IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 475

Information and Communication System Security

Workshop Date : 2011-03-25 / Issue Date : 2011-03-18

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2010-56
On a Data Sensitivity Diagnosis
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.)
pp. 1 - 4

ICSS2010-57
Proposal of an Order Preserving Encryption for Anonymity
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.)
pp. 5 - 10

ICSS2010-58
Security Level Evaluation of Quaternion Based Hash Function
Tomohiro Suto, Tomoyuki Nagase (Hirosaki Unv.)
pp. 11 - 16

ICSS2010-59
On Security Model of Cryptographic Protocols for Mobile Devices
Shin'ichiro Matsuo (NICT)
pp. 17 - 21

ICSS2010-60
Consideration on hidden-communication channel in the Internet communication device.
Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.)
pp. 23 - 28

ICSS2010-61
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.)
pp. 29 - 34

ICSS2010-62
Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Networks
Iichiro Nishimura, Tomoyuki Nagase (Hirosaki Unv.)
pp. 35 - 40

ICSS2010-63
Automatic Unpacking Based on Entropy of Memory-Access Values
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.)
pp. 41 - 46

ICSS2010-64
Development and evaluation of PDF malware analysis system using dynamic analysis
Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.)
pp. 47 - 52

ICSS2010-65
Network Observation and Analysis Report on nicter -- Transition Analysis of Cyber Attacks Based on Long-term Observation --
Junji Nakazato (NICT), Jumpei Shimamura (For Schooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)
pp. 53 - 58

ICSS2010-66
Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring
Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT)
pp. 59 - 64

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan