DroPPPP: A P4 Approach to Mitigating DoS Attacks in SDN
|
2020 |
Simsek, Goksel |
A Secure and Self-tallying E-voting System Based on Blockchain
|
2020 |
Zeng, Gongxian |
Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing
|
2020 |
Wu, Hao-Tian |
Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression
|
2020 |
Hong, Mi Yeon |
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
|
2020 |
Park, Jeman |
Optimized SIKE Round 2 on 64-bit ARM
|
2020 |
Seo, Hwajeong |
Show Me Your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM
|
2020 |
Park, Kyung Ho |
FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking
|
2020 |
Kim, Hyuntae |
A Blind Ring Signature Based on the Short Integer Solution Problem
|
2020 |
Le, Huy Quoc |
Timed-Release Encryption with Master Time Bound Key
|
2020 |
Choi, Gwangbae |
Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof
|
2020 |
Kim, Jongkil |
CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network
|
2020 |
Kwon, Hyun |
Ring-LWE on 8-Bit AVR Embedded Processor
|
2020 |
Seo, Hwajeong |
Turn On the Lights: User Behavior in Game Environment Using CPTED
|
2020 |
Seo, Jeongeun |
QR Code Watermarking for Digital Images
|
2020 |
Chow, Yang-Wai |
An Extended CTRT for AES-256
|
2020 |
Shin, SeongHan |
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
|
2020 |
Loh, Jia-Ch'ng |
Secret Sharing on Evolving Multi-level Access Structure
|
2020 |
Dutta, Sabyasachi |
A New Password Cracking Model with Generative Adversarial Networks
|
2020 |
Nam, Sungyup |
Is it Possible to Hide My Key into Deep Neural Network?
|
2020 |
Kim, Taehyuk |