AsiaJCIS 2025: Volume Information

Proceedings of the 20th Asia Joint Conference on Information Security

18 articles220 pagesPublished: August 21, 2025

Papers

Yuki Sawai, Kyoichi Asano, Yohei Watanabe and Mitsugu Iwamoto
1-15
Towa Tsujimura and Atsuko Miyaji
16-30
Mizuki Hayashi and Keita Emura
31-39
Kenjiro Hirose, Shinya Okumura and Atsuko Miyaji
40-54
Chik How Tan and Theo Fanuela Prabowo
55-69
Pei-Shiun Tsai, Tzu-Yu Liao, Wei-Rung Chen, Jason Lin and Iuon-Chang Lin
70-83
Hai Liang, Wenkang Tao, Yujue Wang, Shuo Wang, Yu Xu and Xinyong Peng
84-98
Naoki Shibayama and Yasutaka Igarashi
99-113
Yao Yu Lee and Albert Guan
114-121
Yi-Fan Tseng, Yi-Jiin Lu, Tien-Lin Tsai and Zi-Yuan Liu
122-132
Gunsang You, Yeontae Ji and Heung Youl Youm
133-143
Hinata Nishino, Kazumasa Omote and Keita Emura
144-154
Shih-Pei Kao, Yi-Fan Tseng, Tien-Lin Tsai, Yi-Jiin Lu, Jheng-Jia Huang, Guan-Yu Chen and Wei-Hsueh Wang
155-164
Yuto Tsujimoto and Atsuko Miyaji
165-175
Wibby Aldryani Astuti Praditasari, Hyungyeop Kim, Hyejin Yoon, Danang Rimbawa and Okyeon Yi
176-186
Kwangjo Kim
187-198
Koki Miura and Hiroaki Kikuchi
199-209
Ayako Sasaki, Takeshi Takahashi, Keisuke Furumoto, Chun-I Fan and Tomohiro Morikawa
210-220

Keyphrases

Anonymous, attribute-based encryption, Autoencoder-Based Security, Biometrics, BKW Algorithm, block cipher, Blockchain, Circular Transmission, code-based cryptography, commitment, cross-domain authentication, Cryptanalysis, data privacy, DDH, designated tester, dynamic optimization, Dynamic Time Warping, Execution Path Prediction, Falcon, feature representation, Flexible Authorization, gait authentication, GPV Framework, Hamming metric QC codes, higher-order differential attack, Hybrid NTT, insert, Integral attack, Key escrow problem, Key-Value Commitments, lattice-based cryptography2, Lightweight Real-Time Defense, local differential privacy, machine learning2, Nominative signatures, non-transferability, NTT, Number Theoretic Transform, Oblivious Accumulators, Phishing, Phishing Detection, phishing simulation, Piccolo, post-quantum cryptography2, Post-quantum signature, Predicate Encoding, Privacy, Public key encryption with equality test, Public Key Encryption with Keyword Search, Python Implementation, quantum secret sharing, Registration-based encryption, Ring-LWE, Side-Channel Attack Detection, signature, single photons, smart contract, SMOTE, Social Engineering, SOLMAE, standard model, SWAP gates, Symmetric Pairing, Tight security, traffic log classification, Trojan-horse attacks, unlinkability, Unsupervised Anomaly Detection, update, URL, Vehicle Fog Services, Virtual Reality, VOLE-based ZKP, Zero-knowledge range argument.