Results 1-10 of 12 (Search time: 0.003 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
RecurFI: 윈도우 바이너리에 대한 효율적 제어흐름 무결성 검사 시스템 홍진아; Cha, Sang Kil; Kim, Kwangjo, 정보보호학회 동계학술대회, 한국정보보호학회, 2016-12-03 | |
Lattice-based Multi-signature with Linear Homomorphism Choi, Rakyong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-19 | |
A Theoretical Approach to Bayesian Cryptanalysis Biswas, Bhaskar; Bhattacharya, Sourabh; Kim, Kwangjo, 2016년 한국정보보호학회 하계학술대회 (CISC-S'16), pp.425 - 428, 한국정보보호학회, 2016-06-23 | |
Deep Learning in Intrusion Detection System: An Overview Aminanto, Erza; Kim, Kwangjo, 2016 International Research Conference on Engineering and Technology (2016 IRCET), v.0, Higher Education Forum, 2016-06 | |
A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN Ahn, Soohyun; Kim, Hakju; Jeong, Jeseong; Kim, Kwangjo, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-22 | |
Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks Kim, Kyung Min; Hong, Jina; Kim, Kwangjo; Yoo, Paul, 2016 Symposium on Cryptography and Information Security (SCIS 2016), v.0, The Institute of Electronics, Information and Communication Engineers (IEICE), 2016-01-20 | |
How Cryptography has been advanced in Korea - Know the past well, then understand the present Kim, Kwangjo, International Conference for KMS 70th Anniversary, Korean Mathematical Society (KMS), 2016-10 | |
Revocable Decentralized Multi-Authority Functional Encryption Tsuchida, Hikaru; Nishide, Takashi; Okamoto, Eiji; Kim, Kwangjo, 17th International Conference on Cryptology in India (Indocrypt 2016), pp.248 - 265, Cryptology Research Society of India, 2016-12-13 | |
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach Muhamad Erza, Aminanto; Kim, Kwangjo, 17th World Conference on Information Security Applications (WISA 2016), pp.136 - 147, Korea Institute of Information Security and Cryptology (KIISC), 2016-08-25 | |
Another Dummy Generation Technique in Location-Based Services Do, Hyo Jin; Jeong, Young Seob; Choi, Ho Jin; Kim, Kwangjo, 2016 International Conference on Big Data and Smart Computing (BigComp2016), pp.532 - 538, Korean Institute of Information Scientists and Engineers (KIISE), 2016-01-18 |
Discover