Thu, Nov 22 AM 10:45 - 12:00 |
(1) |
10:45-11:10 |
On Distribution of Certificate Revocation List Using Random Network Coding for VANET |
Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) |
(2) |
11:10-11:35 |
Gray scale two-dimensional code and its applications |
Keisuke Furumoto, Yuhei Watanabe (Kobe Univ.), Masakatu Morii (kobe Univ.) |
(3) |
11:35-12:00 |
An analytical study for sensor service provider to keep their use's security |
Takamichi Aso, Atsuhiro Goto (IISEC) |
Thu, Nov 22 PM 13:15 - 17:15 |
(4) |
13:15-13:40 |
Packer Identification Based on Binary Code of Malware Using Machine Learning |
Ryoichi Isawa, Tao Ban, Daisuke Inoue (NICT) |
(5) |
13:40-14:05 |
Malicious Traffic Detection based on Multimodal Analysis |
Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT) |
(6) |
14:05-14:30 |
Evaluation of Probabilistic Packet Marking Methods using Arrival Probabilisity of Marked Packets |
Nasato Gotoh, Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (JPNIC), Eiji Okamoto (Univ. of Tsukuba) |
(7) |
14:30-14:55 |
Proposal of a network design support system for risk mitigation against inside attacks |
Hirokazu Hasegawa (Nagoya Univ.), Ray Atarashi (IIJ-II), Masahiko Kato (IIJ), Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura (Nagoya Univ.) |
|
14:55-15:10 |
Break ( 15 min. ) |
(8) |
15:10-15:35 |
A Framework for Issuing AIK Certificate for Two-Factor Authentication by TPM and Its Support System |
Akihito Shinoda (NITECH), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH), Ryoji Noguchi (Toyotsu Syscom) |
(9) |
15:35-16:00 |
Implementation and Evaluation of a File Sharing Service with File Name Encryption using CP-ABE |
Megumi Goto, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) |
(10) |
16:00-16:25 |
On the Sense of Security for Registering Privacy Information to Return Refugee Supporting System |
Kaori Okumura, Yoshiaki Shiraishi (Nagoya Inst. of Tech.) |
(11) |
16:25-16:50 |
Implementation and Evaluation of Privacy-Preserving Epidemic Analysis System |
Tomoki Sato, Hiroaki Kikuchi (Tokai Univ.), Jun Sakuma (UT) |
(12) |
16:50-17:15 |
Are measures against SSL/TLS sites dependent on the category which that site belongs?
-- obtained by crawling of renegotiation functions and RSA key lengths -- |
Yuji Suga (IIJ) |