


default search action
24th WISA 2023: Jeju Island, South Korea
- Howon Kim

, Jonghee M. Youn:
Information Security Applications - 24th International Conference, WISA 2023, Jeju Island, South Korea, August 23-25, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14402, Springer 2024, ISBN 978-981-99-8023-9
Cryptography
- Naoki Shibayama, Yasutaka Igarashi:

A New Higher Order Differential of LCB. 3-15 - Hyungrok Jo, Junji Shikata:

Bloomier Filters on 3-Hypergraphs. 16-26 - Hyun Jung Doh, Joon Soo Yoo, Miyeon Hong, Kang Hoon Lee, Tae Min Ahn, Ji Won Yoon:

Principal Component Analysis over the Boolean Circuit Within TFHE Scheme. 27-39 - Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda:

A Security Analysis on MQ-Sign. 40-51
Network and Application Security
- Eunyoung Kim, Kiwook Sohn:

Research on Security Threats Using VPN in Zero Trust Environments. 55-66 - Yan Zhang

, Yuhao Bai
, Soojin Lee
, Ming Li
, Seung-Hyun Seo
:
A Blockchain-Based Mobile Crowdsensing and Its Incentive Mechanism. 67-78 - Aji Teguh Prihatno

, Naufal Suryanto
, Harashta Tatimma Larasati
, Yustus Eko Oktian
, Thi-Thu-Huong Le
, Howon Kim
:
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain. 79-90 - Ilhwan Ji

, Seungho Jeon
, Jung Taek Seo
:
AE-LSTM Based Anomaly Detection System for Communication Over DNP 3.0. 91-104
Privacy and Management
- Hyunsik Na

, Yoonju Oh
, Wonho Lee
, Daeseon Choi
:
Systematic Evaluation of Robustness Against Model Inversion Attacks on Split Learning. 107-118 - Seong-Su Yoon, Do-Yeon Kim, Ga-Gyeong Kim, Ieck-Chae Euom:

Vulnerability Assessment Framework Based on In-The-Wild Exploitability for Prioritizing Patch Application in Control System. 119-130 - Yustus Eko Oktian, Uk Jo, Simon Oh, Hanho Jeong, Jaehyun Kim, Thi-Thu-Huong Le

, Howon Kim:
Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment. 131-142 - Hiroki Kuzuno

, Tomohiko Yano, Kazuki Omo, Jeroen van der Ham
, Toshihiro Yamauchi
:
Security Risk Indicator for Open Source Software to Measure Software Development Status. 143-156
Attacks and Defenses
- Hattan Althebeiti, Ran Gedawy, Ahod Alghuried, Daehun Nyang, David Mohaisen:

Defending AirType Against Inference Attacks Using 3D In-Air Keyboard Layouts: Design and Evaluation. 159-174 - Jaewoo Park, Hong Eun Ahn, Leo Hyun Park, Taekyoung Kwon:

Robust Training for Deepfake Detection Models Against Disruption-Induced Data Poisoning. 175-187 - Irshad Khan

, Young-Woo Kwon
:
Multi-class Malware Detection via Deep Graph Convolutional Networks Using TF-IDF-Based Attributed Call Graphs. 188-200 - Donghyun Kim

, Seungho Jeon
, Jiho Shin
, Jung Taek Seo
:
OCR Meets the Dark Web: Identifying the Content Type Regarding Illegal and Cybercrime. 201-212 - Hattan Althebeiti

, David Mohaisen
:
Enriching Vulnerability Reports Through Automated and Augmented Description Summarization. 213-227
Hardware and Software Security
- Seon Ha

, Hyungon Moon
:
Protecting Kernel Code Integrity with PMP on RISC-V. 231-243 - Seungyeon Bae, Taehun Kim, Woomin Lee, Youngjoo Shin:

Exploiting Memory Page Management in KSM for Remote Memory Deduplication Attack. 244-256 - Yonggon Park

, Youngjoo Ko
, Jong Kim
:
Mutation Methods for Structured Input to Enhance Path Coverage of Fuzzers. 257-268 - Ryo Watanabe, Nasratullah Ghafoori

, Atsuko Miyaji
:
Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha. 269-281 - Seungho Jeon

, Jung Taek Seo
:
SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis. 282-293
Post-Quantum Cryptography and Quantum Cryptanalysis
- Harashta Tatimma Larasati

, Howon Kim
:
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves. 297-309 - Wonwoong Kim

, Yeajun Kang
, Hyunji Kim
, Kyungbae Jang
, Hwajeong Seo
:
PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm. 310-323 - Minjoo Sim

, Hyeokdong Kwon
, Siwoo Eum
, Gyeongju Song
, Minwoo Lee
, Hwajeong Seo
:
Efficient Implementation of the Classic McEliece on ARMv8 Processors. 324-337 - Hyeokdong Kwon

, Minjoo Sim
, Gyeongju Song
, Minwoo Lee
, Hwajeong Seo
:
Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach. 338-348

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














