Abstract is missing.
- Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, RevisitedHwajeong Seo, Taehwan Park, Janghyun Ji, Howon Kim. 3-15 [doi]
- Exposing Digital Forgeries by Detecting a Contextual Violation Using Deep Neural NetworksJong-Uk Hou, Han-Ul Jang, Jin Seok Park, Heung-Kyu Lee. 16-24 [doi]
- Robust 3D Mesh Watermarking Scheme for an Anti-Collusion Fingerprint CodeJong-Uk Hou, In-Jae Yu, Hyun-Ji Song, Heung-Kyu Lee. 25-35 [doi]
- The Search Successive Minima Problem Is Equivalent to Its Optimization VersionHaoyu Li, Yanbin Pan. 39-50 [doi]
- An Improved Algorithm to Solve the Systems of Univariate Modular EquationsJingguo Bi, Mingqiang Wang, Wei Wei. 51-60 [doi]
- 2TR: Offline Off-the-Record (OTR) MessagingMahdi Daghmehchi Firoozjaei, Sangmin Lee, Hyoungshick Kim. 61-71 [doi]
- ARM/NEON Co-design of Multiplication/SquaringHwajeong Seo, Taehwan Park, Janghyun Ji, Zhi Hu, Howon Kim. 72-84 [doi]
- WheelLogger: Driver Tracing Using Smart WatchJoon Young Park, Jong Pil Yun, Dong Hoon Lee 0001. 87-100 [doi]
- Evolution of Spamming Attacks on FacebookMinsu Lee, Hyun-Gu Lee, Ji Sun Shin. 101-111 [doi]
- Model Parameter Estimation and Inference on Encrypted Domain: Application to Noise Reduction in Encrypted ImagesSaetbyeol Lee, Jiwon Yoon. 115-126 [doi]
- Breaking Text CAPTCHA by Repeated InformationJae Hyeon Woo, Moosung Park, Kyungho Lee. 127-136 [doi]
- Automatic Mitigation of Kernel Rootkits in Cloud EnvironmentsJonathan Grimm, Irfan Ahmed, Vassil Roussev, Manish Bhatt, Manpyo Hong. 137-149 [doi]
- Glitch Recall: A Hardware Trojan Exploiting Natural Glitches in Logic CircuitsJungwoo Joh, Yezee Seo, Hoon-Kyu Kim, Taekyoung Kwon. 150-161 [doi]
- Design and Implementation of Android Container Monitoring Server and AgentKwon-Jin Yoon, Jaehyeon Yoon, Souhwan Jung. 162-172 [doi]
- Improved EM Side-Channel Authentication Using Profile-Based XOR ModelMomoka Kasuya, Kazuo Sakiyama. 173-183 [doi]
- Holistic Tracking of Products on the Blockchain Using NFC and Verified UsersVanesco A. J. Boehm, Jong Kim 0001, James Won-Ki Hong. 184-195 [doi]
- Abusing TCP Retransmission for DoS Attack Inside Virtual NetworkSon Duc Nguyen, Mamoru Mimura, Hidema Tanaka. 199-211 [doi]
- Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep LearningMuhamad Erza Aminanto, Kwangjo Kim. 212-223 [doi]
- Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking IncidentMookyu Park, Moosung Park, Kyungho Lee. 224-235 [doi]
- A Protection Technique for Screen Image-Based Authentication Protocols Utilizing the SetCursorPos FunctionInsu Oh, Kyungroul Lee, Kangbin Yim. 236-245 [doi]
- A General Two-Server Cryptosystem Supporting Complex QueriesSha Ma, Yunhao Ling. 249-260 [doi]
- Efficient Software Implementation of Modular Multiplication in Prime Fields on TI's DSP TMS320C6678Eito Miyamoto, Takeshi Sugawara, Kazuo Sakiyama. 261-273 [doi]
- Key Managements of Underwater Acoustic Communication EnvironmentsHyunki Kim, Jae-Hoon Lee, Okyeon Yi. 274-282 [doi]
- Parallel Implementations of SIMON and SPECK, RevisitedTaehwan Park, Hwajeong Seo, Garam Lee, Md. Al-Amin Khandaker, Yasuyuki Nogami, Howon Kim. 283-294 [doi]
- Detecting Online Game Chargeback Fraud Based on Transaction Sequence Modeling Using Recurrent Neural NetworkNamsup Lee, Hyunsoo Yoon, Daeseon Choi. 297-309 [doi]
- The Digits Hidden in the Virtual World: Approximate Estimation Applying Capture and RecaptureDa Mi Hwang, In-Seok Kim. 310-322 [doi]
- Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-AdvisorsKeun-Young Lee, Hun Yeong Kwon, Jong In Lim. 323-335 [doi]