Yang and So{-}Jeong Kim and Il Seok Oh(Luke)}, editor = {Dooho Choi and Sylvain Guilley}, title = {Analysis on South Korean Cybersecurity Readiness Regarding North Korean Cyber Capabilities}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {102--111}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_9}, doi = {10.1007/978-3-319-56549-1\_9}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YangKO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YuCZZY16, author = {Xiaoqi Yu and Nairen Cao and Gongxian Zeng and Ruoqing Zhang and Siu{-}Ming Yiu}, editor = {Dooho Choi and Sylvain Guilley}, title = {{LRCRYPT:} Leakage-Resilient Cryptographic System (Design and Implementation)}, booktitle = {Information Security Applications - 17th International Workshop, {WISA} 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10144}, pages = {233--244}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-56549-1\_20}, doi = {10.1007/978-3-319-56549-1\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YuCZZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.