Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 12 (Search time: 0.005 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템

홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03

2
Lattice-based Multi-signature with Linear Homomorphism

Choi, Rakyong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-19

3
A Theoretical Approach to Bayesian Cryptanalysis

Biswas, Bhaskar; Bhattacharya, Sourabh; Kim, Kwangjo, 2016년 한국정보보호학회 하계학술대회 (CISC-S'16), pp.425 - 428, 한국정보보호학회, 2016-06-23

4
Deep Learning in Intrusion Detection System: An Overview

Aminanto, Erza; Kim, Kwangjo, 2016 International Research Conference on Engineering and Technology (2016 IRCET), v.0, Higher Education Forum, 2016-06

5
A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN

Ahn, Soohyun; Kim, Hakju; Jeong, Jeseong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-22

6
Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks

Kim, Kyung Min; Hong, Jina; Kim, Kwangjo; Yoo, Paul, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20

7
How Cryptography has been advanced in Korea - Know the past well, then understand the present

Kim, Kwangjo, International Conference for KMS 70th Anniversary, Korean Mathematical Society (KMS), 2016-10

8
Revocable Decentralized Multi-Authority Functional Encryption

Tsuchida, Hikaru; Nishide, Takashi; Okamoto, Eiji; Kim, Kwangjo, 17th International Conference on Cryptology in India (Indocrypt 2016), pp.248 - 265, Cryptology Research Society of India, 2016-12-13

9
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach

Muhamad Erza, Aminanto; Kim, Kwangjo, 17th World Conference on Information Security Applications (WISA 2016), pp.136 - 147, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25

10
Another Dummy Generation Technique in Location-Based Services

Do, Hyo Jin; Jeong, Young Seob; Choi, Ho Jin; Kim, Kwangjo, 2016 International Conference on Big Data and Smart Computing (BigComp2016), pp.532 - 538, Korean Institute of Information Scientists and Engineers (KIISE), 2016-01-18

rss_1.0 rss_2.0 atom_1.0