Overview
- Ilsun You
Soonchunhyang University, Asan, Korea (Republic of)
You can also search for this editor inPubMed Google Scholar
Part of the book series:Lecture Notes in Computer Science (LNCS, volume 11897)
Part of the book sub series:Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: WISA 2019.
This is a preview of subscription content,log in via an institution to check access.
Access this book
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions.
The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues.
Similar content being viewed by others
Keywords
- formal methods and theory of security
- security services
- software and application security
- network security
- intrusion/anomaly detection and malware mitigation
- system security
- database and storage security
- security in hardware
- internet
- computer security
- data security
- computer networks
- cryptography
- network protocols
- authentication
- engineering
- signal processing
- computer hardware
- privacy
- mathematics
Table of contents (28 papers)
Front Matter
Pages i-xiiiApplication and Game Security
Front Matter
Pages 1-1Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
- Kyung Ho Park, Eunjo Lee, Huy Kang Kim
Pages 3-13Turn On the Lights: User Behavior in Game Environment Using CPTED
- Jeongeun Seo, Minhee Joo, Kyungho Lee
Pages 14-24QR Code Watermarking for Digital Images
- Yang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim
Pages 25-37
Network Security and Blockchain
Front Matter
Pages 39-39FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking
- Hyuntae Kim, Seongil Wi, Hyunjoo Lee, Sooel Son
Pages 41-54DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN
- Goksel Simsek, Hakan Bostan, Alper Kaan Sarica, Egemen Sarikaya, Alperen Keles, Pelin Angin et al.
Pages 55-66A Secure and Self-tallying E-voting System Based on Blockchain
- Gongxian Zeng, Meiqi He, Siu Ming Yiu
Pages 67-76
Cryptography
Front Matter
Pages 77-77An Extended CTRT for AES-256
- SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani et al.
Pages 79-91A Blind Ring Signature Based on the Short Integer Solution Problem
- Huy Quoc Le, Dung Hoang Duong, Willy Susilo
Pages 92-111A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
- Jia-Ch’ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa
Pages 112-125Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR
- Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama
Pages 126-140Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing
- Hao-Tian Wu, Yiu-ming Cheung, Zhenwei Zhuang, Shaohua Tang
Pages 141-154Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression
- Mi Yeon Hong, Ji Won Yoon
Pages 155-166Secret Sharing on Evolving Multi-level Access Structure
- Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai
Pages 180-191Strengthened PAKE Protocols Secure Against Malicious Private Key Generator
- SeongHan Shin
Pages 192-205Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof
- Jongkil Kim, Joonsang Baek, Willy Susilo, Yang-Wai Chow
Pages 206-216
Other volumes
Information Security Applications
Editors and Affiliations
Soonchunhyang University, Asan, Korea (Republic of)
Ilsun You
Bibliographic Information
Book Title:Information Security Applications
Book Subtitle:20th International Conference, WISA 2019, Jeju Island, South Korea, August 21–24, 2019, Revised Selected Papers
Editors:Ilsun You
Series Title:Lecture Notes in Computer Science
DOI:https://doi.org/10.1007/978-3-030-39303-8
Publisher:Springer Cham
eBook Packages:Computer Science,Computer Science (R0)
Copyright Information:Springer Nature Switzerland AG 2020
Softcover ISBN:978-3-030-39302-1Published: 25 January 2020
eBook ISBN:978-3-030-39303-8Published: 24 January 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number:1
Number of Pages:XIII, 384
Number of Illustrations:75 b/w illustrations, 53 illustrations in colour
Topics:Systems and Data Security,Information Systems and Communication Service,Computer Communication Networks,Computing Milieux,Cryptology,Artificial Intelligence