default search action
22nd WISA 2021: Jeju Island, Korea
- Hyoungshick Kim:
Information Security Applications - 22nd International Conference, WISA 2021, Jeju Island, South Korea, August 11-13, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13009, Springer 2021, ISBN 978-3-030-89431-3
Machine Learning Security
- Jeongwoo Kim, Seoyeon Kang, Eun-Sun Cho, Joon-Young Paik:
LOM: Lightweight Classifier for Obfuscation Methods. 3-15 - Samuel De La Motte, Jin B. Hong:
A Method for Collecting Vehicular Network Data for Enhanced Anomaly Detection. 16-27 - Young Ah Choi, Kyung Ho Park, Eunji Park, Huy Kang Kim:
Unsupervised Driver Behavior Profiling Leveraging Recurrent Neural Networks. 28-38 - Jeongseok Choi, Hyoungshick Kim:
On the Robustness of Intrusion Detection Systems for Vehicles Against Adversarial Attacks. 39-50 - Raymond Mogg, Simon Yusuf Enoch, Dong Seong Kim:
A Framework for Generating Evasion Attacks for Machine Learning Based Network Intrusion Detection Systems. 51-63 - Chang-Bae Seo, Gyuseop Lee, Yeonjoon Lee, Seung-Hyun Seo:
Echo-Guard: Acoustic-Based Anomaly Detection System for Smart Manufacturing Environments. 64-75 - Sungho Bae, Chanwoong Hwang, Taejin Lee:
Research on Improvement of Anomaly Detection Performance in Industrial Control Systems. 76-87
Cryptography
- Harashta Tatimma Larasati, Howon Kim:
Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem. 91-104 - Hyun Sook Rhee, Dong Hoon Lee:
Anonymous IBE from PEKS: A Generic Construction. 105-118 - Xin Liu, Willy Susilo, Joonsang Baek:
Secure Computation of Shared Secrets and Its Applications. 119-131 - Jongkil Kim, Willy Susilo, Yang-Wai Chow, Joonsang Baek, Intae Kim:
Pattern Matching over Encrypted Data with a Short Ciphertext. 132-143 - KangHoon Lee, Ji Won Yoon:
Efficient Adaptation of TFHE for High End-to-End Throughput. 144-156 - Asep Muhamad Awaludin, Derry Pratama, Howon Kim:
AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling. 157-168
Hardware Security
- Hyunjun Kim, Minjoo Sim, Siwoo Eum, Kyungbae Jang, Gyeongju Song, Hyunji Kim, Hyeokdong Kwon, Wai-Kong Lee, Hwajeong Seo:
Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers. 171-182 - YuJin Kwak, YoungBeom Kim, Seog Chung Seo:
Parallel Implementation of PIPO Block Cipher on 32-bit RISC-V Processor. 183-193 - Hwajeong Seo, Pakize Sanal, Wai-Kong Lee, Reza Azarderakhsh:
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-Bit ARM Platforms. 194-205 - Hyeokdong Kwon, Kyungbae Jang, Hyunjun Kim, Hyunji Kim, Minjoo Sim, Siwoo Eum, Wai-Kong Lee, Hwajeong Seo:
ARMed Frodo - FrodoKEM on 64-Bit ARMv8 Processors. 206-217 - Seokmin Lee, Taehun Kim, Youngjoo Shin:
Quantitative Analysis on Attack Capacity in Meltdown-Type Attacks. 218-228
Application Security
- Priyatham Ganta, Kicho Yu, Dharma Dheeraj Chintala, Younghee Park:
Adaptive Network Security Service Orchestration Based on SDN/NFV. 231-242 - Jinghang Wen, Jia-Nan Liu, Axin Wu, Jiasi Weng:
A General Framework for Matching Pattern Hiding in Deep Packet Inspection. 243-254 - Jane Kim, Soojin Lee, Seung-Hyun Seo:
A Privacy-Preserving Payment Model for EV Charging. 255-264 - Mohammed Alkinoon, Sung J. Choi, David Mohaisen:
Measuring Healthcare Data Breaches. 265-277 - Daehee Jang:
BadASLR: Exceptional Cases of ASLR Aiding Exploitation. 278-289
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.