Abstract is missing.
- M-ORAM: A Matrix ORAM with Log N Bandwidth CostSteven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin. 3-15 [doi]
- Process Variation Evaluation Using RO PUF for Enhancing SCA-Resistant Dual-Rail ImplementationWei He, Dirmanto Jap, Alexander Herrmann. 16-27 [doi]
- Compact Implementations of LEA Block Cipher for Low-End MicroprocessorsHwajeong Seo, Zhe Liu 0001, Jongseok Choi, Taehwan Park, Howon Kim. 28-40 [doi]
- Compact Implementations of LSHTaehwan Park, Hwajeong Seo, Zhe Liu 0001, Jongseok Choi, Howon Kim. 41-53 [doi]
- Detection of Rogue Devices in WLAN by Analyzing RF Features and Indoor Location of the DeviceHyeokchan Kwon, Kwangil Lee, Gaeil An, Byung-Ho Chung, Jeong-Nyeo Kim. 54-61 [doi]
- Security Analysis on RFID Mutual Authentication ProtocolYou Sung Kang, Elizabeth O'Sullivan, Dooho Choi, Máire O'Neill. 65-74 [doi]
- How Much Randomness Can Be Extracted from Memoryless Shannon Entropy Sources?Maciej Skorski. 75-86 [doi]
- Two Types of Special Bases for Integral LatticesRenzhang Liu, Yanbin Pan. 87-95 [doi]
- Keyword Updatable PEKSHyun Sook Rhee, Dong-Hoon Lee. 96-109 [doi]
- On Partitioning Secret Data Based on Concept of Functional SafetySeira Hidano, Shinsaku Kiyomoto. 110-121 [doi]
- Unbounded Hierarchical Identity-Based Encryption with Efficient RevocationGeumsook Ryu, Kwangsu Lee, Seunghwan Park, Dong-Hoon Lee. 122-133 [doi]
- Publishing Graph Data with Subgraph Differential PrivacyBinh P. Nguyen, Hoa Ngo, Jihun Kim, Jong Kim. 134-145 [doi]
- An Improved Analysis of Broadcast Attacks on the GGH CryptosystemMaoning Wang. 146-158 [doi]
- Secure Binary Field MultiplicationHwajeong Seo, Chien-Ning Chen, Zhe Liu 0001, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim. 161-173 [doi]
- An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected AES -Hyunjin Ahn, Neil Hanley, Máire O'Neill, Dong-Guk Han. 174-186 [doi]
- Various Threat Models to Circumvent Air-Gapped Systems for Preventing Network AttackEunchong Lee, Hyunsoo Kim, Ji Won Yoon. 187-199 [doi]
- An Improved Masking Scheme for S-Box Software ImplementationsSungjun Ahn, Dooho Choi. 200-212 [doi]
- Open Sesame! Hacking the PasswordHwajeong Seo, Zhe Liu 0001, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim. 215-226 [doi]
- BurnFit: Analyzing and Exploiting Wearable DevicesDongkwan Kim, Suwan Park, Kibum Choi, Yongdae Kim. 227-239 [doi]
- Security Analysis of FHSS-type Drone ControllerHocheol Shin, Kibum Choi, Young-Seok Park, Jaeyeong Choi, Yongdae Kim. 240-253 [doi]
- Encryption is Not Enough: Inferring User Activities on KakaoTalk with Traffic AnalysisKyungwon Park, Hyoungshick Kim. 254-265 [doi]
- Challenges in Deploying CoAP Over DTLS in Resource Constrained EnvironmentsHyeokjin Kwon, Jiye Park, Namhi Kang. 269-280 [doi]
- A Study of OAuth 2.0 Risk Notification and Token Revocation from Resource ServerJungsoo Park, Jinouk Kim, Minho Park, Souhwan Jung. 281-287 [doi]
- Cyber Security Considerations for Designing IoT-Based Control SystemsKwangho Kim. 288-299 [doi]
- Frying PAN: Dissecting Customized Protocol for Personal Area NetworkKibum Choi, Yunmok Son, Jangjun Lee, Suryeon Kim, Yongdae Kim. 300-312 [doi]
- Structured Design Approach for an Optimal Programmable Synchronous Security ProcessorMahmoud T. El-Hadidi, Hany El-Sayed, Heba Kamal Aslan, Karim Osama. 313-325 [doi]
- On Zero Knowledge Argument with PQT SoundnessGuifang Huang, Hongda Li. 326-335 [doi]
- Performance Analysis of Multiple Classifier System in DoS Attack DetectionBayu Adhi Tama, Kyung Hyune Rhee. 339-347 [doi]
- Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and JapanKwangho Kim, Sangdon Park, Jongin Lim. 348-356 [doi]
- Applying Recurrent Neural Network to Intrusion Detection with Hessian Free OptimizationJihyun Kim, Howon Kim. 357-369 [doi]
- Cost-Effective Modeling for Authentication and Its Application to Activity TrackerHiroya Susuki, Rie Shigetomi Yamaguchi. 373-385 [doi]
- Fully Batch Processing Enabled Memory Integrity Verification Algorithm Based on Merkle TreeSe Hwan Kim, Yonggon Kim, Ohmin Kwon, Hyunsoo Yoon. 386-398 [doi]
- Automatic Security Classification with LassoPaal E. Engelstad, Hugo Hammer, Kyrre Wahl Kongsgård, Anis Yazidi, Nils Agne Nordbotten, Aleksander Bai. 399-410 [doi]
- Constructing Efficient PAKE Protocols from Identity-Based KEM/DEMKyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon. 411-422 [doi]
- How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof ProtocolYunhui Zhuang, Gerhard P. Hancke, Duncan S. Wong. 423-435 [doi]