Abstract is missing.
- Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTMKyung Ho Park, Eunjo Lee, Huy Kang Kim. 3-13 [doi]
- Turn On the Lights: User Behavior in Game Environment Using CPTEDJeongeun Seo, Minhee Joo, Kyungho Lee. 14-24 [doi]
- QR Code Watermarking for Digital ImagesYang-Wai Chow, Willy Susilo, Joonsang Baek, Jongkil Kim. 25-37 [doi]
- FSF: Code Coverage-Driven Fuzzing for Software-Defined NetworkingHyuntae Kim, SeongIl Wi, Hyunjoo Lee, Sooel Son. 41-54 [doi]
- DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDNGoksel Simsek, Hakan Bostan, Alper Kaan Sarica, Egemen Sarikaya, Alperen Keles, Pelin Angin, Hande Alemdar, Ertan Onur. 55-66 [doi]
- A Secure and Self-tallying E-voting System Based on BlockchainGongxian Zeng, Meiqi He, Siu-Ming Yiu. 67-76 [doi]
- An Extended CTRT for AES-256SeongHan Shin, Shota Yamada 0001, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura. 79-91 [doi]
- A Blind Ring Signature Based on the Short Integer Solution ProblemHuy Quoc Le, Dung Hoang Duong, Willy Susilo. 92-111 [doi]
- A Note on the Invisibility and Anonymity of Undeniable Signature SchemesJia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa. 112-125 [doi]
- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLRMaharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama. 126-140 [doi]
- Reversible Data Hiding in Homomorphic Encrypted Images Without PreprocessingHao-Tian Wu, Yiu-ming Cheung, Zhenwei Zhuang, Shaohua Tang. 141-154 [doi]
- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear RegressionMiyeon Hong, Ji Won Yoon. 155-166 [doi]
- Timed-Release Encryption with Master Time Bound KeyGwangbae Choi, Serge Vaudenay. 167-179 [doi]
- Secret Sharing on Evolving Multi-level Access StructureSabyasachi Dutta, Partha Sarathi Roy 0001, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai. 180-191 [doi]
- Strengthened PAKE Protocols Secure Against Malicious Private Key GeneratorSeongHan Shin. 192-205 [doi]
- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle ProofJongkil Kim, Joonsang Baek, Willy Susilo, Yang-Wai Chow. 206-216 [doi]
- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNNs)Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse. 219-233 [doi]
- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural NetworkHyun Kwon, Hyunsoo Yoon, Ki-Woong Park. 234-246 [doi]
- A New Password Cracking Model with Generative Adversarial NetworksSungyup Nam, Seungho Jeon, Jongsub Moon. 247-258 [doi]
- Is It Possible to Hide My Key into Deep Neural Network?Taehyuk Kim, Taek-Young Youn, Dooho Choi. 259-272 [doi]
- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT DevicesSangjae Lee, Mi-Kyung Oh, YouSung Kang, Dooho Choi. 275-285 [doi]
- On the Automation of Security Testing for IoT Constrained ScenariosSara Nieves Matheu, Salvador Pérez, José Luis Hernández Ramos, Antonio F. Skarmeta. 286-298 [doi]
- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and AssessmentsJeman Park 0001, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla. 299-312 [doi]
- Ring-LWE on 8-Bit AVR Embedded ProcessorHwajeong Seo, Hyeokdong Kwon, Yongbeen Kwon, KyungHo Kim, Seungju Choi, Hyunjun Kim, Kyoungbae Jang. 315-327 [doi]
- Low-Noise LLC Side-Channel Attack with PerfYoungjoo Ko, Sangwoo Ji, Jong Kim 0001. 328-340 [doi]
- Optimized SIKE Round 2 on 64-bit ARMHwajeong Seo, Amir Jalali, Reza Azarderakhsh. 341-353 [doi]
- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in KoreaJinhee Lee, Younggee Hong, Hyunsoo Kwon, Junbeom Hur. 357-369 [doi]
- An SGX-Based Key Management Framework for Data Centric NetworkingMinkyung Park, Jeongnyeo Kim, Youngho Kim, Eunsang Cho, Soobin Park, Sungmin Sohn, Minhyeok Kang, Ted "Taekyoung" Kwon. 370-382 [doi]