default search action
WISA 2013: Jeju Island, Korea
- Yongdae Kim, Heejo Lee, Adrian Perrig:
Information Security Applications - 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8267, Springer 2014, ISBN 978-3-319-05148-2
Cryptography
- Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, Donggeon Lee:
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. 3-27 - Jing Lv, Bin Zhang, Dongdai Lin:
Some New Weaknesses in the RC4 Stream Cipher. 28-38 - Gengran Hu, Yanbin Pan:
Improvements on Reductions among Different Variants of SVP and CVP. 39-51 - Limin Fan, Hua Chen, Si Gao:
A General Method to Evaluate the Correlation of Randomness Tests. 52-62
Social Network Security
- Aziz Mohaisen, Scott Hollenbeck:
Improving Social Network-Based Sybil Defenses by Rewiring and Augmenting Social Graphs. 65-80 - Heesung Do, Peter Choi, Heejo Lee:
Dynamic Surveillance: A Case Study with Enron Email Data Set. 81-99
Mobile Security
- Ashar Javed, Jörg Schwenk:
Towards Elimination of Cross-Site Scripting on Mobile Versions of Web Applications. 103-123 - Hayoung Lee, Taeho Kang, Sangho Lee, Jong Kim, Yoonho Kim:
Punobot: Mobile Botnet Using Push Notification Service in Android. 124-137 - Erika Chin, David A. Wagner:
Bifocals: Analyzing WebView Vulnerabilities in Android Applications. 138-159
Network Security
- Daehyun Kim, Hyoungshick Kim:
We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous. 163-173 - Arjun P. Athreya, Xiao Wang, Yu Seung Kim, Yuan Tian, Patrick Tague:
Resistance Is Not Futile: Detecting DDoS Attacks without Packet Inspection. 174-188 - Christopher Meyer, Jörg Schwenk:
SoK: Lessons Learned from SSL/TLS Attacks. 189-209
Looking Future
- Eugene Y. Vasserman, John Hatcliff:
Foundational Security Principles for Medical Application Platforms - (Extended Abstract). 213-217 - YongJoo Song, Seungwon Shin, Yongjin Choi:
Network Iron Curtain: Hide Enterprise Networks with OpenFlow. 218-230 - Aziz Mohaisen, Omar Alrawi, Matt Larson, Danny McPherson:
Towards a Methodical Evaluation of Antivirus Scans and Labels - "If You're Not Confused, You're Not Paying Attention". 231-241
Privacy
- Anton Mosunov, Vineet Sinha, Heather Crawford, John Aycock, Daniel Medeiros Nunes de Castro, Rashmi Kumari:
Assured Supraliminal Steganography in Computer Games. 245-259 - Cheolmin Sky Moon, Sam Chung, Barbara Endicott-Popovsky:
A Cloud and In-Memory Based Two-Tier Architecture of a Database Protection System from Insider Attacks. 260-271
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.