Abstract is missing.
- Security Analysis of Mobile Web Browser Hardware Accessibility: Study with Ambient Light SensorsSangHak Lee, Sangwoo Ji, Jong Kim 0001. 3-15 [doi]
- HapticPoints: The Extended PassPoints Graphical PasswordTrust Ratchasan, Rungrat Wiangsripanawan. 16-28 [doi]
- ADSaS: Comprehensive Real-Time Anomaly Detection SystemSooyeon Lee, Huy Kang Kim. 29-41 [doi]
- One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural NetworksHyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi. 42-54 [doi]
- Efficient Ate-Based Pairing over the Attractive Classes of BN CurvesYuki Nanjo, Md. Al-Amin Khandaker, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami. 55-67 [doi]
- A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power PlantSungcheol Kim, IeckChae Euom, ChangHyun Ha, Joohyoung Lee, BongNam Noh. 68-80 [doi]
- IP Address Mutation Scheme Using Vector Projection for Tactical Wireless NetworksJong Kwan Lee. 81-92 [doi]
- Parallel Implementations of CHAMHwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim. 93-104 [doi]
- Logarithm Design on Encrypted Data with Bitwise OperationJoon Soo Yoo, Baek Kyung Song, Ji Won Yoon. 105-116 [doi]
- Network Deployments of Bitcoin Peers and Malicious Nodes Based on Darknet SensorMitsuyoshi Imamura, Kazumasa Omote. 117-128 [doi]
- VODKA: Virtualization Obfuscation Using Dynamic Key ApproachJae-Yung Lee, Jae Hyuk Suk, Dong-Hoon Lee. 131-145 [doi]
- Reliable Rowhammer Attack and Mitigation Based on Reverse Engineering Memory Address Mapping AlgorithmsSaeyoung Oh, Jong Kim 0001. 146-158 [doi]
- A Study on Analyzing Risk Scenarios About Vulnerabilities of Security Monitoring System: Focused on Information Leakage by InsiderKunwoo Kim, Jungduk Kim. 159-170 [doi]
- AlertVision: Visualizing Security AlertsJina Hong, JinKi Lee, Hyunkyu Lee, YoonHa Chang, KwangHo Choi, Sang Kil Cha. 173-184 [doi]
- A New Bayesian Approach to Exploring Damaged Assets by Monitoring Mission Failures Caused by Undetected AttackShinwoo Shim, Ji Won Yoon. 185-196 [doi]
- Threat Modeling and Analysis of Voice Assistant ApplicationsGeumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo. 197-209 [doi]
- Secure Comparison Protocol with Encrypted Output and the Computation for Proceeding 2 Bits-by-2 BitsTakumi Kobayashi, Keisuke Hakuta. 213-228 [doi]
- Blockchain-Based Decentralized Key Management System with Quantum ResistanceHyeongcheol An, Rakyong Choi, Kwangjo Kim. 229-240 [doi]
- A Construction of a Keyword Search to Allow Partial Matching with a Block CipherYuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami. 241-252 [doi]
- Compact LEA and HIGHT Implementations on 8-Bit AVR and 16-Bit MSP ProcessorsHwajeong Seo, Kyuhwang An, Hyeokdong Kwon. 253-265 [doi]