IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2014)

Search Results: Keywords 'from:2014-06-05 to:2014-06-05'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IA 2014-06-05
13:35
Hyogo Takikawa Memorial Hall, Kobe University [Invited Talk] A two-path authentication for protecting net banking against illegal access -- How to prevent Man-In-The-Middle/Browser Attack --
Haruhiko Fujii (NTT) IA2014-1 ICSS2014-1
(To be available after the conference date) [more] IA2014-1 ICSS2014-1
pp.1-5
ICSS, IA 2014-06-05
14:25
Hyogo Takikawa Memorial Hall, Kobe University [Invited Talk] How did we arrive at the top
Tsunehiko Suzuki (Chukyo Univ.), Toshinori Maeno
In 2008, Dan Kaminsky presented the efficient poisoning method that DNS caches could mistakenly accept fake responses. H... [more]
ICSS, IA 2014-06-05
15:15
Hyogo Takikawa Memorial Hall, Kobe University [Invited Talk] Threat and Countermeasure Against the Targeted Attack
Satoru Torii (Fujitsu Labs.) IA2014-2 ICSS2014-2
A lot of incidents by crafty cyber-attacks such as a targeted attack are made public. To confront such novel cyber-attac... [more] IA2014-2 ICSS2014-2
pp.7-8
ICSS, IA 2014-06-05
16:15
Hyogo Takikawa Memorial Hall, Kobe University Attack on Knapsack Cryptography by Using Intermediary Plaintext
Yoshihiro Kusanagi, Atsushi Nagao, Masakatu Morii (Kobe Univ.) IA2014-3 ICSS2014-3
Knapsack cryptography is the public key cryptosystem based on knapsack problem (especially subset sum problem).
Density... [more]
IA2014-3 ICSS2014-3
pp.9-14
ICSS, IA 2014-06-05
16:40
Hyogo Takikawa Memorial Hall, Kobe University Higher Order Monomial Attack to FEAL-4
Toshinobu Kaneko (TUS) IA2014-4 ICSS2014-4
In ARX type cipher, relations between input and output variables are a system of quadratic equations on $GF (2)$, if you... [more] IA2014-4 ICSS2014-4
pp.15-20
ICSS, IA 2014-06-06
10:30
Hyogo Takikawa Memorial Hall, Kobe University Malicious Web Site Detection Based on Redirection Control using Client Environment
Takahiro Kasama, Masashi Eto (NICT), Masaki Kamizono (NICT/SecureBrain), Daisuke Inoue (NICT) IA2014-5 ICSS2014-5
 [more] IA2014-5 ICSS2014-5
pp.21-26
ICSS, IA 2014-06-06
10:55
Hyogo Takikawa Memorial Hall, Kobe University Development of an Environment-independent Dynamic Analysis System for Document Malware
Masaki Kamizono (NICT/SecureBrain), Kazuki Iwamoto (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) IA2014-6 ICSS2014-6
 [more] IA2014-6 ICSS2014-6
pp.27-32
ICSS, IA 2014-06-06
11:20
Hyogo Takikawa Memorial Hall, Kobe University Ransomware: Threat Analysis and Countermeasures
Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] IA2014-7 ICSS2014-7
pp.33-38
ICSS, IA 2014-06-06
13:00
Hyogo Takikawa Memorial Hall, Kobe University Analyzing Dynamic Class Loaded Applications in Android
Takaaki Nagumo, Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu (NTT) IA2014-8 ICSS2014-8
 [more] IA2014-8 ICSS2014-8
pp.39-44
ICSS, IA 2014-06-06
13:25
Hyogo Takikawa Memorial Hall, Kobe University Study on Comparison Regarding Schemes of Information-centric Networking
Daisuke Matsubara (Hitachi), Satoru Okamoto, Naoaki Yamanaka (Keio Univ.), Tatsuro Takahashi (Kyoto Univ.) IA2014-9 ICSS2014-9
 [more] IA2014-9 ICSS2014-9
pp.45-47
ICSS, IA 2014-06-06
13:50
Hyogo Takikawa Memorial Hall, Kobe University Implementation of the Administration Policy Description Method on Automatic Network Organization System
Minori Shiota, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) IA2014-10 ICSS2014-10
To confront recent sophisticated targeted attacks, we have to consider a information system to prevent the destruction ... [more] IA2014-10 ICSS2014-10
pp.49-54
ICSS, IA 2014-06-06
14:25
Hyogo Takikawa Memorial Hall, Kobe University Shared Nothing Secure Programming in Erlang/OTP
Kenji Rikitake IA2014-11 ICSS2014-11
Shared nothing architecture (SN) is a standard design method for distributed systems. In this paper, the author presents... [more] IA2014-11 ICSS2014-11
pp.55-60
ICSS, IA 2014-06-06
14:50
Hyogo Takikawa Memorial Hall, Kobe University List Representation Using Succinct Data Structure for Packet Filtering
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-12 ICSS2014-12
In packet filtering, increase of filtering rules causes the following two problems; complication of grasping all rules a... [more] IA2014-12 ICSS2014-12
pp.61-65
ICSS, IA 2014-06-06
15:15
Hyogo Takikawa Memorial Hall, Kobe University A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication
Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-13 ICSS2014-13
In the case of sending and receiving files which need secret via the Internet, files get encrypted. Encrypting files req... [more] IA2014-13 ICSS2014-13
pp.67-72
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan