|
|
Technical Committee on Information and Communication System Security (ICSS) (Searched in: 2009)
|
|
Search Results: Keywords 'from:2010-03-26 to:2010-03-26'
|
[Go to Official ICSS Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2010-03-26 13:30 |
Fukuoka |
The University of Kitakyushu |
Name Resolution Mechanism for Secure Overlay Networking Ayumu Kubota, Yutaka Miyake (KDDI Labs.) ICSS2009-62 |
Recent development of P2P and overlay networking technologies make it fairly easy to establish end-to-end communication ... [more] |
ICSS2009-62 pp.1-6 |
ICSS |
2010-03-26 13:55 |
Fukuoka |
The University of Kitakyushu |
An Efficient Key Establishment Scheme through Intermediaries for Sensor Networks Tomonori Kubo, Takashi Satoh (Univ. Kitakyushu) ICSS2009-63 |
Establishing shared keys is a fundamental issue to provide secure communications among nodes in sensor networks. We prop... [more] |
ICSS2009-63 pp.7-11 |
ICSS |
2010-03-26 14:20 |
Fukuoka |
The University of Kitakyushu |
An Intra-Domain Authentication Method for SIP to Improve Security of SRTP Key Management Hisashi Takahara, Motonori Nakamura (SOKENDAI) ICSS2009-64 |
Using DTLS-SRTP in SIP, fingerprint is exchanged to verify
that the public key is what was sent from UAC. Then, with
S... [more] |
ICSS2009-64 pp.13-18 |
ICSS |
2010-03-26 14:45 |
Fukuoka |
The University of Kitakyushu |
DDoS Protection Using Autonomous Distributed Firewall System Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI R&D Labs.) ICSS2009-65 |
(To be available after the conference date) [more] |
ICSS2009-65 pp.19-24 |
ICSS |
2010-03-26 15:30 |
Fukuoka |
The University of Kitakyushu |
Investigation of Attacks to Websites using Multi-domain Web-based Honeypots Naoto Tanimoto, Takeshi Yagi, Takeo Hariu, Mitsutaka Itoh (NTT Corporation) ICSS2009-66 |
Recently, a large number of websites are under attacks from attackers. Many compromised websites are used by attackers a... [more] |
ICSS2009-66 pp.25-28 |
ICSS |
2010-03-26 15:55 |
Fukuoka |
The University of Kitakyushu |
A Study on Worms Using Search Engine to Spread Jingyu Hua, Kouichi Sakurai (Kyushu Univ.) ICSS2009-67 |
[more] |
ICSS2009-67 pp.29-34 |
ICSS |
2010-03-26 16:20 |
Fukuoka |
The University of Kitakyushu |
Relative Analysis of Malware Behavior based on Function Calls in Parallel Threads Junji Nakazato (NICT), Jumpei Shimamura (ForSchooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2009-68 |
The Internet has been surrounded by various security threats. Malwares, such as computer virus, worm and bot, always pla... [more] |
ICSS2009-68 pp.35-39 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|