IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 114, Number 70

Internet Architecture

Workshop Date : 2014-06-05 - 2014-06-06 / Issue Date : 2014-05-29

[PREV] [NEXT]

[TOP] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IA2014-1
[Invited Talk] A two-path authentication for protecting net banking against illegal access -- How to prevent Man-In-The-Middle/Browser Attack --
Haruhiko Fujii (NTT)
pp. 1 - 5

IA2014-2
[Invited Talk] Threat and Countermeasure Against the Targeted Attack
Satoru Torii (Fujitsu Labs.)
pp. 7 - 8

IA2014-3
Attack on Knapsack Cryptography by Using Intermediary Plaintext
Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.)
pp. 9 - 14

IA2014-4
Higher Order Monomial Attack to FEAL-4
Toshinobu Kaneko (TUS)
pp. 15 - 20

IA2014-5
Malicious Web Site Detection Based on Redirection Control using Client Environment
Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT)
pp. 21 - 26

IA2014-6
Development of an Environment-independent Dynamic Analysis System for Document Malware
Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)
pp. 27 - 32

IA2014-7
Ransomware: Threat Analysis and Countermeasures
Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.)
pp. 33 - 38

IA2014-8
Analyzing Dynamic Class Loaded Applications in Android
Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT)
pp. 39 - 44

IA2014-9
Study on Comparison Regarding Schemes of Information-centric Networking
Daisuke Matsubara (Hitachi), Satoru Okamoto, Naoaki Yamanaka (Keio Univ.), Tatsuro Takahashi (Kyoto Univ.)
pp. 45 - 47

IA2014-10
Implementation of the Administration Policy Description Method on Automatic Network Organization System
Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.)
pp. 49 - 54

IA2014-11
Shared Nothing Secure Programming in Erlang/OTP
Kenji Rikitake
pp. 55 - 60

IA2014-12
List Representation Using Succinct Data Structure for Packet Filtering
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.)
pp. 61 - 65

IA2014-13
A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication
Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.)
pp. 67 - 72

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan