


default search action
13th AsiaJCIS 2018: Guilin, China
- 13th Asia Joint Conference on Information Security, AsiaJCIS 2018, Guilin, China, August 8-9, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7380-5

Session 1: Cyber Security
- Taewoong Kwon, Jungsuk Song, Sangsu Choi, Yunsoo Lee, Jinhak Park:

VISNU: A Novel Visualization Methodology of Security Events Optimized for a Centralized SOC. 1-7 - Mariko Fujimoto, Wataru Matsuda, Takuho Mitsunaga

:
Protecting Struts 2 from OGNL Related Attacks by Using Servlet Filter. 8-14 - Hironori Imai, Akira Kanaoka:

Time Series Analysis of Copy-and-Paste Impact on Android Application Security. 15-22
Session 2: Cryptographic Protocols
- Hibiki Ono, Yoshifumi Manabe:

Efficient Card-Based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations. 23-28 - Yaqing Liao, Jing Zhou, Yang Yang, Ou Ruan:

An Efficient Oblivious Transfer Protocol with Access Control. 29-34 - Chun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, Jheng-Jia Huang:

Transformation between Attribute-Based Encryption and Key-Aggregate Cryptosystem. 35-41
Session 3: Social Aspects
- Ming Xu, Yu Cheng, QiXin Yin:

Toward a Resilient System: The Inspiration from Information Security Management Appliance. 42-46 - Tatsuya Midorikawa, Akihiro Tachikawa, Akira Kanaoka:

Helping Johnny to Search: Encrypted Search on Webmail System. 47-53 - Junfeng Tian, Lizheng Xue, Hongyun Cai:

An Algorithm Based on Influence to Predict Invisible Relationship. 54-61 - Ji Hye Kim, Mee Yeon Kim, Heung Youl Youm:

Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial Sector. 62-68
Session 4: Low-Level Security
- Jing Ge, Yifan Xu, Ruiqian Liu, Enze Si, Ning Shang, An Wang:

Power Attack and Protected Implementation on Lightweight Block Cipher SKINNY. 69-74 - Junfeng Tian, Yanwei Ma:

Load Balancing Method Based on a Performance and Power Ratio. 75-82 - Jingyuan Wang, Peidai Xie, Yongjun Wang, Zelin Rong:

A Survey of Return-Oriented Programming Attack, Defense and Its Benign Use. 83-88
Session 5: Analyzing Malicious Activities
- Ryoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue:

Evaluating Disassembly-Code Based Similarity between IoT Malware Samples. 89-94 - Tomohiro Shigemoto, Shota Fujii, Ichiro Kuriama, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi:

Development of White List Based Autonomous Evolution of Defense System for RAT Malware. 95-101 - Yu Tsuda, Junji Nakazato, Yaichiro Takagi, Daisuke Inoue, Koji Nakao, Kenjiro Terada:

A Lightweight Host-Based Intrusion Detection Based on Process Generation Patterns. 102-108 - Hiroki Kuzuno, Shun Inagaki, Kenichi Magata:

Constructing a Complete Timeline of a Security Incident by Aggregating Reports. 109-115

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














