IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2012)

Search Results: Keywords 'from:2013-03-25 to:2013-03-25'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2013-03-25
10:20
Kanagawa Yokohama National University A Method to Identify the Writer's Birthday on a Blog article
Masataka Kawahara, Atsushi Kanai (Hosei Univ.) ICSS2012-57
In recent years, personal information is unconsciously written in many cases because of the opportunity for an individua... [more] ICSS2012-57
pp.1-6
ICSS 2013-03-25
10:45
Kanagawa Yokohama National University A STUDY ON QUANTIFYING THE DEGREE OF PERSONAL INFORMATION DISCLOSURE USING STATISTICAL DATA
Maya Takizawa, Daiki Matsunaga, Atsushi Kanai (Hosei Univ.) ICSS2012-58
In recent years, people’s concern towards the protection of personal information is growing and many companies and unive... [more] ICSS2012-58
pp.7-12
ICSS 2013-03-25
11:10
Kanagawa Yokohama National University Design and Implementation of Application Framework for Pairing-based Cryptography
Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-59
Applications of pairing-based cryptography are searchable encryption, secure function evaluation and so on. To implement... [more] ICSS2012-59
pp.13-18
ICSS 2013-03-25
11:35
Kanagawa Yokohama National University Partially Doubly-Encrypted ID-based Encryption and its Security
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] ICSS2012-60
pp.19-24
ICSS 2013-03-25
13:00
Kanagawa Yokohama National University Finding Malicious Authoritative DNS Servers
Yin Minn Pa Pa, Daisuke Makita, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-61
This study proposes an approach to find authoritative DNS servers that are heavily involved with
malicious online activ... [more]
ICSS2012-61
pp.25-30
ICSS 2013-03-25
13:25
Kanagawa Yokohama National University Observing DNS Communication of Android Malware using Sandbox Analysis
Fumihiro Kanei, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-62
With the spread of smartphones in recent years, Android OS has become popular. On the other hand, malware targeting the ... [more] ICSS2012-62
pp.31-36
ICSS 2013-03-25
13:50
Kanagawa Yokohama National University Packer Identification Based on Difference Execution Traces Between Input and Output Programs
Pham Anh Phong, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-63
To prevent the analysis process, most of malware are compressed or encrypted by packer . We can support manual unpacking... [more] ICSS2012-63
pp.37-42
ICSS 2013-03-25
14:30
Kanagawa Yokohama National University Possibility of Remote Exploits by Android Phones
Hiroshi Mori, Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-64
Recently, malware that run on Android OS are increasing. For now, a class of Android malware that leak information from ... [more] ICSS2012-64
pp.43-48
ICSS 2013-03-25
14:55
Kanagawa Yokohama National University Network-based classification of remote exploit attacks focusing on UUID
Yusuke Takahashi (Yokohama National Univ.), Masaki Kamizono, Yuji Hoshizawa (Securebrain), Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2012-65
Remote exploit attacks, which target vulnerabilities of network services, is the class of most common attacks utilized i... [more] ICSS2012-65
pp.49-54
ICSS 2013-03-25
15:30
Kanagawa Yokohama National University [Invited Talk] PRACTICE - Proactive Response Against Cyber-attacks Through International Collaborative Exchange
Katsunari Yoshioka (Yokohama National Univ.) ICSS2012-66
Proactive Response Against Cyber Attacks Through International Collaborative Exchange (PRACTICE) project aims at develop... [more] ICSS2012-66
p.55
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan