IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 108, Number 162

Information Security

Workshop Date : 2008-07-25 / Issue Date : 2008-07-18

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2008-35
Detecting of Unknown Computer Virus Variants Based on Computer Behavior
Haruka Mimori, Koki Abe (UEC)
pp. 1 - 8

ISEC2008-36
Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems
Ryoya Miyazawa, Koki Abe (UEC)
pp. 9 - 14

ISEC2008-37
A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT)
pp. 15 - 22

ISEC2008-38
Examination of the issues in designing of electronic signature documentation system
Miyuki Takao, Koichiro Hayashi (IISEC)
pp. 23 - 30

ISEC2008-39
Clone Resistance of Paper Artifact-Metrics with Segmented Matching
Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU)
pp. 31 - 36

ISEC2008-40
Architecture Optimization of a Group Signature Circuit
Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC)
pp. 37 - 44

ISEC2008-41
A Lattice Model of the General Confidentiality Policies
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
pp. 45 - 52

ISEC2008-42
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases
Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)
pp. 53 - 60

ISEC2008-43
Proposal of Anonymos Routing Technique with DHT
Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.)
pp. 61 - 68

ISEC2008-44
Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document
Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.)
pp. 69 - 74

ISEC2008-45
Implementation of Block Cipher Camellia with a Configurable and Extensible Processor
Kazuyoshi Matsuo, Koki Abe (UEC)
pp. 75 - 80

ISEC2008-46
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
pp. 81 - 86

ISEC2008-47
Hash Function Using MMO Compression Function and MDP Domain Extension
Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.)
pp. 87 - 94

ISEC2008-48
Traitor Tracing from ID based Broadcast Encryption
Ryuichi Sakai (OECU)
pp. 95 - 100

ISEC2008-49
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography
Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 101 - 108

ISEC2008-50
Invalidation of a Mailing-list Address against Spam
Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)
pp. 109 - 116

ISEC2008-51
Proposal of a Cue & Response Based User Authentication Using Unclear Image
Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 117 - 124

ISEC2008-52
Self expandable RBAC for distributed systems
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)
pp. 125 - 132

ISEC2008-53
Best Match Security -- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)
pp. 133 - 138

ISEC2008-54
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
pp. 139 - 146

ISEC2008-55
Watermarking Method with a Quasi-One-Way Function
Kazuo Ohzeki, Engyoku Gi (SIT)
pp. 147 - 154

ISEC2008-56
Ring Authenticated Group Key Establishment with Member Repudiation
Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 155 - 162

ISEC2008-57
A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack
Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
pp. 163 - 168

ISEC2008-58
Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.)
pp. 169 - 176

ISEC2008-59
A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree
Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
pp. 177 - 182

ISEC2008-60
A Study on Detecting Information Leak Virus by Activity Monitoring
Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.)
pp. 183 - 188

ISEC2008-61
Development of publicity function of the illegitimate activity host by the IP marking
Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
pp. 189 - 194

ISEC2008-62
P2P Node Detection method based on Connection Analysis
Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.)
pp. 195 - 200

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan