Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2013-06-20 13:05 |
Niigata |
Ao-re Nagaoka |
[Invited Talk]
* Daiki Fukumori (NICT/CyberDefence) IA2013-1 ICSS2013-1 |
(To be available after the conference date) [more] |
IA2013-1 ICSS2013-1 pp.1-5 |
IA, ICSS |
2013-06-20 13:45 |
Niigata |
Ao-re Nagaoka |
[Invited Talk]
Threats posed by High-Perfomance Information Devices Designed for Home Hiroki Takakura (Nagoya Univ.) IA2013-2 ICSS2013-2 |
[more] |
IA2013-2 ICSS2013-2 pp.7-12 |
IA, ICSS |
2013-06-20 14:35 |
Niigata |
Ao-re Nagaoka |
Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems Kotaro Kishibe (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.) IA2013-3 ICSS2013-3 |
In late years, with the spread of RFID, the lightweight certification protocol between RFID tag and readers attracts att... [more] |
IA2013-3 ICSS2013-3 pp.13-18 |
IA, ICSS |
2013-06-20 15:00 |
Niigata |
Ao-re Nagaoka |
Vulnerability of RC4 in SSL/TLS Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4 |
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] |
IA2013-4 ICSS2013-4 pp.19-24 |
IA, ICSS |
2013-06-20 15:35 |
Niigata |
Ao-re Nagaoka |
Improvement of Communication Quality during Disasters by using OpenFlow
-- Proposal Method of Disaster ID based on Location Information -- Kohichi Ogawa (AIIT), Noriaki Yoshiura (Saitama Univ.) IA2013-5 ICSS2013-5 |
In emergencies by disasters, important communication for disasters area is not able to transfer preferentially because p... [more] |
IA2013-5 ICSS2013-5 pp.25-30 |
IA, ICSS |
2013-06-20 16:00 |
Niigata |
Ao-re Nagaoka |
PAT : Privacy aware transformation method and applications for location services Ikuo Nakagawa, Yoshifumi Hashimoto (Intec), Masahiro Hiji (tohoku-u), Hideaki Imaizumi (toyota-itc), Hiroshi Esaki (u-tokyo) IA2013-6 ICSS2013-6 |
[more] |
IA2013-6 ICSS2013-6 pp.31-36 |
IA, ICSS |
2013-06-20 16:25 |
Niigata |
Ao-re Nagaoka |
An experimental evaluation of long distance live migration using the wide-area distributed storage Yoshiaki Kitaguchi (Kanazawa Univ.), Tohru Kondo (Hiroshima Univ.), Hiroki Kashiwazaki (Osaka Univ.), Ikuo Nakagawa (Intec, Inc./Osaka Univ.), Shinji Shimojo (Osaka Univ.) IA2013-7 ICSS2013-7 |
[more] |
IA2013-7 ICSS2013-7 pp.37-42 |
IA, ICSS |
2013-06-20 16:50 |
Niigata |
Ao-re Nagaoka |
Operation and Issues of E-Mail System in Okayama University Nariyoshi Yamai, Kiyohiko Okayama, Takaoki Fujiwara, Yoshihiro Ohsumi (Okayama Univ.) IA2013-8 ICSS2013-8 |
Okayama University has been operating student e-mail systems using Gmail since April 2009. As for teachers, we have sta... [more] |
IA2013-8 ICSS2013-8 pp.43-48 |
IA, ICSS |
2013-06-21 10:15 |
Niigata |
Ao-re Nagaoka |
Experiment of Sensor Network for Snowfall Observation in Nagaoka City Seiya Kobayashi, Hiroshi Yamamoto (NUT), Tatsuhito Hoshi (Kanai Doryokou), Yuichi Inagawa (NCT), Koichi Yoshitake (NAL), Katsuyuki Yamazaki (NUT) IA2013-9 ICSS2013-9 |
In a snowy country, snow removal by snow blowers is important activity for preventing traffic accidents. In order to sup... [more] |
IA2013-9 ICSS2013-9 pp.49-54 |
IA, ICSS |
2013-06-21 10:40 |
Niigata |
Ao-re Nagaoka |
Study on Snowblower Support Application utilizing Android Terminals Hiroshi Yamamoto, Yusuke Kubota, Satoru Nishimaki, Takeshi Kyuzo, Katsuyuki Yamazaki (NUT) IA2013-10 ICSS2013-10 |
[more] |
IA2013-10 ICSS2013-10 pp.55-60 |
IA, ICSS |
2013-06-21 11:05 |
Niigata |
Ao-re Nagaoka |
An Evaluation of Load Distribution Method on Multi-Source P2P Sensor Data Stream Delivery System Tomoya Kawakami (Kobe Univ.), Yoshimasa Ishi, Tomoki Yoshihisa (Osaka Univ.), Yuuichi Teranishi (NICT/Osaka Univ.) IA2013-11 ICSS2013-11 |
Due to the prevalence of sensors such as security cameras or environmental monitoring, sensor data stream delivery which... [more] |
IA2013-11 ICSS2013-11 pp.61-66 |
IA, ICSS |
2013-06-21 13:00 |
Niigata |
Ao-re Nagaoka |
Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet Soshi Hirono (Nagoya Univ.), Kenji Ohira (NAIST), Yukiko Yamaguchi (Nagoya Univ.), Hirofumi Yamaki (Tokyo Denki Univ.), Hiroki Takakura (Nagoya Univ.) IA2013-12 ICSS2013-12 |
In dynamic malware analysis, we cannot obtain sufficient results of malware analysis without Internet connectivity. How... [more] |
IA2013-12 ICSS2013-12 pp.67-72 |
IA, ICSS |
2013-06-21 13:25 |
Niigata |
Ao-re Nagaoka |
Generic Unpacking Method Using Data Execution Prevention Ryoichi Isawa (NICT), Masaki Kamizono (NICT/SecureBrain Corporation), Daisuke Inoue (NICT) IA2013-13 ICSS2013-13 |
To skip unpacking steps, automated generic unpacking methods are strongly required. The basic idea of the generic unpack... [more] |
IA2013-13 ICSS2013-13 pp.73-78 |
IA, ICSS |
2013-06-21 13:50 |
Niigata |
Ao-re Nagaoka |
Network Observation and Analysis Report on nicter
-- Close Encounters of Network Incident Sign -- Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2013-14 ICSS2013-14 |
In this paper, we reported sign of a network incident using a large-scale traffic which can be obtained with the darknet... [more] |
IA2013-14 ICSS2013-14 pp.79-84 |
IA, ICSS |
2013-06-21 14:15 |
Niigata |
Ao-re Nagaoka |
NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) IA2013-15 ICSS2013-15 |
Practical attack information such as attack traffic and malware samples is extremely important for researchers in the fi... [more] |
IA2013-15 ICSS2013-15 pp.85-90 |