- 2017
- Dooho Choi, Sylvain Guilley:
Information Security Applications - 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10144, 2017, ISBN 978-3-319-56548-4 [contents] - 2016
- Muhamad Erza Aminanto
, Kwangjo Kim:
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach. WISA 2016: 136-147 - Seunghun Cha, Hyoungshick Kim:
Detecting Encrypted Traffic: A Machine Learning Approach. WISA 2016: 54-65 - Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim:
Slowloris DoS Countermeasure over WebSocket. WISA 2016: 42-53 - Jean-Charles Faugère, Ludovic Perret:
The Quantum-Safe Revolution. WISA 2016: 258-266 - Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks. WISA 2016: 79-89 - Pham Ngoc Giao, Suk-Hwan Lee
, Kwang-Seok Moon, Ki-Ryong Kwon:
GIS Vector Map Perceptual Encryption Scheme Using Geometric Objects. WISA 2016: 210-220 - Ivan Homoliak
, Ladislav Sulak, Petr Hanácek
:
Features for Behavioral Anomaly Detection of Connectionless Network Buffer Overflow Attacks. WISA 2016: 66-78 - Hyunwook Hong, Hongil Kim, Byeongdo Hong, Dongkwan Kim, Hyunwoo Choi, Eunkyu Lee, Yongdae Kim
:
Pay as You Want: Bypassing Charging System in Operational Cellular Networks. WISA 2016: 148-160 - Abayomi Jegede, Nur Izura Udzir, Azizol Abdullah
, Ramlan Mahmod
:
A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation. WISA 2016: 341-352 - Jongmin Jeong, Hyunsoo Kwon, Hyungjune Shin, Junbeom Hur:
A Practical Analysis of TLS Vulnerabilities in Korea Web Environment. WISA 2016: 112-123 - Jisoo Jung, Joo-Im Kim, Ji Won Yoon:
A Practical Approach to Constructing Triple-Blind Review Process with Maximal Anonymity and Fairness. WISA 2016: 198-209 - Md. Al-Amin Khandaker
, Yasuyuki Nogami, Hwajeong Seo, Sylvain Duquesne:
Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18. WISA 2016: 221-232 - Haruhisa Kosuge, Hidema Tanaka:
Algebraic Degree Estimation for Integral Attack by Randomized Algorithm. WISA 2016: 292-304 - Su-kyung Kown, Bongsoo Jang
, Byoung-Dai Lee, Younghae Do, Hunki Baek, Yoon-Ho Choi:
Influence Evaluation of Centrality-Based Random Scanning Strategy on Early Worm Propagation Rate. WISA 2016: 90-101 - Yujin Kwon, Dohyun Kim, Yunmok Son, Jaeyeong Choi, Yongdae Kim
:
Doppelganger in Bitcoin Mining Pools: An Analysis of the Duplication Share Attack. WISA 2016: 124-135 - Donghyeok Lee, Namje Park:
Geocasting-Based Almanac Synchronization Method for Secure Maritime Cloud. WISA 2016: 376-387 - Sung-Hoon Lee, Jong-Hyuk Roh, Soo-Hyung Kim, Seung-Hun Jin:
A Study on Feature of Keystroke Dynamics for Improving Accuracy in Mobile Environment. WISA 2016: 366-375 - Xinyu Liu, Beumjin Cho, Jong Kim:
SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN. WISA 2016: 29-41 - Aziz Mohaisen, Ah Reum Kang
, Kui Ren:
Does Query Blocking Improve DNS Privacy? - Quantifying Privacy Under Partial Blocking Deployment. WISA 2016: 1-14 - Eun Oh, Tae-Sung Kim, Tae-Hee Cho:
Development of Information Security Management Assessment Model for the Financial Sector. WISA 2016: 186-197 - Sanghak Oh, Eunsoo Kim, Hyoungshick Kim:
Empirical Analysis of SSL/TLS Weaknesses in Real Websites: Who Cares? WISA 2016: 174-185 - Seung-Hee Oh, Byung-Gil Lee, Byungho Chung:
The Vessel Trajectory Mechanism for Marine Accidents Analysis. WISA 2016: 388-396 - Stjepan Picek:
Applications of Soft Computing in Cryptology. WISA 2016: 305-317 - Matthew Ruffell, Jin B. Hong
, Hyoungshick Kim, Dong Seong Kim
:
Towards Automated Exploit Generation for Embedded Systems. WISA 2016: 161-173 - Shahidatul Sadiah, Toru Nakanishi:
Revocable Group Signatures with Compact Revocation List Using Vector Commitments. WISA 2016: 245-257 - Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim:
Parallel Implementations of LEA, Revisited. WISA 2016: 318-330 - Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward. WISA 2016: 331-340 - Maciej Skorski:
On Pseudorandomness in Stateless Sources. WISA 2016: 280-291 - Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi:
New Integral Characteristics of KASUMI Derived by Division Property. WISA 2016: 267-279