Search dblp for Publications

export results for "stream:conf/asiajcis:"

 download as .bib file

@inproceedings{DBLP:conf/asiajcis/HagiwaraO23,
  author       = {Kenta Hagiwara and
                  Kazumasa Omote},
  title        = {{VMI} System with Smart Contracts for Demand Forecasting},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00012},
  doi          = {10.1109/ASIAJCIS60284.2023.00012},
  timestamp    = {Mon, 22 Jan 2024 19:57:57 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HagiwaraO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HongXCG23,
  author       = {Sheng{-}Yi Hong and
                  Rui{-}Zhen Xu and
                  Po{-}Wen Chi and
                  Albert Guan},
  title        = {Privacy Preserving Provable Data Possession: {A} FHE-based Hash Approach},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {47--52},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00018},
  doi          = {10.1109/ASIAJCIS60284.2023.00018},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HongXCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangWTCCDL23,
  author       = {Jheng{-}Jia Huang and
                  Wei{-}Hsueh Wang and
                  Yi{-}Fan Tseng and
                  Guan{-}Yu Chen and
                  Hao{-}Hsiang Chang Chien and
                  Wen{-}Yan Dai and
                  Nai{-}Wei Lo},
  title        = {Anonymous and Unlinkable Identity Scheme in Open Data Environment},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {73--80},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00022},
  doi          = {10.1109/ASIAJCIS60284.2023.00022},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuangWTCCDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HyeonPY23,
  author       = {Da Eun Hyeon and
                  Jun Hyung Park and
                  Heung Youl Youm},
  title        = {A secure firmware and software update model based on blockchains for
                  Internet of Things devices using {SBOM}},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {53--58},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00019},
  doi          = {10.1109/ASIAJCIS60284.2023.00019},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HyeonPY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KawaharaMM23,
  author       = {Naoki Kawahara and
                  Atsuko Miyaji and
                  Tomoaki Mimoto},
  title        = {Privacy-Preserving Frequency Estimation Method},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {102--108},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00026},
  doi          = {10.1109/ASIAJCIS60284.2023.00026},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KawaharaMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KawanakaKMIHBTT23,
  author       = {Shota Kawanaka and
                  Yoshikatsu Kashiwabara and
                  Kohei Miyamoto and
                  Masazumi Iida and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  title        = {Packet-Level Intrusion Detection Using {LSTM} Focusing on Personal
                  Information and Payloads},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {88--94},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00024},
  doi          = {10.1109/ASIAJCIS60284.2023.00024},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KawanakaKMIHBTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LinHL23,
  author       = {Iuon{-}Chang Lin and
                  Jing{-}Yuan Huang and
                  Jason Lin},
  title        = {A Certificate Management Mechanism Using Distributed Ledger},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {66--72},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00021},
  doi          = {10.1109/ASIAJCIS60284.2023.00021},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LinHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MyungKKLKS23,
  author       = {Joonwoo Myung and
                  Youngmin Ko and
                  Taewoong Kwon and
                  Jun Lee and
                  Kyuil Kim and
                  Jung{-}suk Song},
  title        = {Intrusion Detection Systems Based on Machine Learning Using Feature
                  Expansion Methods},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {32--38},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00016},
  doi          = {10.1109/ASIAJCIS60284.2023.00016},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MyungKKLKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NagaiM23,
  author       = {Atsuki Nagai and
                  Atsuko Miyaji},
  title        = {Revisited linear approximation formula of ChaCha},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {95--101},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00025},
  doi          = {10.1109/ASIAJCIS60284.2023.00025},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NagaiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NishihiraIKOWKA23,
  author       = {Yuma Nishihira and
                  Takuya Ishibashi and
                  Yoshio Kakizaki and
                  Toshihiro Ohigashi and
                  Hidenobu Watanabe and
                  Tohru Kondo and
                  Reiji Aibara},
  title        = {Development of the Edge Computing Platform based on Modular Architecture
                  using Intel {SGX}},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {59--65},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00020},
  doi          = {10.1109/ASIAJCIS60284.2023.00020},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NishihiraIKOWKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Peng23,
  author       = {Kun Peng},
  title        = {Receipt-Freeness By Flexible Usage Of Mix Network},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00013},
  doi          = {10.1109/ASIAJCIS60284.2023.00013},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Peng23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsengHCWLCK23,
  author       = {Yi{-}Fan Tseng and
                  Jheng{-}Jia Huang and
                  Guan{-}Yu Chen and
                  Wei{-}Hsueh Wang and
                  Yi{-}Hsueh Lu and
                  Wen{-}Yi Chen and
                  Shih{-}Pei Kao},
  title        = {A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual
                  Membership},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {25--31},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00015},
  doi          = {10.1109/ASIAJCIS60284.2023.00015},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsengHCWLCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WenWDLYL23,
  author       = {Baodong Wen and
                  Yujue Wang and
                  Yong Ding and
                  Hai Liang and
                  Changsong Yang and
                  Decun Luo},
  title        = {Towards Privacy-Preserving and Practical Vaccine Supply Chain based
                  on Blockchain},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {39--46},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00017},
  doi          = {10.1109/ASIAJCIS60284.2023.00017},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WenWDLYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WuKY23,
  author       = {Che{-}Yu Wu and
                  Cheng{-}Chung Kuo and
                  Chu{-}Sing Yang},
  title        = {Phishing Detection with Browser Extension Based on Machine Learning},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {81--87},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00023},
  doi          = {10.1109/ASIAJCIS60284.2023.00023},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WuKY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/XuHCW23,
  author       = {Rui{-}Zhen Xu and
                  Sheng{-}Yi Hong and
                  Po{-}Wen Chi and
                  Ming{-}Hung Wang},
  title        = {A Revocation Key-based Approach Towards Efficient Federated Unlearning},
  booktitle    = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  pages        = {17--24},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023.00014},
  doi          = {10.1109/ASIAJCIS60284.2023.00014},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/XuHCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2023,
  title        = {18th Asia Joint Conference on Information Security, AsiaJCIS 2023,
                  Koganei, Japan, August 15-16, 2023},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/AsiaJCIS60284.2023},
  doi          = {10.1109/ASIAJCIS60284.2023},
  isbn         = {979-8-3503-4163-8},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/DingITL22,
  author       = {Yong Ding and
                  Ryoichi Isawa and
                  Raylin Tso and
                  Jun Lee},
  title        = {Message from the Program Co-Chairs: AsiaJCIS 2022},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {viii},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00006},
  doi          = {10.1109/ASIAJCIS57030.2022.00006},
  timestamp    = {Tue, 04 Apr 2023 15:43:16 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/DingITL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/DuJL22,
  author       = {Ruizhong Du and
                  Haoyu Jiang and
                  Mingyue Li},
  title        = {Lightweight Searchable Encryption with Small Clients on Edge Cloud},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {41--48},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00017},
  doi          = {10.1109/ASIAJCIS57030.2022.00017},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/DuJL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/IsawaKFTUAMMI22,
  author       = {Ryoichi Isawa and
                  Nobuyuki Kanaya and
                  Yoshitada Fujiwara and
                  Tatsuya Takehisa and
                  Hayato Ushimaru and
                  Dai Arisue and
                  Daisuke Makita and
                  Satoshi Mimura and
                  Daisuke Inoue},
  title        = {An {HDL} Simulator with Direct Register Access for Improving Code
                  Coverage},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {49--55},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00018},
  doi          = {10.1109/ASIAJCIS57030.2022.00018},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/IsawaKFTUAMMI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimK22,
  author       = {Yongsik Kim and
                  Huy Kang Kim},
  title        = {Bot-pelganger: Predict and Preserve Game Bots' Behavior},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {56--63},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00019},
  doi          = {10.1109/ASIAJCIS57030.2022.00019},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MaenoMM22,
  author       = {Yuta Maeno and
                  Atsuko Miyaji and
                  Hideaki Miyaji},
  title        = {Lattice-Based Accumulator with Efficient Updating},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {33--40},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00016},
  doi          = {10.1109/ASIAJCIS57030.2022.00016},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MaenoMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NdichuBTI22,
  author       = {Samuel Ndichu and
                  Tao Ban and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {Security-Alert Screening with Oversampling Based on Conditional Generative
                  Adversarial Networks},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00011},
  doi          = {10.1109/ASIAJCIS57030.2022.00011},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NdichuBTI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/PeiNYF22,
  author       = {Dingyi Pei and
                  Koji Nakao and
                  Heung Youl Youm and
                  Chun{-}I Fan},
  title        = {Message from the General Co-Chairs: AsiaJCIS 2022},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {vii},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00005},
  doi          = {10.1109/ASIAJCIS57030.2022.00005},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/PeiNYF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsengHYCW22,
  author       = {Yi{-}Fan Tseng and
                  Jheng{-}Jia Huang and
                  Hao{-}Yu Yang and
                  Tsung{-}Yu Chien and
                  Chieh{-}Han Wu},
  title        = {Cryptanalysis and Discussion on Two Attribute-Based Encryption Schemes},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {24--28},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00014},
  doi          = {10.1109/ASIAJCIS57030.2022.00014},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsengHYCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsengYWCTLH22,
  author       = {Yi{-}Fan Tseng and
                  Hao{-}Yu Yang and
                  Chieh{-}Han Wu and
                  Tsung{-}Yu Chien and
                  Raylin Tso and
                  Zi{-}Yuan Liu and
                  Jen{-}Chieh Hsu},
  title        = {Cryptanalysis to Ming et al.'s Revocable Multi-Authority Attribute-Based
                  Encryption},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {29--32},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00015},
  doi          = {10.1109/ASIAJCIS57030.2022.00015},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsengYWCTLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YanoKM22,
  author       = {Tomohiko Yano and
                  Hiroki Kuzuno and
                  Kenichi Magata},
  title        = {Constructing a Network Graph of File Tracking Results Against Information
                  Leakage},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {8--15},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00012},
  doi          = {10.1109/ASIAJCIS57030.2022.00012},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YanoKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YasuiISTYM22,
  author       = {Hiroki Yasui and
                  Takahiro Inoue and
                  Takayuki Sasaki and
                  Rui Tanabe and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {{SPOT:} Analyzing IoT Ransomware Attacks using Bare Metal {NAS} Devices},
  booktitle    = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  pages        = {16--23},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022.00013},
  doi          = {10.1109/ASIAJCIS57030.2022.00013},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YasuiISTYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2022,
  title        = {17th Asia Joint Conference on Information Security, AsiaJCIS 2022,
                  Baoding, China, July 15-16, 2022},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/AsiaJCIS57030.2022},
  doi          = {10.1109/ASIAJCIS57030.2022},
  isbn         = {978-1-6654-7392-7},
  timestamp    = {Tue, 04 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenO21,
  author       = {Zhaoheng Chen and
                  Kazumasa Omote},
  title        = {A Privacy Preserving Scheme with Dimensionality Reduction for Distributed
                  Machine Learning},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {45--50},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00017},
  doi          = {10.1109/ASIAJCIS53848.2021.00017},
  timestamp    = {Thu, 14 Oct 2021 16:38:35 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChoiLKKCS21,
  author       = {Ikje Choi and
                  Jun Lee and
                  Taewoong Kwon and
                  Kyuil Kim and
                  Yoonsu Choi and
                  Jungsuk Song},
  title        = {An Easy-to-use Framework to Build and Operate AI-based Intrusion Detection
                  for In-situ Monitoring},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00011},
  doi          = {10.1109/ASIAJCIS53848.2021.00011},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChoiLKKCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FujitaniEO21,
  author       = {Tomoki Fujitani and
                  Keita Emura and
                  Kazumasa Omote},
  title        = {A Privacy-Preserving Enforced Bill Collection System using Smart Contracts},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {51--60},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00018},
  doi          = {10.1109/ASIAJCIS53848.2021.00018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FujitaniEO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/IshibashiGHBTT21,
  author       = {Ryosuke Ishibashi and
                  Hiroki Goto and
                  Chansu Han and
                  Tao Ban and
                  Takeshi Takahashi and
                  Jun'ichi Takeuchi},
  title        = {Which Packet Did They Catch? Associating {NIDS} Alerts with Their
                  Communication Sessions},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {9--16},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00012},
  doi          = {10.1109/ASIAJCIS53848.2021.00012},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/IshibashiGHBTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ShakeelK21,
  author       = {Nabeel Shakeel and
                  Nadeem Kafi Khan},
  title        = {A framework to protect National Cyber Borders in peace and war},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {17--22},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00013},
  doi          = {10.1109/ASIAJCIS53848.2021.00013},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ShakeelK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ShibayamaK21,
  author       = {Rina Shibayama and
                  Hiroaki Kikuchi},
  title        = {Vulnerability Exploiting {SMS} Push Notifications},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {23--30},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00014},
  doi          = {10.1109/ASIAJCIS53848.2021.00014},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ShibayamaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsengH21,
  author       = {Yi{-}Fan Tseng and
                  Jheng{-}Jia Huang},
  title        = {Identity-Based Signature from Quadratic Residues and Its Extension
                  to ID-Based Multi-Signature},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {31--36},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00015},
  doi          = {10.1109/ASIAJCIS53848.2021.00015},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsengH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WengC21,
  author       = {Jui{-}Hung Weng and
                  Po{-}Wen Chi},
  title        = {Multi-Level Privacy Preserving K-Anonymity},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {61--67},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00019},
  doi          = {10.1109/ASIAJCIS53848.2021.00019},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WengC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YangTLHT21,
  author       = {Chih{-}Chen Yang and
                  Raylin Tso and
                  Zi{-}Yuan Liu and
                  Jen{-}Chieh Hsu and
                  Yi{-}Fan Tseng},
  title        = {Improved Proxy Re-encryption Scheme with Equality Test},
  booktitle    = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  pages        = {37--44},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021.00016},
  doi          = {10.1109/ASIAJCIS53848.2021.00016},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YangTLHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2021,
  title        = {16th Asia Joint Conference on Information Security, AsiaJCIS 2021,
                  Seoul, Republic of Korea, August 19-20, 2021},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/AsiaJCIS53848.2021},
  doi          = {10.1109/ASIAJCIS53848.2021},
  isbn         = {978-1-6654-1788-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenCL20,
  author       = {Chia{-}Mei Chen and
                  Tien{-}Ho Chang and
                  Gu Hsin Lai},
  title        = {The Empirical Study of Passwords Analysis in Access Point with Specific-Rules
                  and Graphic Process Units},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {115--120},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00029},
  doi          = {10.1109/ASIAJCIS50894.2020.00029},
  timestamp    = {Tue, 22 Sep 2020 10:17:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChuangLS20,
  author       = {Yun{-}Hsin Chuang and
                  Chin{-}Laung Lei and
                  Hung{-}Jr Shiu},
  title        = {Cryptanalysis of Four Biometric Based Authentication Schemes with
                  Privacy-preserving for Multi-server Environment and Design Guidelines},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {66--73},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00022},
  doi          = {10.1109/ASIAJCIS50894.2020.00022},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChuangLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanTH20,
  author       = {Chun{-}I Fan and
                  Yi{-}Fan Tseng and
                  Yen{-}Lin Huang},
  title        = {Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation
                  Using Multilinear Map},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {9--15},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00014},
  doi          = {10.1109/ASIAJCIS50894.2020.00014},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanTH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FukumitsuH20,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa},
  title        = {Linear Lossy Identification Scheme derives Tightly-Secure Multisignature},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {24--31},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00016},
  doi          = {10.1109/ASIAJCIS50894.2020.00016},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FukumitsuH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HougaardM20,
  author       = {Hector B. Hougaard and
                  Atsuko Miyaji},
  title        = {{SIT:} Supersingular Isogeny Tree-based Group Key Exchange},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {46--53},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00019},
  doi          = {10.1109/ASIAJCIS50894.2020.00019},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HougaardM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HsuL20,
  author       = {Chien{-}Lung Hsu and
                  Tuan{-}Vinh Le},
  title        = {A Time Bound Dynamic Group key Distribution Scheme with Anonymous
                  Three-factor Identification for IoT-Based Multi-Server Environments},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {59--65},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00021},
  doi          = {10.1109/ASIAJCIS50894.2020.00021},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HsuL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HsuLTC20,
  author       = {Hsiang{-}Chen Hsu and
                  Zi{-}Yuan Liu and
                  Raylin Tso and
                  Kung Chen},
  title        = {Multi-value Private Information Retrieval using Homomorphic Encryption},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {82--88},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00024},
  doi          = {10.1109/ASIAJCIS50894.2020.00024},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HsuLTC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HsuWFSB0WK20,
  author       = {Ruei{-}Hau Hsu and
                  Yi{-}Cheng Wang and
                  Chun{-}I Fan and
                  Bo Sun and
                  Tao Ban and
                  Takeshi Takahashi and
                  Ting{-}Wei Wu and
                  Shang{-}Wei Kao},
  title        = {A Privacy-Preserving Federated Learning System for Android Malware
                  Detection Based on Edge Computing},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {128--136},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00031},
  doi          = {10.1109/ASIAJCIS50894.2020.00031},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HsuWFSB0WK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/JivanyanM20,
  author       = {Aram Jivanyan and
                  Tigran Mamikonyan},
  title        = {Hierarchical One-out-of-Many Proofs With Applications to Blockchain
                  Privacy and Ring Signatures},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {74--81},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00023},
  doi          = {10.1109/ASIAJCIS50894.2020.00023},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/JivanyanM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimK20,
  author       = {Younghwan Kim and
                  Huy Kang Kim},
  title        = {Anomaly Detection using Clustered Deep One-Class Classification},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {151--157},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00034},
  doi          = {10.1109/ASIAJCIS50894.2020.00034},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuoKWH20,
  author       = {Wen{-}Chung Kuo and
                  Wan{-}Hsuan Kao and
                  Chun{-}Cheng Wang and
                  Yu{-}Chih Huang},
  title        = {3D-Playfair Encrypted Message Verification Technology based on {MD5}},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {110--114},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00028},
  doi          = {10.1109/ASIAJCIS50894.2020.00028},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuoKWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MiyajiN20,
  author       = {Atsuko Miyaji and
                  Yoshitaka Nagao},
  title        = {Privacy Preserving Data Integration Protocol},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {89--96},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00025},
  doi          = {10.1109/ASIAJCIS50894.2020.00025},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MiyajiN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NaganumaSYTKK20,
  author       = {Ken Naganuma and
                  Takayuki Suzuki and
                  Masayuki Yoshino and
                  Kenta Takahashi and
                  Yosuke Kaga and
                  Noboru Kunihiro},
  title        = {New Secret Key Management Technology for Blockchains from Biometrics
                  Fuzzy Signature},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {54--58},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00020},
  doi          = {10.1109/ASIAJCIS50894.2020.00020},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NaganumaSYTKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NaganumaYIMOK20,
  author       = {Ken Naganuma and
                  Masayuki Yoshino and
                  Atsuo Inoue and
                  Yukinori Matsuoka and
                  Mineaki Okazaki and
                  Noboru Kunihiro},
  title        = {Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00017},
  doi          = {10.1109/ASIAJCIS50894.2020.00017},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NaganumaYIMOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NishikawaYHWUHI20,
  author       = {Hiroki Nishikawa and
                  Takumi Yamamoto and
                  Bret A. Harsham and
                  Ye Wang and
                  Kota Uehara and
                  Chiori Hori and
                  Aiko Iwasaki and
                  Kiyoto Kawauchi and
                  Masakatsu Nishigaki},
  title        = {Analysis of Malicious Email Detection using Cialdini's Principles},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {137--142},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00032},
  doi          = {10.1109/ASIAJCIS50894.2020.00032},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NishikawaYHWUHI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsaiHL20,
  author       = {Meng{-}Hsuan Tsai and
                  Yu{-}Cheng Hsu and
                  Nai{-}Wei Lo},
  title        = {An Efficient Blockchain-based Firmware Update Framework for IoT Environment},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {121--127},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00030},
  doi          = {10.1109/ASIAJCIS50894.2020.00030},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsaiHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsengLT20,
  author       = {Yi{-}Fan Tseng and
                  Zi{-}Yuan Liu and
                  Raylin Tso},
  title        = {A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00013},
  doi          = {10.1109/ASIAJCIS50894.2020.00013},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsengLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WanBLCI0I20,
  author       = {Tzu{-}Ling Wan and
                  Tao Ban and
                  Yen{-}Ting Lee and
                  Shin{-}Ming Cheng and
                  Ryoichi Isawa and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {IoT-Malware Detection Based on Byte Sequences of Executable Files},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {143--150},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00033},
  doi          = {10.1109/ASIAJCIS50894.2020.00033},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WanBLCI0I20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangHTT20,
  author       = {Peter Shaojui Wang and
                  Pin{-}Yen Huang and
                  Yu{-}An Tsai and
                  Raylin Tso},
  title        = {An Enhanced Mondrian Anonymization Model based on Self-Organizing
                  Map},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {97--100},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00026},
  doi          = {10.1109/ASIAJCIS50894.2020.00026},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangHTT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangM20,
  author       = {Chih{-}Hung Wang and
                  Guo{-}Cyuan Mao},
  title        = {Secure and flexible algorithm for outsourcing of bilinear pairings
                  effectively resisting conspiracy},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {40--45},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00018},
  doi          = {10.1109/ASIAJCIS50894.2020.00018},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YamaguchiGKTIY20,
  author       = {Shuji Yamaguchi and
                  Hidehito Gomi and
                  Ryosuke Kobayashi and
                  Tran Phuong Thao and
                  Mhd Irvan and
                  Rie Shigetomi Yamaguchi},
  title        = {Effective Classification for Multi-modal Behavioral Authentication
                  on Large-Scale Data},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {101--109},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00027},
  doi          = {10.1109/ASIAJCIS50894.2020.00027},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YamaguchiGKTIY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YoshinoNKS20,
  author       = {Masayuki Yoshino and
                  Ken Naganuma and
                  Noboru Kunihiro and
                  Hisayoshi Sato},
  title        = {Practical Query-based Order Revealing Encryption from Symmetric Searchable
                  Encryption},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {16--23},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00015},
  doi          = {10.1109/ASIAJCIS50894.2020.00015},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YoshinoNKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2020,
  title        = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/9186508/proceeding},
  isbn         = {978-1-7281-9922-1},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/0005WWZW19,
  author       = {Yong Ding and
                  Bingyao Wang and
                  Yujue Wang and
                  Kun Zhang and
                  Huiyong Wang},
  title        = {Privacy and Integrity Protection of Metering Data in Smart Grid},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {40--47},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-7},
  doi          = {10.1109/ASIAJCIS.2019.000-7},
  timestamp    = {Tue, 22 Sep 2020 10:23:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/0005WWZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChiH19,
  author       = {Po{-}Wen Chi and
                  Pin{-}Hsin Hsiao},
  title        = {Learnable Audio Encryption for Untrusted Outsourcing Machine Learning
                  Services},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {151--156},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00012},
  doi          = {10.1109/ASIAJCIS.2019.00012},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChiH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/EzawaTSKHFMM19,
  author       = {Yuki Ezawa and
                  Makoto Takita and
                  Yoshiaki Shiraishi and
                  Shohei Kakei and
                  Masanori Hirotomo and
                  Youji Fukuta and
                  Masami Mohri and
                  Masakatu Morii},
  title        = {Designing Authentication and Authorization System with Blockchain},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {111--118},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00006},
  doi          = {10.1109/ASIAJCIS.2019.00006},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/EzawaTSKHFMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HirotomoIFMS19,
  author       = {Masanori Hirotomo and
                  Haruka Ito and
                  Youji Fukuta and
                  Masami Mohri and
                  Yoshiaki Shiraishi},
  title        = {Identification Scheme Based on the Binary Syndrome Decoding Problem
                  Using High-Density Parity-Check Matrices},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {127--133},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00008},
  doi          = {10.1109/ASIAJCIS.2019.00008},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HirotomoIFMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HongHBICIN19,
  author       = {Bing{-}Kai Hong and
                  Jr{-}Wei Huang and
                  Tao Ban and
                  Ryoichi Isawa and
                  Shin{-}Ming Cheng and
                  Daisuke Inoue and
                  Koji Nakao},
  title        = {Measurement Study Towards a Unified Firmware Updating Scheme for Legacy
                  IoT Devices},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {9--15},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00-11},
  doi          = {10.1109/ASIAJCIS.2019.00-11},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HongHBICIN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HungY19,
  author       = {Kuo{-}Lung Hung and
                  Chih{-}Yu Yen},
  title        = {Watermarking Technique Based on Harris-Laplace Feature Point Detector
                  Capable of Resisting Geometric Attacks},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {119--126},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00007},
  doi          = {10.1109/ASIAJCIS.2019.00007},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HungY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/InayoshiKTMS19,
  author       = {Hiroki Inayoshi and
                  Shohei Kakei and
                  Eiji Takimoto and
                  Koichi Mouri and
                  Shoichi Saito},
  title        = {Prevention of Data Leakage due to Implicit Information Flows in Android
                  Applications},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {103--110},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00005},
  doi          = {10.1109/ASIAJCIS.2019.00005},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/InayoshiKTMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ItoM19,
  author       = {Ryo Ito and
                  Mamoru Mimura},
  title        = {Detecting Unknown Malware from {ASCII} Strings with Natural Language
                  Processing Techniques},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00-12},
  doi          = {10.1109/ASIAJCIS.2019.00-12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ItoM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KumarMGHS19,
  author       = {Nitesh Kumar and
                  Subhasis Mukhopadhyay and
                  Mugdha Gupta and
                  Anand Handa and
                  Sandeep K. Shukla},
  title        = {Malware Classification using Early Stage Behavioral Analysis},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {16--23},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00-10},
  doi          = {10.1109/ASIAJCIS.2019.00-10},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KumarMGHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LinHT19,
  author       = {Chung{-}Yi Lin and
                  Chun{-}Ying Huang and
                  Chia{-}Wei Tien},
  title        = {Boosting Fuzzing Performance with Differential Seed Scheduling},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {72--79},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-3},
  doi          = {10.1109/ASIAJCIS.2019.000-3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LinHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiuTTM19,
  author       = {Zi{-}Yuan Liu and
                  Raylin Tso and
                  Yi{-}Fan Tseng and
                  Masahiro Mambo},
  title        = {Signcryption from {NTRU} Lattices Without Random Oracles},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {134--141},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00009},
  doi          = {10.1109/ASIAJCIS.2019.00009},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiuTTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MimuraS19,
  author       = {Mamoru Mimura and
                  Yuya Suga},
  title        = {Filtering Malicious JavaScript Code with Doc2Vec on an Imbalanced
                  Dataset},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {24--31},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-9},
  doi          = {10.1109/ASIAJCIS.2019.000-9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MimuraS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MiyajiKM19,
  author       = {Hideaki Miyaji and
                  Akinori Kawachi and
                  Atsuko Miyaji},
  title        = {String commitment scheme with low output locality},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-8},
  doi          = {10.1109/ASIAJCIS.2019.000-8},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MiyajiKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MorimotoKS19,
  author       = {Shusuke Morimoto and
                  Hajime Kawamukai and
                  Kilho Shin},
  title        = {Prediction of Crime Occurrence using Information Propagation Model
                  and Gaussian Process},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {80--87},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-2},
  doi          = {10.1109/ASIAJCIS.2019.000-2},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MorimotoKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SatoMT19,
  author       = {Hiroki Sato and
                  Mamoru Mimura and
                  Hidema Tanaka},
  title        = {Analysis of Division Property using {MILP} Method for Lightweight
                  Blockcipher Piccolo},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {48--55},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-6},
  doi          = {10.1109/ASIAJCIS.2019.000-6},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SatoMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ShinCKLS19,
  author       = {Iksoo Shin and
                  Yunsoo Choi and
                  Taewoong Kwon and
                  Hyeakro Lee and
                  Jungsuk Song},
  title        = {Platform Design and Implementation for Flexible Data Processing and
                  Building {ML} Models of {IDS} Alerts},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {64--71},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-4},
  doi          = {10.1109/ASIAJCIS.2019.000-4},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ShinCKLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ShishidoM19,
  author       = {Katsunari Shishido and
                  Atsuko Miyaji},
  title        = {Secure Online-Efficient Interval Test based on Empty-Set Check},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {56--63},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-5},
  doi          = {10.1109/ASIAJCIS.2019.000-5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ShishidoM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SilverajanV19,
  author       = {Bilhanan Silverajan and
                  Petteri Vistiaho},
  title        = {Enabling Cybersecurity Incident Reporting and Coordinated Handling
                  for Maritime Sector},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {88--95},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.000-1},
  doi          = {10.1109/ASIAJCIS.2019.000-1},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SilverajanV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SugaiOKK19,
  author       = {Taku Sugai and
                  Toshihiro Ohigashi and
                  Yoshio Kakizaki and
                  Akira Kanaoka},
  title        = {Password Strength Measurement without Password Disclosure},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {157--164},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00013},
  doi          = {10.1109/ASIAJCIS.2019.00013},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SugaiOKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TakadaOM19,
  author       = {Masaru Takada and
                  Yuki Osada and
                  Masakatu Morii},
  title        = {Counter Attack Against the Bus-Off Attack on {CAN}},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {96--102},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00004},
  doi          = {10.1109/ASIAJCIS.2019.00004},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TakadaOM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TakeuchiKFM19,
  author       = {Yuma Takeuchi and
                  Shogo Kitajima and
                  Kazuya Fukushima and
                  Masahiro Mambo},
  title        = {Privacy Risk Evaluation of Re-Identification of Pseudonyms},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {165--172},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00014},
  doi          = {10.1109/ASIAJCIS.2019.00014},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TakeuchiKFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsuchidaHITSNMF19,
  author       = {Toshiki Tsuchida and
                  Masanori Hirotomo and
                  Haruka Ito and
                  Makoto Takita and
                  Yoshiaki Shiraishi and
                  Kenta Nomura and
                  Masami Mohri and
                  Youji Fukuta and
                  Masakatu Morii},
  title        = {A Signature Scheme Based on the Syndrome Decoding Problem Using {LDPC}
                  Codes},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {142--145},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00010},
  doi          = {10.1109/ASIAJCIS.2019.00010},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsuchidaHITSNMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangZZ19,
  author       = {Bingsen Wang and
                  Zhuoran Zhang and
                  Fangguo Zhang},
  title        = {Subliminal Channels in the Code-based Ring Signature Scheme},
  booktitle    = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  pages        = {146--150},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/AsiaJCIS.2019.00011},
  doi          = {10.1109/ASIAJCIS.2019.00011},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2019,
  title        = {14th Asia Joint Conference on Information Security, AsiaJCIS 2019,
                  Kobe, Japan, August 1-2, 2019},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8797685/proceeding},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanTEH18,
  author       = {Chun{-}I Fan and
                  Yi{-}Fan Tseng and
                  Cheng{-}Yuan E and
                  Jheng{-}Jia Huang},
  title        = {Transformation between Attribute-Based Encryption and Key-Aggregate
                  Cryptosystem},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {35--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00015},
  doi          = {10.1109/ASIAJCIS.2018.00015},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanTEH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FujimotoMM18,
  author       = {Mariko Fujimoto and
                  Wataru Matsuda and
                  Takuho Mitsunaga},
  title        = {Protecting Struts 2 from {OGNL} Related Attacks by Using Servlet Filter},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {8--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00011},
  doi          = {10.1109/ASIAJCIS.2018.00011},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FujimotoMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GeXLSSW18,
  author       = {Jing Ge and
                  Yifan Xu and
                  Ruiqian Liu and
                  Enze Si and
                  Ning Shang and
                  An Wang},
  title        = {Power Attack and Protected Implementation on Lightweight Block Cipher
                  {SKINNY}},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00020},
  doi          = {10.1109/ASIAJCIS.2018.00020},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GeXLSSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ImaiK18,
  author       = {Hironori Imai and
                  Akira Kanaoka},
  title        = {Time Series Analysis of Copy-and-Paste Impact on Android Application
                  Security},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00012},
  doi          = {10.1109/ASIAJCIS.2018.00012},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ImaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/IsawaBTYI18,
  author       = {Ryoichi Isawa and
                  Tao Ban and
                  Ying Tie and
                  Katsunari Yoshioka and
                  Daisuke Inoue},
  title        = {Evaluating Disassembly-Code Based Similarity between IoT Malware Samples},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {89--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00023},
  doi          = {10.1109/ASIAJCIS.2018.00023},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/IsawaBTYI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimKY18,
  author       = {Ji Hye Kim and
                  Mee Yeon Kim and
                  Heung Youl Youm},
  title        = {Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication
                  Methods for the Financial Sector},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {62--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00019},
  doi          = {10.1109/ASIAJCIS.2018.00019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuzunoIM18,
  author       = {Hiroki Kuzuno and
                  Shun Inagaki and
                  Kenichi Magata},
  title        = {Constructing a Complete Timeline of a Security Incident by Aggregating
                  Reports},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {109--115},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00026},
  doi          = {10.1109/ASIAJCIS.2018.00026},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuzunoIM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KwonSCLP18,
  author       = {Taewoong Kwon and
                  Jungsuk Song and
                  Sangsu Choi and
                  Yunsoo Lee and
                  Jinhak Park},
  title        = {{VISNU:} {A} Novel Visualization Methodology of Security Events Optimized
                  for a Centralized {SOC}},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00010},
  doi          = {10.1109/ASIAJCIS.2018.00010},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KwonSCLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiaoZYR18,
  author       = {Yaqing Liao and
                  Jing Zhou and
                  Yang Yang and
                  Ou Ruan},
  title        = {An Efficient Oblivious Transfer Protocol with Access Control},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {29--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00014},
  doi          = {10.1109/ASIAJCIS.2018.00014},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiaoZYR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MidorikawaTK18,
  author       = {Tatsuya Midorikawa and
                  Akihiro Tachikawa and
                  Akira Kanaoka},
  title        = {Helping Johnny to Search: Encrypted Search on Webmail System},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00017},
  doi          = {10.1109/ASIAJCIS.2018.00017},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MidorikawaTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/OnoM18,
  author       = {Hibiki Ono and
                  Yoshifumi Manabe},
  title        = {Efficient Card-Based Cryptographic Protocols for the Millionaires'
                  Problem Using Private Input Operations},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {23--28},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00013},
  doi          = {10.1109/ASIAJCIS.2018.00013},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/OnoM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ShigemotoFKKNFK18,
  author       = {Tomohiro Shigemoto and
                  Shota Fujii and
                  Ichiro Kuriama and
                  Tetsuro Kito and
                  Hirofumi Nakakoji and
                  Yasuhiro Fujii and
                  Hiroaki Kikuchi},
  title        = {Development of White List Based Autonomous Evolution of Defense System
                  for {RAT} Malware},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {95--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00024},
  doi          = {10.1109/ASIAJCIS.2018.00024},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ShigemotoFKKNFK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TianM18,
  author       = {Junfeng Tian and
                  Yanwei Ma},
  title        = {Load Balancing Method Based on a Performance and Power Ratio},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00021},
  doi          = {10.1109/ASIAJCIS.2018.00021},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TianM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TianXC18,
  author       = {Junfeng Tian and
                  Lizheng Xue and
                  Hongyun Cai},
  title        = {An Algorithm Based on Influence to Predict Invisible Relationship},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {54--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00018},
  doi          = {10.1109/ASIAJCIS.2018.00018},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TianXC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsudaNTINT18,
  author       = {Yu Tsuda and
                  Junji Nakazato and
                  Yaichiro Takagi and
                  Daisuke Inoue and
                  Koji Nakao and
                  Kenjiro Terada},
  title        = {A Lightweight Host-Based Intrusion Detection Based on Process Generation
                  Patterns},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {102--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00025},
  doi          = {10.1109/ASIAJCIS.2018.00025},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsudaNTINT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangXWR18,
  author       = {Jingyuan Wang and
                  Peidai Xie and
                  Yongjun Wang and
                  Zelin Rong},
  title        = {A Survey of Return-Oriented Programming Attack, Defense and Its Benign
                  Use},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {83--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00022},
  doi          = {10.1109/ASIAJCIS.2018.00022},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangXWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/XuCY18,
  author       = {Ming Xu and
                  Yu Cheng and
                  QiXin Yin},
  title        = {Toward a Resilient System: The Inspiration from Information Security
                  Management Appliance},
  booktitle    = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  pages        = {42--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/AsiaJCIS.2018.00016},
  doi          = {10.1109/ASIAJCIS.2018.00016},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/XuCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2018,
  title        = {13th Asia Joint Conference on Information Security, AsiaJCIS 2018,
                  Guilin, China, August 8-9, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8453224/proceeding},
  isbn         = {978-1-5386-7380-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/AndoOK17,
  author       = {Masahito Ando and
                  Masayuki Okada and
                  Akira Kanaoka},
  title        = {Simulation Study of {BGP} Origin Validation Effect against Mis-Origination
                  with Internet Topology},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.17},
  doi          = {10.1109/ASIAJCIS.2017.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/AndoOK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Chang17,
  author       = {Hung{-}Chang Chang},
  title        = {Based on Standard Descriptors and Dynamic Key Features to Detect Malicious
                  {USB} Storage Devices in {APT}},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {65--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.22},
  doi          = {10.1109/ASIAJCIS.2017.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Chang17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenLL17,
  author       = {Chia{-}Mei Chen and
                  Gu Hsin Lai and
                  Je{-}Ming Lin},
  title        = {Identifying Threat Patterns of Android Applications},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.23},
  doi          = {10.1109/ASIAJCIS.2017.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GuanZCL17,
  author       = {D. J. Guan and
                  Er{-}Shuo Zhuang and
                  I. C. Chung and
                  Yu{-}Shen Lin},
  title        = {Performance Analysis of Some Batch Verification Methods of Digital
                  Signatures},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {10--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.14},
  doi          = {10.1109/ASIAJCIS.2017.14},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GuanZCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HirotomoNKFMS17,
  author       = {Masanori Hirotomo and
                  Yuya Nishio and
                  Masaki Kamizono and
                  Youji Fukuta and
                  Masami Mohri and
                  Yoshiaki Shiraishi},
  title        = {Efficient Method for Analyzing Malicious Websites by Using Multi-Environment
                  Analysis System},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {48--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.21},
  doi          = {10.1109/ASIAJCIS.2017.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HirotomoNKFMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LeeCCS17,
  author       = {Younsu Lee and
                  Sang{-}Soo Choi and
                  Jangwon Choi and
                  Jungsuk Song},
  title        = {A Lightweight Malware Classification Method Based on Detection Results
                  of Anti-Virus Software},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {5--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.20},
  doi          = {10.1109/ASIAJCIS.2017.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LeeCCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MimuraOTT17,
  author       = {Mamoru Mimura and
                  Yuhei Otsubo and
                  Hidehiko Tanaka and
                  Hidema Tanaka},
  title        = {A Practical Experiment of the HTTP-Based {RAT} Detection Method in
                  Proxy Server Logs},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {31--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.13},
  doi          = {10.1109/ASIAJCIS.2017.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MimuraOTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NdibwileKF17,
  author       = {Jema David Ndibwile and
                  Youki Kadobayashi and
                  Doudou Fall},
  title        = {UnPhishMe: Phishing Attack Detection by Deceptive Login Simulation
                  through an Android Mobile App},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {38--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.19},
  doi          = {10.1109/ASIAJCIS.2017.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NdibwileKF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SakumotoK17,
  author       = {Soushirou Sakumoto and
                  Akira Kanaoka},
  title        = {Improvement of Privacy Preserved Rule-Based Risk Analysis via Secure
                  Multi-Party Computation},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {15--22},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.18},
  doi          = {10.1109/ASIAJCIS.2017.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SakumotoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TamaPR17,
  author       = {Bayu Adhi Tama and
                  Akash Suresh Patil and
                  Kyung Hyune Rhee},
  title        = {An Improved Model of Anomaly Detection Using Two-Level Classifier
                  Ensemble},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.9},
  doi          = {10.1109/ASIAJCIS.2017.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TamaPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YangL17,
  author       = {Ling Yang and
                  Xianhui Lu},
  title        = {An Efficient Dispersal Storage Scheme Based on Ring-LWE and {NTT}},
  booktitle    = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  pages        = {23--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/AsiaJCIS.2017.12},
  doi          = {10.1109/ASIAJCIS.2017.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YangL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2017,
  title        = {12th Asia Joint Conference on Information Security, AsiaJCIS 2017,
                  Seoul, South Korea, August 10-11, 2017},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8025185/proceeding},
  isbn         = {978-1-5386-2132-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/AhujaMS16,
  author       = {Rohit Ahuja and
                  Sraban Kumar Mohanty and
                  Kouichi Sakurai},
  title        = {An Identity Preserving Access Control Scheme with Flexible System
                  Privilege Revocation in Cloud Computing},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {39--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.23},
  doi          = {10.1109/ASIAJCIS.2016.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/AhujaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/BanTGIN16,
  author       = {Tao Ban and
                  Takeshi Takahashi and
                  Shanqing Guo and
                  Daisuke Inoue and
                  Koji Nakao},
  title        = {Integration of Multi-modal Features for Android Malware Detection
                  Using Linear {SVM}},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {141--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.29},
  doi          = {10.1109/ASIAJCIS.2016.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/BanTGIN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/BarkaHS16,
  author       = {Ezedin Barka and
                  Nedaa Al Hussien and
                  Khaled Shuaib},
  title        = {Securing Smart Meters Data for {AMI} Using {RBAC}},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.16},
  doi          = {10.1109/ASIAJCIS.2016.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/BarkaHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenLY16,
  author       = {Chia{-}Mei Chen and
                  Gu Hsin Lai and
                  Pong{-}Yu Young},
  title        = {Defense Joint Attacks Based on Stochastic Discrete Sequence Anomaly
                  Detection},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {74--79},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.18},
  doi          = {10.1109/ASIAJCIS.2016.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenLY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenT16,
  author       = {Shang{-}Wen Chen and
                  Raylin Tso},
  title        = {NFC-based Mobile Payment Protocol with User Anonymity},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {24--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.30},
  doi          = {10.1109/ASIAJCIS.2016.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChiWLGLH16,
  author       = {Po{-}Wen Chi and
                  Ming{-}Hung Wang and
                  Che{-}Wei Lin and
                  Jing{-}Wei Guo and
                  Chin{-}Laung Lei and
                  Nen{-}Fu Huang},
  title        = {SDNort: {A} Software Defined Network Testing Framework Using Openflow},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {100--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.12},
  doi          = {10.1109/ASIAJCIS.2016.12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChiWLGLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GaoFKS16,
  author       = {Yuxuan Gao and
                  Yaokai Feng and
                  Junpei Kawamoto and
                  Kouichi Sakurai},
  title        = {A Machine Learning Based Approach for Detecting DRDoS Attacks and
                  Its Performance Evaluation},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {80--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.24},
  doi          = {10.1109/ASIAJCIS.2016.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GaoFKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/IsawaMI16,
  author       = {Ryoichi Isawa and
                  Masakatu Morii and
                  Daisuke Inoue},
  title        = {Comparing Malware Samples for Unpacking: {A} Feasibility Study},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {155--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.28},
  doi          = {10.1109/ASIAJCIS.2016.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/IsawaMI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KikuchiYMF16,
  author       = {Hiroaki Kikuchi and
                  Hideo Yasunaga and
                  Hiroki Matsui and
                  Chun{-}I Fan},
  title        = {Efficient Privacy-Preserving Logistic Regression with Iteratively
                  Re-weighted Least Squares},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {48--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.21},
  doi          = {10.1109/ASIAJCIS.2016.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KikuchiYMF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuoLWWH16,
  author       = {Wen{-}Chung Kuo and
                  Jyun{-}Jia Li and
                  Chun{-}Cheng Wang and
                  Lih{-}Chyau Wuu and
                  Yu{-}Chih Huang},
  title        = {An Improvement Data Hiding Scheme Based on Formula Fully Exploiting
                  Modification Directions and Pixel Value Differencing Method},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {136--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.20},
  doi          = {10.1109/ASIAJCIS.2016.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuoLWWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MimuraOT16,
  author       = {Mamoru Mimura and
                  Yuhei Otsubo and
                  Hidehiko Tanaka},
  title        = {Evaluation of a Brute Forcing Tool that Extracts the {RAT} from a
                  Malicious Document File},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {147--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.17},
  doi          = {10.1109/ASIAJCIS.2016.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MimuraOT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NurmiKV16,
  author       = {Juha Nurmi and
                  Joona Kannisto and
                  Markku Vajaranta},
  title        = {Observing Hidden Service Directory Spying with a Private Hidden Service
                  Honeynet},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {55--59},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.31},
  doi          = {10.1109/ASIAJCIS.2016.31},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NurmiKV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ParkCS16,
  author       = {Jinhak Park and
                  Jang Won Choi and
                  Jung{-}suk Song},
  title        = {How to Design Practical Client Honeypots Based on Virtual Environment},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {67--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.19},
  doi          = {10.1109/ASIAJCIS.2016.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ParkCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SaitoTYM16,
  author       = {Satomi Saito and
                  Satoru Torii and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Wamber: Defending Web Sites on Hosting Services with Self-Learning
                  Honeypots},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {60--66},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.32},
  doi          = {10.1109/ASIAJCIS.2016.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SaitoTYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ShimaD16,
  author       = {Koji Shima and
                  Hiroshi Doi},
  title        = {(\{1, 3\}, n) Hierarchical Secret Sharing Scheme Based on {XOR} Operations
                  for a Small Number of Indispensable Participants},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {108--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.11},
  doi          = {10.1109/ASIAJCIS.2016.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ShimaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SilverajanVK16,
  author       = {Bilhanan Silverajan and
                  Markku Vajaranta and
                  Antti Kolehmainen},
  title        = {Home Network Security: Modelling Power Consumption to Detect and Prevent
                  Attacks on Homenet Routers},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {9--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.10},
  doi          = {10.1109/ASIAJCIS.2016.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SilverajanVK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TamaR16,
  author       = {Bayu Adhi Tama and
                  Kyung Hyune Rhee},
  title        = {Classifier Ensemble Design with Rotation Forest to Enhance Attack
                  Detection of {IDS} in Wireless Network},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {87--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.13},
  doi          = {10.1109/ASIAJCIS.2016.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TamaR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/VajarantaKH16,
  author       = {Markku Vajaranta and
                  Joona Kannisto and
                  Jarmo Harju},
  title        = {Implementation Experiences and Design Challenges for Resilient {SDN}
                  Based Secure {WAN} Overlays},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {17--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.25},
  doi          = {10.1109/ASIAJCIS.2016.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/VajarantaKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/VannetK16,
  author       = {Thomas Vannet and
                  Noboru Kunihiro},
  title        = {Partial Server Side Parameter Selection in Private Information Retrieval},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.27},
  doi          = {10.1109/ASIAJCIS.2016.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/VannetK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangW16,
  author       = {Chih{-}Hung Wang and
                  Chien{-}Ming Wang},
  title        = {Novel Design of Fair Exchange Protocol for Semi-trusted Server and
                  Its Application in Cloud Environment},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {130--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.22},
  doi          = {10.1109/ASIAJCIS.2016.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WatanabeTM16,
  author       = {Yuhei Watanabe and
                  Yosuke Todo and
                  Masakatu Morii},
  title        = {New Conditional Differential Cryptanalysis for NLFSR-based Stream
                  Ciphers and Application to Grain v1},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {115--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.26},
  doi          = {10.1109/ASIAJCIS.2016.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WatanabeTM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YehHP16,
  author       = {Jia{-}Rung Yeh and
                  Hsu{-}Chun Hsiao and
                  Ai{-}Chun Pang},
  title        = {Migrant Attack: {A} Multi-resource DoS Attack on Cloud Virtual Machine
                  Migration Schemes},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {92--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.14},
  doi          = {10.1109/ASIAJCIS.2016.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YehHP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2016,
  title        = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7781470/proceeding},
  isbn         = {978-1-5090-2285-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/AdachiO15,
  author       = {Takashi Adachi and
                  Kazumasa Omote},
  title        = {An Approach to Predict Drive-by-Download Attacks by Vulnerability
                  Evaluation and Opcode},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {145--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.17},
  doi          = {10.1109/ASIAJCIS.2015.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/AdachiO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/BaekY15,
  author       = {Jonghyun Baek and
                  Heung Youl Youm},
  title        = {Secure and Lightweight Authentication Protocol for {NFC} Tag Based
                  Services},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {63--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.35},
  doi          = {10.1109/ASIAJCIS.2015.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/BaekY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChangLC15,
  author       = {Chin{-}Chen Chang and
                  Iuon{-}Chang Lin and
                  Yi{-}Lun Chi},
  title        = {Secure Electronic Coupons},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {104--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.10},
  doi          = {10.1109/ASIAJCIS.2015.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChangLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenC15,
  author       = {Chia{-}Mei Chen and
                  Tien{-}Ho Chang},
  title        = {The Cryptanalysis of {WPA} {\&} {WPA2} in the Rule-Based Brute
                  Force Attack, an Advanced and Efficient Method},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {37--41},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.14},
  doi          = {10.1109/ASIAJCIS.2015.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Chien15,
  author       = {Hung{-}Yu Chien},
  title        = {De-synchronization Attack on Quadratic Residues-Based {RFID} Ownership
                  Transfer},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {42--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.13},
  doi          = {10.1109/ASIAJCIS.2015.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Chien15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanHH15,
  author       = {Chun{-}I Fan and
                  Shi{-}Yuan Huang and
                  Wen{-}Che Hsu},
  title        = {Encrypted Data Deduplication in Cloud Storage},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {18--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.12},
  doi          = {10.1109/ASIAJCIS.2015.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanHH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanWCTF15,
  author       = {Chun{-}I Fan and
                  Chien{-}Nan Wu and
                  Chun{-}Hung Chen and
                  Yi{-}Fan Tseng and
                  Cheng{-}Chun Feng},
  title        = {Attribute-Based Proxy Re-encryption with Dynamic Membership},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {26--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.21},
  doi          = {10.1109/ASIAJCIS.2015.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanWCTF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FengHS15,
  author       = {Yaokai Feng and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {A Proposal for Detecting Distributed Cyber-Attacks Using Automatic
                  Thresholding},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {152--159},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.22},
  doi          = {10.1109/ASIAJCIS.2015.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FengHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HsiehSLW15,
  author       = {Chih{-}Hung Hsieh and
                  Yu{-}Siang Shen and
                  Chao{-}Wen Li and
                  Jain{-}Shing Wu},
  title        = {iF2: An Interpretable Fuzzy Rule Filter for Web Log Post-Compromised
                  Malicious Activity Monitoring},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {130--137},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.19},
  doi          = {10.1109/ASIAJCIS.2015.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HsiehSLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HsuL15,
  author       = {Chien{-}Lung Hsu and
                  Tzu{-}Wei Lin},
  title        = {Privacy-Preserved Key Agreement with User Authentication},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {12--17},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.18},
  doi          = {10.1109/ASIAJCIS.2015.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HsuL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HsuLC15,
  author       = {Chen{-}Ming Hsu and
                  Jen{-}Chun Lee and
                  Wei{-}Kuei Chen},
  title        = {An Efficient Detection Algorithm for Copy-Move Forgery},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {33--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.16},
  doi          = {10.1109/ASIAJCIS.2015.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HsuLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangJF15,
  author       = {Jheng{-}Jia Huang and
                  Wen{-}Shenq Juang and
                  Chun{-}I Fan},
  title        = {A Secure and Efficient Smartphone Payment Scheme in IoT/Cloud Environments},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {91--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.20},
  doi          = {10.1109/ASIAJCIS.2015.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuangJF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KawaguchiO15,
  author       = {Naoto Kawaguchi and
                  Kazumasa Omote},
  title        = {Malware Function Classification Using APIs in Initial Behavior},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {138--144},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.15},
  doi          = {10.1109/ASIAJCIS.2015.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KawaguchiO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KikuchiHY15,
  author       = {Hiroaki Kikuchi and
                  Hideki Hashimoto and
                  Hideo Yasunaga},
  title        = {Privacy-Preserving Epidemiological Analysis for a Distributed Database
                  of Hospitals},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {85--90},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.31},
  doi          = {10.1109/ASIAJCIS.2015.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KikuchiHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimK15,
  author       = {Hakju Kim and
                  Kwangjo Kim},
  title        = {Preliminary Design of a Novel Lightweight Authenticated Encryption
                  Scheme Based on the Sponge Function},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {110--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.24},
  doi          = {10.1109/ASIAJCIS.2015.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KitajimaYNHO15,
  author       = {Nobuaki Kitajima and
                  Naoto Yanai and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Constructions of Fail-Stop Signatures for Multi-signer Setting},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {112--123},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.26},
  doi          = {10.1109/ASIAJCIS.2015.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KitajimaYNHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KosugiHM15,
  author       = {Tomoaki Kosugi and
                  Tomoki Hayafuji and
                  Masahiro Mambo},
  title        = {On the Traceability of the Accountable Anonymous Channel},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {6--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.29},
  doi          = {10.1109/ASIAJCIS.2015.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KosugiHM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuoWCC15,
  author       = {Wen{-}Chung Kuo and
                  Hong{-}Ji Wei and
                  Yu{-}Hui Chen and
                  Jiin{-}Chiou Cheng},
  title        = {An Enhanced Secure Anonymous Authentication Scheme Based on Smart
                  Cards and Biometrics for Multi-server Environments},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.11},
  doi          = {10.1109/ASIAJCIS.2015.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuoWCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiuGKO15,
  author       = {Yu Liu and
                  Nasato Goto and
                  Akira Kanaoka and
                  Eiji Okamoto},
  title        = {Privacy Preserved Rule-Based Risk Analysis through Secure Multi-party
                  Computation},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.32},
  doi          = {10.1109/ASIAJCIS.2015.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiuGKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LoCH15,
  author       = {Nai{-}Wei Lo and
                  Meng{-}Chih Chiang and
                  Chao Yang Hsu},
  title        = {Hash-Based Anonymous Secure Routing Protocol in Mobile Ad Hoc Networks},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {55--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.27},
  doi          = {10.1109/ASIAJCIS.2015.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LoCH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LoYH15,
  author       = {Nai{-}Wei Lo and
                  Chi{-}Kai Yu and
                  Chao Yang Hsu},
  title        = {Intelligent Display Auto-Lock Scheme for Mobile Devices},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {48--54},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.30},
  doi          = {10.1109/ASIAJCIS.2015.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LoYH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/RuanTHLL15,
  author       = {He{-}Ming Ruan and
                  Ming{-}Hwa Tsai and
                  Yennun Huang and
                  Yen{-}Hua Liao and
                  Chin{-}Laung Lei},
  title        = {Discovery of De-identification Policies Considering Re-identification
                  Risks and Information Loss},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.23},
  doi          = {10.1109/ASIAJCIS.2015.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/RuanTHLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TingHWL15,
  author       = {Pei{-}Yih Ting and
                  Shao{-}Da Huang and
                  Tzong{-}Sun Wu and
                  Han{-}Yu Lin},
  title        = {A Provable Watermark-Based Copyright Protection Scheme},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {124--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.28},
  doi          = {10.1109/ASIAJCIS.2015.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TingHWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangS15,
  author       = {Chih Hung Wang and
                  Hsiao Chien Sung},
  title        = {Delegation-Based Roaming Payment Protocol with Location and Purchasing
                  Privacy Protection},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {97--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.25},
  doi          = {10.1109/ASIAJCIS.2015.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2015,
  title        = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7153314/proceeding},
  isbn         = {978-1-4799-1989-5},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanSHJH14,
  author       = {Chun{-}I Fan and
                  Wei{-}Zhe Sun and
                  Shih{-}Wei Huang and
                  Wen{-}Shenq Juang and
                  Jheng{-}Jia Huang},
  title        = {Strongly Privacy-Preserving Communication Protocol for VANETs},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.24},
  doi          = {10.1109/ASIAJCIS.2014.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanSHJH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanWHTC14,
  author       = {Chun{-}I Fan and
                  Chien{-}Nan Wu and
                  Jen{-}Chun Hsu and
                  Yi{-}Fan Tseng and
                  Wen{-}Tsuen Chen},
  title        = {Anonymous Credential Scheme Supporting Active Revocation},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {127--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.17},
  doi          = {10.1109/ASIAJCIS.2014.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanWHTC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FurutaniBNSKO14,
  author       = {Nobuaki Furutani and
                  Tao Ban and
                  Junji Nakazato and
                  Jumpei Shimamura and
                  Jun Kitazono and
                  Seiichi Ozawa},
  title        = {Detection of DDoS Backscatter Based on Traffic Features of Darknet
                  {TCP} Packets},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {39--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.23},
  doi          = {10.1109/ASIAJCIS.2014.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FurutaniBNSKO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GotoKOO14,
  author       = {Nasato Goto and
                  Akira Kanaoka and
                  Masayuki Okada and
                  Eiji Okamoto},
  title        = {{METRO:} Measurement of End-to-End Route Trust},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.16},
  doi          = {10.1109/ASIAJCIS.2014.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GotoKOO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GuanC14,
  author       = {D. J. Guan and
                  Yu{-}Shan Cheng},
  title        = {Parity Detection for Some Three-Modulus Residue Number System},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {76--81},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.13},
  doi          = {10.1109/ASIAJCIS.2014.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GuanC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangC14,
  author       = {Teng Yu Huang and
                  Hung{-}Yu Chien},
  title        = {Gen2v2-Security-and-Privacy-Features-Leveraged Application Designs},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {141--147},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.31},
  doi          = {10.1109/ASIAJCIS.2014.31},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuangC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuangKY14,
  author       = {Yu{-}Chih Huang and
                  Wen{-}Chung Kuo and
                  Ching{-}Nung Yang},
  title        = {Data Hiding Based on Radix-2},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {170--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.22},
  doi          = {10.1109/ASIAJCIS.2014.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuangKY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KikuchiIUYO14,
  author       = {Hiroaki Kikuchi and
                  Kouichi Itoh and
                  Mebae Ushida and
                  Yuji Yamaoka and
                  Takanori Oikawa},
  title        = {Secret Sharing Scheme with Efficient Keyword Search for Cloud Storage},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {164--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.33},
  doi          = {10.1109/ASIAJCIS.2014.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KikuchiIUYO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Kim14,
  author       = {Jihong Kim},
  title        = {On the False Positive Rate of the Bloom Filter in Case of Using Multiple
                  Hash Functions},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {26--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.32},
  doi          = {10.1109/ASIAJCIS.2014.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Kim14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuriharaK14,
  author       = {Keiichirou Kurihara and
                  Kazuki Katagishi},
  title        = {A Simple Detection Method for DoS Attacks Based on {IP} Packets Entropy
                  Values},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {44--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.20},
  doi          = {10.1109/ASIAJCIS.2014.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuriharaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuzunoM14,
  author       = {Hiroki Kuzuno and
                  Kenichi Magata},
  title        = {Detecting Advertisement Module Network Behavior with Graph Modeling},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.26},
  doi          = {10.1109/ASIAJCIS.2014.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuzunoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiLZ14,
  author       = {Juanjuan Li and
                  Zhenhua Liu and
                  Longhui Zu},
  title        = {Chosen-Ciphertext Secure Multi-use Unidirectional Attribute-Based
                  Proxy Re-Encryptions},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {96--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.15},
  doi          = {10.1109/ASIAJCIS.2014.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LinLLC14,
  author       = {Chu{-}Hsing Lin and
                  Jung{-}Chun Liu and
                  Cheng{-}Chieh Li and
                  Po{-}Wei Chu},
  title        = {Parallel Modulus Operations in {RSA} Encryption by {CPU/GPU} Hybrid
                  Computation},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {71--75},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.25},
  doi          = {10.1109/ASIAJCIS.2014.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LinLLC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiuYL14,
  author       = {Zengguang Liu and
                  Xiaochun Yin and
                  Hoonjae Lee},
  title        = {An Efficient Defense Scheme against {SIP} DoS Attack in {SDN} Using
                  Cloud {SFW}},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {52--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.12},
  doi          = {10.1109/ASIAJCIS.2014.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiuYL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MatsumotoS14,
  author       = {Shinichi Matsumoto and
                  Kouichi Sakurai},
  title        = {Acquisition of Evidence of Web Storage in {HTML5} Web Browsers from
                  Memory Image},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {148--155},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.30},
  doi          = {10.1109/ASIAJCIS.2014.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MatsumotoS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MatsunakaKK14,
  author       = {Takashi Matsunaka and
                  Ayumu Kubota and
                  Takahiro Kasama},
  title        = {An Approach to Detect Drive-By Download by Observing the Web Page
                  Transition Behaviors},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {19--25},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.21},
  doi          = {10.1109/ASIAJCIS.2014.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MatsunakaKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MiyajiRS14,
  author       = {Atsuko Miyaji and
                  Mazumder Rashed and
                  Tsuyoshi Sawada},
  title        = {A New (n, n) Blockcipher Hash Function: Apposite for Short Messages},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {56--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.27},
  doi          = {10.1109/ASIAJCIS.2014.27},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MiyajiRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/PengRZC14,
  author       = {Shengbo Peng and
                  Ou Ruan and
                  Jing Zhou and
                  Zaixing Chen},
  title        = {A New Identity-Based Authentication Scheme for {SIP}},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {90--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.14},
  doi          = {10.1109/ASIAJCIS.2014.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/PengRZC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/QiuHL14,
  author       = {Junjie Qiu and
                  Gi{-}Hyun Hwang and
                  Hoonjae Lee},
  title        = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {104--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.11},
  doi          = {10.1109/ASIAJCIS.2014.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/QiuHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/RenL14,
  author       = {Si{-}Wei Ren and
                  Ke{-}Wei Lu},
  title        = {Bit Security for Lucas-Based One-Way Function},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {111--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.9},
  doi          = {10.1109/ASIAJCIS.2014.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/RenL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/RuanL14,
  author       = {He{-}Ming Ruan and
                  Chin{-}Laung Lei},
  title        = {Fine-Grained Audit Privilege Control for Integrity Audit on Cloud
                  Storage},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {156--163},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.28},
  doi          = {10.1109/ASIAJCIS.2014.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/RuanL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangFKHS14,
  author       = {Can Wang and
                  Yaokai Feng and
                  Junpei Kawamoto and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {A Parameterless Learning Algorithm for Behavior-Based Detection},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {11--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.29},
  doi          = {10.1109/ASIAJCIS.2014.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangFKHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangX14,
  author       = {Yufeng Wang and
                  Jing Xu},
  title        = {Overview on Privacy-Preserving Profile-Matching Mechanisms in Mobile
                  Social Networks in Proximity {(MSNP)}},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {133--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.18},
  doi          = {10.1109/ASIAJCIS.2014.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YuanHGQ14,
  author       = {Yuheng Yuan and
                  Zhenzhong He and
                  Zheng Gong and
                  Weidong Qiu},
  title        = {Acceleration of {AES} Encryption with OpenCL},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {64--70},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.19},
  doi          = {10.1109/ASIAJCIS.2014.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YuanHGQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Zhou14,
  author       = {Caixue Zhou},
  title        = {Provably Secure and Efficient Multi-receiver Identity-Based Generalized
                  Signcryption Scheme},
  booktitle    = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  pages        = {82--88},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/AsiaJCIS.2014.10},
  doi          = {10.1109/ASIAJCIS.2014.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Zhou14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2014,
  title        = {Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014,
                  Wuhan, China, September 3-5, 2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7001440/proceeding},
  isbn         = {978-1-4799-5733-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/BanIGIN13,
  author       = {Tao Ban and
                  Ryoichi Isawa and
                  Shanqing Guo and
                  Daisuke Inoue and
                  Koji Nakao},
  title        = {Efficient Malware Packer Identification Using Support Vector Machines
                  with Spectrum Kernel},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {69--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.18},
  doi          = {10.1109/ASIAJCIS.2013.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/BanIGIN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChangCLHW13,
  author       = {Ya{-}Ting Chang and
                  Min{-}Ju Chung and
                  Chin{-}Feng Lee and
                  Cheng{-}Ta Huang and
                  Shiuh{-}Jeng Wang},
  title        = {Memory Forensics for Key Evidence Investigations in Case Illustrations},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {96--101},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.22},
  doi          = {10.1109/ASIAJCIS.2013.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChangCLHW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenHLW13,
  author       = {Kung Chen and
                  Tsan{-}sheng Hsu and
                  Churn{-}Jung Liau and
                  Da{-}Wei Wang},
  title        = {A Scripting Language for Automating Secure Multiparty Computation},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {127--134},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.27},
  doi          = {10.1109/ASIAJCIS.2013.27},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenHLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenTY13,
  author       = {Chung{-}Nan Chen and
                  Raylin Tso and
                  Chung{-}Huang Yang},
  title        = {Design and Implementation of Digital Forensic Software for iPhone},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {90--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.21},
  doi          = {10.1109/ASIAJCIS.2013.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Chien13,
  author       = {Hung Yu Chien},
  title        = {Cryptanalysis on {RFID} Authentications Using Minimum Disclosure Approach},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {33--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.13},
  doi          = {10.1109/ASIAJCIS.2013.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Chien13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChinBHP13,
  author       = {Ji{-}Jian Chin and
                  Rouzbeh Behnia and
                  Swee{-}Huay Heng and
                  Raphael Chung{-}Wei Phan},
  title        = {An Efficient and Provable Secure Security-Mediated Identity-Based
                  Identification Scheme},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {27--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.12},
  doi          = {10.1109/ASIAJCIS.2013.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChinBHP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/FanHHT13,
  author       = {Chun{-}I Fan and
                  Pei{-}Hsiu Ho and
                  Jheng{-}Jia Huang and
                  Yi{-}Fan Tseng},
  title        = {Secure Certificateless Signature Scheme Supporting Batch Verification},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {8--11},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.9},
  doi          = {10.1109/ASIAJCIS.2013.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/FanHHT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/GuanTZ13,
  author       = {D. J. Guan and
                  Chen{-}Yu Tsai and
                  Er{-}Shuo Zhuang},
  title        = {Detect Zero by Using Symmetric Homomorphic Encryption},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.8},
  doi          = {10.1109/ASIAJCIS.2013.8},
  timestamp    = {Thu, 26 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/GuanTZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuMT13,
  author       = {Rong Hu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  title        = {On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {12--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.10},
  doi          = {10.1109/ASIAJCIS.2013.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Juang13,
  author       = {Wen{-}Shenq Juang},
  title        = {An Efficient and Practical Fair Buyer-Anonymity Exchange Scheme Using
                  Bilinear Pairings},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {19--26},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.11},
  doi          = {10.1109/ASIAJCIS.2013.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Juang13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KaoKP13,
  author       = {Ming{-}Chih Kao and
                  Wen{-}Chung Kuo and
                  Yu{-}Hsuan Pan},
  title        = {Automatic Adding License Management Functionality for Android Applications},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {122--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.26},
  doi          = {10.1109/ASIAJCIS.2013.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KaoKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/MatsunakaUK13,
  author       = {Takashi Matsunaka and
                  Junpei Urakawa and
                  Ayumu Kubota},
  title        = {Detecting and Preventing Drive-By Download Attack via Participative
                  Monitoring of the Web},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {48--55},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.15},
  doi          = {10.1109/ASIAJCIS.2013.15},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/MatsunakaUK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Mawudor13,
  author       = {Bright Gameli Mawudor},
  title        = {Present Cyber Threat Management (Methodologies to Mitigate Evolving
                  Cyber-Attacks)},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {115--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.24},
  doi          = {10.1109/ASIAJCIS.2013.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Mawudor13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/PaYM13,
  author       = {Yin Minn Pa Pa and
                  Katsunari Yoshioka and
                  Tsutomu Matsumoto},
  title        = {Search Engine Based Investigation on Misconfiguration of Zone Transfer},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {56--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.16},
  doi          = {10.1109/ASIAJCIS.2013.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/PaYM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SuWLW13,
  author       = {Ke{-}Wei Su and
                  Kuo{-}Ping Wu and
                  Hahn{-}Ming Lee and
                  Te{-}En Wei},
  title        = {Suspicious {URL} Filtering Based on Logistic Regression with Multi-view
                  Analysis},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {77--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.19},
  doi          = {10.1109/ASIAJCIS.2013.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SuWLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TakahashiYMKY13,
  author       = {Hiroya Takahashi and
                  Kenji Yasunaga and
                  Masahiro Mambo and
                  Kwangjo Kim and
                  Heung Youl Youm},
  title        = {Preventing Abuse of Cookies Stolen by {XSS}},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {85--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.20},
  doi          = {10.1109/ASIAJCIS.2013.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TakahashiYMKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WangY13,
  author       = {Chih{-}Hung Wang and
                  Ji{-}Min Yang},
  title        = {Adaptive Feature-Weighted Alert Correlation System Applicable in Cloud
                  Environment},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {41--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.14},
  doi          = {10.1109/ASIAJCIS.2013.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WangY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WengYFLS13,
  author       = {Chi{-}Yao Weng and
                  Cheng{-}Hsing Yang and
                  Chun{-}I Fan and
                  Kuan{-}Liang Liu and
                  Hung{-}Min Sun},
  title        = {Histogram-Based Reversible Information Hiding Improved by Prediction
                  with the Variance to Enhance Image Quality},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {102--107},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.23},
  doi          = {10.1109/ASIAJCIS.2013.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WengYFLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YamauchiHS13,
  author       = {Kazumasa Yamauchi and
                  Yoshiaki Hori and
                  Kouichi Sakurai},
  title        = {Detecting HTTP-Based Botnet Based on Characteristic of the {C} {\&}
                  {C} Session Using by {SVM}},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {63--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.17},
  doi          = {10.1109/ASIAJCIS.2013.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YamauchiHS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ZiauddinM13,
  author       = {Sheikh Ziauddin and
                  Bruno Martin},
  title        = {Formal Analysis of {ISO/IEC} 9798-2 Authentication Standard Using
                  {AVISPA}},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {108--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.25},
  doi          = {10.1109/ASIAJCIS.2013.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ZiauddinM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2013,
  title        = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6621628/proceeding},
  isbn         = {978-0-7695-5075-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Ando12,
  author       = {Ruo Ando},
  title        = {Flaw and Configuration Analysis of Cloud Component Using First Order
                  Logic},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {104--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.25},
  doi          = {10.1109/ASIAJCIS.2012.25},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Ando12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChangHL12,
  author       = {Chin{-}Chen Chang and
                  Ngoc{-}Tu Huynh and
                  Chia{-}Chun Lin},
  title        = {Strong Tamper-Localization, Visual Secret Sharing Scheme Based on
                  Exploiting Modification Direction},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {10--16},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.9},
  doi          = {10.1109/ASIAJCIS.2012.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChangHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChangLC12,
  author       = {Chin{-}Chen Chang and
                  Hai{-}Duong Le and
                  Ching{-}Hsiang Chang},
  title        = {Mobile Friendly and Highly Efficient Remote User Authenticated Key
                  Agreement Protocol Featuring Untraceability},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {38--43},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.14},
  doi          = {10.1109/ASIAJCIS.2012.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChangLC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenGHO12,
  author       = {Chia{-}Mei Chen and
                  D. J. Guan and
                  Yu{-}Zhi Huang and
                  Ya{-}Hui Ou},
  title        = {Attack Sequence Detection in Cloud Using Hidden Markov Model},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {100--103},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.24},
  doi          = {10.1109/ASIAJCIS.2012.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenGHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/ChenWTC12,
  author       = {Chung{-}Wei Chen and
                  Shiuh{-}Jeng Wang and
                  Yuh{-}Ren Tsai and
                  Hsing{-}Chung Chen},
  title        = {Fast-Refreshing Tree-Based Group Key Agreement for Mobile Ad Hoc Networks},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {51--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.16},
  doi          = {10.1109/ASIAJCIS.2012.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/ChenWTC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/EtoISN12,
  author       = {Masashi Eto and
                  Daisuke Inoue and
                  Mio Suzuki and
                  Koji Nakao},
  title        = {Multipurpose Network Monitoring Platform Using Dynamic Address Assignment},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {79--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.21},
  doi          = {10.1109/ASIAJCIS.2012.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/EtoISN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HiroguchiKSK12,
  author       = {N. Hiroguchi and
                  Hiroaki Kikuchi and
                  Khamphao Sisaat and
                  Surin Kittitornkun},
  title        = {Geographical Visualization of Malware Download for Anomaly Detection},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {74--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.20},
  doi          = {10.1109/ASIAJCIS.2012.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HiroguchiKSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/JeongW12,
  author       = {Hanjae Jeong and
                  Dongho Won},
  title        = {A Study on Method to Analyze Application on Bada Using {GUI} without
                  Source Code},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {70--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.19},
  doi          = {10.1109/ASIAJCIS.2012.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/JeongW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuoK12,
  author       = {Wen{-}Chung Kuo and
                  Shao{-}Hung Kuo},
  title        = {Reversible Data Hiding for {JPEG} Based on {EMD}},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.7},
  doi          = {10.1109/ASIAJCIS.2012.7},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KuoRCL12,
  author       = {Chien{-}Ting Kuo and
                  He{-}Ming Ruan and
                  Shih{-}Jen Chen and
                  Chin{-}Laung Lei},
  title        = {An Analysis of Security Patch Lifecycle Using Google Trend Tool},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {31--34},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.12},
  doi          = {10.1109/ASIAJCIS.2012.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KuoRCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LeeSH12,
  author       = {Chin{-}Feng Lee and
                  Ming{-}Chi Shih and
                  Cheng{-}Ta Huang},
  title        = {An Efficient Lossless Data Hiding Scheme on {VQ} Index Coding},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {6--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.8},
  doi          = {10.1109/ASIAJCIS.2012.8},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LeeSH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/LiOOH12,
  author       = {Ruidong Li and
                  Masaaki Ohnishi and
                  Yasunori Owada and
                  Hiroaki Harai},
  title        = {{PDAF:} Proactive Distributed Authentication Framework for Regional
                  Network},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {44--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.15},
  doi          = {10.1109/ASIAJCIS.2012.15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/LiOOH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/RuanCL12,
  author       = {He{-}Ming Ruan and
                  Yu{-}Shian Chen and
                  Chin{-}Laung Lei},
  title        = {Data Integrity on Remote Storage for On-line Co-working},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {92--99},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.23},
  doi          = {10.1109/ASIAJCIS.2012.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/RuanCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/SatoK12,
  author       = {Tomoki Sato and
                  Hiroaki Kikuchi},
  title        = {Synthesis of Secure Passwords},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {35--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.13},
  doi          = {10.1109/ASIAJCIS.2012.13},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/SatoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/Suga12,
  author       = {Yuji Suga},
  title        = {{SSL/TLS} Status Survey in Japan - Transitioning against the Renegotiation
                  Vulnerability and Short {RSA} Key Length Problem},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {17--24},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.10},
  doi          = {10.1109/ASIAJCIS.2012.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/Suga12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TsukauneTM12,
  author       = {T. Tsukaune and
                  Yosuke Todo and
                  Masakatu Morii},
  title        = {Proposal of a Secure {WEP} Operation against Existing Key Recovery
                  Attacks and its Evaluation},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {25--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.11},
  doi          = {10.1109/ASIAJCIS.2012.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TsukauneTM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WorkuTQ12,
  author       = {S. G. Worku and
                  Zhong Ting and
                  Zhiguang Qin},
  title        = {Survey on Cloud Data Integrity Proof Techniques},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {85--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.22},
  doi          = {10.1109/ASIAJCIS.2012.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WorkuTQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/WuMWLW12,
  author       = {Dong{-}Jie Wu and
                  Ching{-}Hao Mao and
                  Te{-}En Wei and
                  Hahn{-}Ming Lee and
                  Kuo{-}Ping Wu},
  title        = {DroidMat: Android Malware Detection through Manifest and {API} Calls
                  Tracing},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {62--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.18},
  doi          = {10.1109/ASIAJCIS.2012.18},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/WuMWLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YehLWYL12,
  author       = {Kuo{-}Hui Yeh and
                  Nai{-}Wei Lo and
                  Tzong{-}Chen Wu and
                  Ta{-}Chi Yang and
                  Horng{-}Twu Liaw},
  title        = {Analysis of an eHealth Care System with Smart Card Based Authentication},
  booktitle    = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  pages        = {59--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/AsiaJCIS.2012.17},
  doi          = {10.1109/ASIAJCIS.2012.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YehLWYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiajcis/2012,
  title        = {Seventh Asia Joint Conference on Information Security, AsiaJCIS 2012,
                  Kaohsiung, Taiwan, August 9-10, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6296578/proceeding},
  isbn         = {978-0-7695-4776-3},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}