menu 简单麦麦
account_circle

信息安全应用:第19届国际会议,WISA 2018,韩国济州岛,2018年8月23日至25日,修订精选论文-Information Security Applications: 19th Intern

帮助2580人找到了他们想要的文件
上传于 2020-03-06 49次下载 953次围观
文件编号:6721
文件详情
标题(title):Information Security Applications: 19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers
信息安全应用:第19届国际会议,WISA 2018,韩国济州岛,2018年8月23日至25日,修订精选论文
作者(author):Brent ByungHoon Kang, JinSoo Jang
出版社(publisher):Springer International Publishing
大小(size):17 MB (17633559 bytes)
格式(extension):pdf
注意:如果文件下载完成后为无法打开的格式,请修改后缀名为格式对应后缀


This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Information Security Applications, WISA 2018, held on Jeju Island, Korea, in August 2018. The 11 revised full papers and 11 short papers presented in this volume were carefully reviewed and selected from 44 submissions. #The primary focus of WISA 2018 was on systems and network security including all other technical and practical aspects of security applications and also on the embedded, unmanned or autonomous systems and cyber physical systems in general.

Table of contents :
Front Matter ....Pages i-x
Front Matter ....Pages 1-1
Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light Sensors (Sanghak Lee, Sangwoo Ji, Jong Kim)....Pages 3-15
HapticPoints: The Extended PassPoints Graphical Password (Trust Ratchasan, Rungrat Wiangsripanawan)....Pages 16-28
ADSaS: Comprehensive Real-Time Anomaly Detection System (Sooyeon Lee, Huy Kang Kim)....Pages 29-41
One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks (Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi)....Pages 42-54
Efficient Ate-Based Pairing over the Attractive Classes of BN Curves (Yuki Nanjo, Md. Al-Amin Khandaker, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami)....Pages 55-67
A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power Plant (SungCheol Kim, IeckChae Euom, ChangHyun Ha, JooHyoung Lee, BongNam Noh)....Pages 68-80
IP Address Mutation Scheme Using Vector Projection for Tactical Wireless Networks (Jong-Kwan Lee)....Pages 81-92
Parallel Implementations of CHAM (Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim)....Pages 93-104
Logarithm Design on Encrypted Data with Bitwise Operation (Joon Soo Yoo, Baek Kyung Song, Ji Won Yoon)....Pages 105-116
Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet Sensor (Mitsuyoshi Imamura, Kazumasa Omote)....Pages 117-128
Front Matter ....Pages 129-129
VODKA: Virtualization Obfuscation Using Dynamic Key Approach (Jae-Yung Lee, Jae Hyuk Suk, Dong Hoon Lee)....Pages 131-145
Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping Algorithms (Saeyoung Oh, Jong Kim)....Pages 146-158
A Study on Analyzing Risk Scenarios About Vulnerabilities of Security Monitoring System: Focused on Information Leakage by Insider (Kunwoo Kim, Jungduk Kim)....Pages 159-170
Front Matter ....Pages 171-171
AlertVision: Visualizing Security Alerts (Jina Hong, JinKi Lee, HyunKyu Lee, YoonHa Chang, KwangHo Choi, Sang Kil Cha)....Pages 173-184
A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected Attack (Shinwoo Shim, Ji Won Yoon)....Pages 185-196
Threat Modeling and Analysis of Voice Assistant Applications (Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo)....Pages 197-209
Front Matter ....Pages 211-211
Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 Bits (Takumi Kobayashi, Keisuke Hakuta)....Pages 213-228
Blockchain-Based Decentralized Key Management System with Quantum Resistance (Hyeongcheol An, Rakyong Choi, Kwangjo Kim)....Pages 229-240
A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher (Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami)....Pages 241-252
Compact LEA and HIGHT Implementations on 8-Bit AVR and 16-Bit MSP Processors (Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon)....Pages 253-265
Back Matter ....Pages 267-267
下载方式
购买后可查看 购买按钮在底部

常见问题

  • question_answer
    解压密码,提取码在哪?
    keyboard_arrow_down
    • 均在下载旁边哦,请注意查看,如果没有则是不需要密码
  • question_answer
    文件不符合描述怎么办?
    keyboard_arrow_down
    • 如果有文件问题,可以通过 卖家联系方式 联系卖家,如果 联系不上卖家 或 卖家无法解决则可以在我的订单页面申请售后
  • question_answer
    其他
    keyboard_arrow_down
    • 3.本文件为公益分享,文件由网上采集而来,如有侵权等问题,请及时联系客服删除
      常见问题及官方客服联系方式:点击前往
      售后问题处理方式:点击前往
-到底部了哦-
微信扫码支付
信息安全应用:第19届国际会议,WISA 2018,韩国济州岛,2018年8月23日至25日,修订精选论文-Information Security Applications: 19th Intern
支付金额: 共计:¥0.0

添加收藏

创建新合集