Skip to main content
  • Conference proceedings
  • © 2019

Information Security Applications

19th International Conference, WISA 2018, Jeju Island, Korea, August 23–25, 2018, Revised Selected Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 11402)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): WISA: International Conference on Information Security Applications

Conference proceedings info: WISA 2018.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

    Pages i-x
  2. Short Papers

    1. Front Matter

      Pages 1-1
    2. HapticPoints: The Extended PassPoints Graphical Password

      • Trust Ratchasan, Rungrat Wiangsripanawan
      Pages 16-28
    3. ADSaS: Comprehensive Real-Time Anomaly Detection System

      • Sooyeon Lee, Huy Kang Kim
      Pages 29-41
    4. One-Pixel Adversarial Example that Is Safe for Friendly Deep Neural Networks

      • Hyun Kwon, Yongchul Kim, Hyunsoo Yoon, Daeseon Choi
      Pages 42-54
    5. Efficient Ate-Based Pairing over the Attractive Classes of BN Curves

      • Yuki Nanjo, Md. Al-Amin Khandaker, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami
      Pages 55-67
    6. A Study on the Vulnerability Assessment for Digital I&C System in Nuclear Power Plant

      • SungCheol Kim, IeckChae Euom, ChangHyun Ha, JooHyoung Lee, BongNam Noh
      Pages 68-80
    7. Parallel Implementations of CHAM

      • Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim
      Pages 93-104
    8. Logarithm Design on Encrypted Data with Bitwise Operation

      • Joon Soo Yoo, Baek Kyung Song, Ji Won Yoon
      Pages 105-116
  3. Analysis and Visualization of Threats

    1. Front Matter

      Pages 171-171
    2. AlertVision: Visualizing Security Alerts

      • Jina Hong, JinKi Lee, HyunKyu Lee, YoonHa Chang, KwangHo Choi, Sang Kil Cha
      Pages 173-184
    3. Threat Modeling and Analysis of Voice Assistant Applications

      • Geumhwan Cho, Jusop Choi, Hyoungshick Kim, Sangwon Hyun, Jungwoo Ryoo
      Pages 197-209

Other Volumes

  1. Information Security Applications

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Information Security Applications, WISA 2018, held on Jeju Island, Korea, in August 2018. The 11 revised full papers and 11 short papers presented in this volume were carefully reviewed and selected from 44 submissions.  #The primary focus of WISA 2018 was on systems and network security including all other technical and practical aspects of security applications and also on the embedded, unmanned or autonomous systems and cyber physical systems in general.

Editors and Affiliations

  • Korea Advanced Institute of Science and Technology, Daejeon, Korea (Republic of)

    Brent ByungHoon Kang, JinSoo Jang

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access