Abstract is missing.
- Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block CipherShoichi Hirose. 3-15 [doi]
- Provably Secure Password-Authenticated Key Exchange Based on SIDHTheo Fanuela Prabowo, Chik-How Tan. 16-28 [doi]
- Group Signatures with Designated Traceability over Openers' Attributes in Bilinear GroupsHiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa. 29-43 [doi]
- Grover on SPARKLEYujin Yang, Kyungbae Jang, HyunJi Kim, Gyeongju Song, Hwajeong Seo. 44-59 [doi]
- Quality-of-Service Degradation in Distributed Instrumentation Systems Through Poisoning of 5G Beamforming AlgorithmsBorja Bordel, Ramón Alcarria, Joaquín Chung, Rajkumar Kettimuthu, Tomás Robles 0001, Iván Armuelles. 63-76 [doi]
- An Effective Approach for Stepping-Stone Intrusion Detection Using Packet CrossoverLixin Wang, Jianhua Yang, Austin Lee. 77-88 [doi]
- Software-Defined Network Based Secure Internet-Enabled Video Surveillance SystemMathew Del Castillo, Harvey Hermosa, Philip Virgil Astillo, Gaurav Choudhary, Nicola Dragoni. 89-101 [doi]
- TLS Goes Low Cost: When TLS Meets EdgeIntae Kim, Willy Susilo, Joonsang Baek, Jongkil Kim, Yang-Wai Chow. 102-113 [doi]
- 5G-AKA, RevisitedSeongHan Shin. 114-127 [doi]
- Membership Privacy for Asynchronous Group MessagingKeita Emura, Kaisei Kajita, Ryo Nojima, Kazuto Ogawa, Go Ohtake. 131-142 [doi]
- On Membership Inference Attacks to Generative Language Models Across Language DomainsMyung Gyo Oh, Leo Hyun Park, Jaeuk Kim, Jaewoo Park, Taekyoung Kwon 0002. 143-155 [doi]
- A Joint Framework to Privacy-Preserving Edge Intelligence in Vehicular NetworksMuhammad Firdaus, Kyung Hyune Rhee. 156-167 [doi]
- Recovering Yaw Rate from Signal Injection Attack to Protect RV's DirectionHyunsu Cho, SunWoo Lee, Wonsuk Choi, Dong-Hoon Lee. 171-184 [doi]
- A Survey on Sensor False Data Injection Attacks and Countermeasures in Cyber-Physical and Embedded SystemsJinhong Choi, Yeongjin Jang. 185-203 [doi]
- Dazzle-attack: Anti-Forensic Server-side Attack via Fail-Free Dynamic State MachineBora Lee, Kyungchan Lim, Jiho Lee, Chijung Jung, Doowon Kim, Kyu Hyung Lee, Haehyun Cho, Yonghwi Kwon 0001. 204-221 [doi]
- vkTracer: Vulnerable Kernel Code Tracing to Generate Profile of Kernel VulnerabilityHiroki Kuzuno, Toshihiro Yamauchi. 222-234 [doi]
- ARMing-Sword: Scabbard on ARMHyeokdong Kwon, Hyunjun Kim, Minjoo Sim, Siwoo Eum, Minwoo Lee, Wai-Kong Lee, Hwajeong Seo. 237-250 [doi]
- Optimized Implementation of Quantum Binary Field Multiplication with Toffoli Depth OneKyungbae Jang, Won-Woong Kim, Sejin Lim, Yeajun Kang, Yujin Yang, Hwajeong Seo. 251-264 [doi]
- Time-Optimal Design of Finite Field Arithmetic for SIKE on Cortex-M4Mila Anastasova, Reza Azarderakhsh, Mehran Mozaffari Kermani. 265-276 [doi]
- Analysis of Radioactive Decay Based Entropy Generator in the IoT EnvironmentsTaewan Kim, Seyoon Lee, Seunghwan Yun, Jongbum Kim, Okyeon Yi. 277-288 [doi]
- A Novel Metric for Password Security Risk Against Dictionary AttacksBinh Le Thanh Thai, Hidema Tanaka. 291-302 [doi]
- Towards Evaluating the Security of Human Computable Passwords Using Neural NetworksIssei Murata, Pengju He, Yujie Gu, Kouichi Sakurai. 303-312 [doi]
- Markov Decision Process for Automatic Cyber DefenseXiaofan Zhou, Simon Yusuf Enoch, Dong Seong Kim 0001. 313-329 [doi]
- Influence Through Cyber Capacity Building: Network Analysis of Assistance, Cooperation, and Agreements Among ASEAN Plus Three CountriesYu-kyung Kim, Myong-Hyun Go, Kyungho Lee. 330-343 [doi]
- Chameleon DNN Watermarking: Dynamically Public Model Ownership VerificationWei Li, Xiaoyu Zhang, Shen Lin, Xinbo Ban, Xiaofeng Chen. 344-356 [doi]