IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 266

Information and Communication System Security

Workshop Date : 2010-11-05 / Issue Date : 2010-10-29

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2010-44
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application
Masakazu Soshi (Hiroshima City Univ.)
pp. 1 - 5

ICSS2010-45
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks
Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.)
pp. 7 - 10

ICSS2010-46
Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO)
pp. 11 - 15

ICSS2010-47
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST)
pp. 17 - 22

ICSS2010-48
A Timed-Release Proxy Re-Encryption Scheme and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST)
pp. 23 - 28

ICSS2010-49
Ontological Approach toward Cybersecurity in Cloud Computing
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW)
pp. 29 - 34

ICSS2010-50
Network Topology Analysys for Web Malware Risk Assesment
Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba)
pp. 35 - 40

ICSS2010-51
A Document Access Control Model Based on Role and Security Policy
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.)
pp. 41 - 46

ICSS2010-52
Development of Multifactor Authentication Platform with a Single Sign-On Function
Jiro Yamada, Satoshi Yagi, Isoo Ueno, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications)
pp. 47 - 52

ICSS2010-53
Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT)
pp. 53 - 58

ICSS2010-54
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation
Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)
pp. 59 - 64

ICSS2010-55
A Method of Sandbox Analysis of Malware Acting with Use of Online Services
Kousuke Murakami, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 65 - 70

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan