000924954 000__ 04567cam\a2200481Ii\4500 000924954 001__ 924954 000924954 005__ 20230306151203.0 000924954 006__ m\\\\\o\\d\\\\\\\\ 000924954 007__ cr\nn\nnnunnun 000924954 008__ 200128s2020\\\\sz\a\\\\o\\\\\101\0\eng\d 000924954 020__ $$a9783030393038$$q(electronic book) 000924954 020__ $$a3030393038$$q(electronic book) 000924954 020__ $$z9783030393021 000924954 0248_ $$a10.1007/978-3-030-39 000924954 035__ $$aSP(OCoLC)on1137827330 000924954 035__ $$aSP(OCoLC)1137827330 000924954 040__ $$aLQU$$beng$$cLQU$$dGW5XE$$dOCLCO 000924954 049__ $$aISEA 000924954 050_4 $$aQA76.9.A25 000924954 08204 $$a005.8 000924954 1112_ $$aWISA (Workshop : Information security)$$n(20th :$$d2019 :$$cCheju Island, Korea) 000924954 24510 $$aInformation security applications :$$b20th International Conference, WISA 2019, Jeju Island, South Korea, August 21-24, 2019, Revised selected papers /$$cIlsun You (ed.). 000924954 2463_ $$aWISA 2019 000924954 264_1 $$aCham :$$bSpringer,$$c2020. 000924954 300__ $$a1 online resource (xiii, 384 pages) :$$billustrations. 000924954 336__ $$atext$$btxt$$2rdacontent 000924954 337__ $$acomputer$$bc$$2rdamedia 000924954 338__ $$aonline resource$$bcr$$2rdacarrier 000924954 4901_ $$aLecture notes in computer science ;$$v11897 000924954 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000924954 500__ $$aIncludes author index. 000924954 5050_ $$aShow me your Account: Detecting MMORPG Game Bot Leveraging Financial Analysis with LSTM -- Turn On the Lights: User Behavior in Game Environment Using CPTED -- QR Code Watermarking for Digital Images -- FSF: Code Coverage-Driven Fuzzing for Software-Defined Networking -- DroPPP: A P4 Approach to Mitigating DoS Attacks in SDN -- A Secure and Self-Tallying E-Voting System Based on Blockchain -- An Extended CTRT for AES-256 -- A Blind Ring Signature Based on the Short Integer Solution Problem -- A Note on the Invisibility and Anonymity of Undeniable Signature Schemes -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR -- Catching the Phish: Detecting Phishing Attacks Using Recurrent Neural Networks (RNSS) -- CAPTCHA Image Generation Using Style Transfer Learning in Deep Neural Network -- A New Password Cracking Model with Generative Adversarial Networks -- Reversible Data Hiding in Homomorphic Encrypted Images Without Preprocessing -- Model Selection for Data Analysis in Encrypted Domain: Application to Simple Linear Regression -- Timed-Release Encryption with Master Time Bound Key -- Is it Possible to Hide My Key into Deep Neural Network -- RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices -- On the Automation of Security Testing for IoT Constrained Scenarios -- Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments -- Secret Sharing on Evolving Multi-Level Access Structure -- Strengthened PAKE Protocols Secure Against Malicious Private Key Generator -- Efficient Decentralized Random Commitment Key Generation for Mixnet Shuffle Proof -- Ring-LWE on 8-bit AVR Embedded Processor -- Low-Noise LLC Side-Channel Attack with Perf -- Optimized SIKE Round 2 on 64-bit ARM -- Shedding Light on Dark Korea: An In-Depth Analysis and Profiling of the Dark Web in Korea -- An SGX-Based Key Management Framework for Data Centric Networking -- Zero-Knowledge Proof System for Fully Anonymous Attribute Based Group Signatures from Lattices with VLR. 000924954 506__ $$aAccess limited to authorized users. 000924954 520__ $$aThis book constitutes the thoroughly refereed post-conference proceedings of the 20th International Conference on Information Security Applications, WISA 2019, held on Jeju Island, South Korea, in August 2019. The 29 revised full papers presented in this volume were carefully reviewed and selected from 63 submissions. The primary focus of WISA 2019 was on systems and network security including all other technical and practical aspects of security application in general. The papers are grouped in the following topical sections: Application and Game Security; Network Security and Blockchain; Cryptography; Security with AI and Machine Learning; IoT Security; Hardware Security; and Selected Security Issues. 000924954 650_0 $$aComputer security$$vCongresses. 000924954 650_0 $$aData protection$$vCongresses. 000924954 7001_ $$aYou, Ilsun. 000924954 830_0 $$aLecture notes in computer science ;$$v11897. 000924954 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000924954 852__ $$bebk 000924954 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-39303-8$$zOnline Access$$91397441.1 000924954 909CO $$ooai:library.usi.edu:924954$$pGLOBAL_SET 000924954 980__ $$aEBOOK 000924954 980__ $$aBIB 000924954 982__ $$aEbook 000924954 983__ $$aOnline 000924954 994__ $$a92$$bISE