default search action
23rd WISA 2022: Jeju Island, South Korea
- Ilsun You, Taek-Young Youn:
Information Security Applications - 23rd International Conference, WISA 2022, Jeju Island, South Korea, August 24-26, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13720, Springer 2023, ISBN 978-3-031-25658-5
Cryptography
- Shoichi Hirose:
Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher. 3-15 - Theo Fanuela Prabowo, Chik How Tan:
Provably Secure Password-Authenticated Key Exchange Based on SIDH. 16-28 - Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa:
Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups. 29-43 - Yujin Yang, Kyungbae Jang, Hyunji Kim, Gyeongju Song, Hwajeong Seo:
Grover on SPARKLE. 44-59
Network Security
- Borja Bordel, Ramón Alcarria, Joaquin Chung, Rajkumar Kettimuthu, Tomás Robles, Iván Armuelles:
Quality-of-Service Degradation in Distributed Instrumentation Systems Through Poisoning of 5G Beamforming Algorithms. 63-76 - Lixin Wang, Jianhua Yang, Austin Lee:
An Effective Approach for Stepping-Stone Intrusion Detection Using Packet Crossover. 77-88 - Mathew Del Castillo, Harvey Hermosa, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni:
Software-Defined Network Based Secure Internet-Enabled Video Surveillance System. 89-101 - Intae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow:
TLS Goes Low Cost: When TLS Meets Edge. 102-113 - SeongHan Shin:
5G-AKA, Revisited. 114-127
Privacy Enhancing Technique
- Keita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake:
Membership Privacy for Asynchronous Group Messaging. 131-142 - Myung Gyo Oh, Leo Hyun Park, Jaeuk Kim, Jaewoo Park, Taekyoung Kwon:
On Membership Inference Attacks to Generative Language Models Across Language Domains. 143-155 - Muhammad Firdaus, Kyung-Hyune Rhee:
A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular Networks. 156-167
Vulnerability Analysis
- Hyunsu Cho, Sunwoo Lee, Wonsuk Choi, Dong Hoon Lee:
Recovering Yaw Rate from Signal Injection Attack to Protect RV's Direction. 171-184 - Jinhong Choi, Yeongjin Jang:
A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-Physical and Embedded Systems. 185-203 - Bora Lee, Kyungchan Lim, JiHo Lee, Chijung Jung, Doowon Kim, Kyu Hyung Lee, Haehyun Cho, Yonghwi Kwon:
Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State Machine. 204-221 - Hiroki Kuzuno, Toshihiro Yamauchi:
vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel Vulnerability. 222-234
Security Engineering
- Hyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Siwoo Eum, Minwoo Lee, Wai-Kong Lee, Hwajeong Seo:
ARMing-Sword: Scabbard on ARM. 237-250 - Kyungbae Jang, Won-Woong Kim, Sejin Lim, Yeajun Kang, Yujin Yang, Hwajeong Seo:
Optimized Implementation of Quantum Binary Field Multiplication with Toffoli Depth One. 251-264 - Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani:
Time-Optimal Design of Finite Field Arithmetic for SIKE on Cortex-M4. 265-276 - Taewan Kim, Seyoon Lee, Seunghwan Yun, Jongbum Kim, Okyeon Yi:
Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments. 277-288
Security Management
- Binh Le Thanh Thai, Hidema Tanaka:
A Novel Metric for Password Security Risk Against Dictionary Attacks. 291-302 - Issei Murata, Pengju He, Yujie Gu, Kouichi Sakurai:
Towards Evaluating the Security of Human Computable Passwords Using Neural Networks. 303-312 - Xiaofan Zhou, Simon Yusuf Enoch, Dong Seong Kim:
Markov Decision Process for Automatic Cyber Defense. 313-329 - Yu-kyung Kim, Myong-Hyun Go, Kyungho Lee:
Influence Through Cyber Capacity Building: Network Analysis of Assistance, Cooperation, and Agreements Among ASEAN Plus Three Countries. 330-343 - Wei Li, Xiaoyu Zhang, Shen Lin, Xinbo Ban, Xiaofeng Chen:
Chameleon DNN Watermarking: Dynamically Public Model Ownership Verification. 344-356
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.