AsiaJCIS 2025: Volume InformationProceedings of the 20th Asia Joint Conference on Information Security18 articles•220 pages•Published: August 21, 2025 PapersYuki Sawai, Kyoichi Asano, Yohei Watanabe and Mitsugu Iwamoto 1-15 | Towa Tsujimura and Atsuko Miyaji 16-30 | Mizuki Hayashi and Keita Emura 31-39 | Kenjiro Hirose, Shinya Okumura and Atsuko Miyaji 40-54 | Chik How Tan and Theo Fanuela Prabowo 55-69 | Pei-Shiun Tsai, Tzu-Yu Liao, Wei-Rung Chen, Jason Lin and Iuon-Chang Lin 70-83 | Hai Liang, Wenkang Tao, Yujue Wang, Shuo Wang, Yu Xu and Xinyong Peng 84-98 | Naoki Shibayama and Yasutaka Igarashi 99-113 | Yao Yu Lee and Albert Guan 114-121 | Yi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai and Zi-Yuan Liu 122-132 | Gunsang You, Yeontae Ji and Heung Youl Youm 133-143 | Hinata Nishino, Kazumasa Omote and Keita Emura 144-154 | Shih-Pei Kao, Yi-Fan Tseng, Tien-Lin Tsai, Yi-Jiin Lu, Jheng-Jia Huang, Guan-Yu Chen and Wei-Hsueh Wang 155-164 | Yuto Tsujimoto and Atsuko Miyaji 165-175 | Wibby Aldryani Astuti Praditasari, Hyungyeop Kim, Hyejin Yoon, Danang Rimbawa and Okyeon Yi 176-186 | Kwangjo Kim 187-198 | Koki Miura and Hiroaki Kikuchi 199-209 | Ayako Sasaki, Takeshi Takahashi, Keisuke Furumoto, Chun-I Fan and Tomohiro Morikawa 210-220 |
KeyphrasesAnonymous, attribute-based encryption, Autoencoder-Based Security, Biometrics, BKW Algorithm, block cipher, Blockchain, Circular Transmission, code-based cryptography, commitment, cross-domain authentication, Cryptanalysis, data privacy, DDH, designated tester, dynamic optimization, Dynamic Time Warping, Execution Path Prediction, Falcon, feature representation, Flexible Authorization, gait authentication, GPV Framework, Hamming metric QC codes, higher-order differential attack, Hybrid NTT, insert, Integral attack, Key escrow problem, Key-Value Commitments, lattice-based cryptography2, Lightweight Real-Time Defense, local differential privacy, machine learning2, Nominative signatures, non-transferability, NTT, Number Theoretic Transform, Oblivious Accumulators, Phishing, Phishing Detection, phishing simulation, Piccolo, post-quantum cryptography2, Post-quantum signature, Predicate Encoding, Privacy, Public key encryption with equality test, Public Key Encryption with Keyword Search, Python Implementation, quantum secret sharing, Registration-based encryption, Ring-LWE, Side-Channel Attack Detection, signature, single photons, smart contract, SMOTE, Social Engineering, SOLMAE, standard model, SWAP gates, Symmetric Pairing, Tight security, traffic log classification, Trojan-horse attacks, unlinkability, Unsupervised Anomaly Detection, update, URL, Vehicle Fog Services, Virtual Reality, VOLE-based ZKP, Zero-knowledge range argument. |
|