IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2010)

Search Results: Keywords 'from:2010-07-01 to:2010-07-01'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 28  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
10:30
Aomori Hirosaki University Correlation Problems between Security Protection and Intellectual Property Protection of Information
Haruo Kodama (Open Univ. of Japan/SOKENDAI) ISEC2010-10 SITE2010-6 ICSS2010-16
The right of information covered by security protection is discussed in terms of privacy. On the other hand, when it is ... [more] ISEC2010-10 SITE2010-6 ICSS2010-16
pp.1-6
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
10:55
Aomori Hirosaki University A Study on Log Analysis Based on Tendency of IDS Alert Events
Tsuyoshi Toda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2010-11 SITE2010-7 ICSS2010-17
With the spread of computer network, important information have been exchanged and managed on a network. However, worm d... [more] ISEC2010-11 SITE2010-7 ICSS2010-17
pp.7-12
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
11:20
Aomori Hirosaki University Limit of "Control Theory" of Privacy -- Presentation of Identity and Context Dependency of Privacy --
Takushi Otani (Kibi International Univ.) ISEC2010-12 SITE2010-8 ICSS2010-18
The concept of Privacy has enlarged with changes in technology and society. After the 1960s, when modern information tec... [more] ISEC2010-12 SITE2010-8 ICSS2010-18
pp.13-19
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:25
Aomori Hirosaki University On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2010-13 SITE2010-9 ICSS2010-19
We study a Viterbi search for the maximum differential characteristic
probability ($DCP_{max}$) of a block cipher wit... [more]
ISEC2010-13 SITE2010-9 ICSS2010-19
pp.21-25
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:50
Aomori Hirosaki University Protection Mode Against Cache Attack (HYRAL)
Kouzou Hirata (LIS) ISEC2010-14 SITE2010-10 ICSS2010-20
It is known that the Prime+probe method of Dag Arne Osuik, Adi shamir, and Eran Tromer[1] is the most efficient methods ... [more] ISEC2010-14 SITE2010-10 ICSS2010-20
pp.27-33
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:15
Aomori Hirosaki University An Optimization of AES Decryption Using the Bitslice Technique
Fumihiko Sano (Toshiba Solutions Corporation) ISEC2010-15 SITE2010-11 ICSS2010-21
We implemented a decryption process of AES with new bitslice technique by K\"{a}sper et al. for encryption. In conventio... [more] ISEC2010-15 SITE2010-11 ICSS2010-21
pp.35-39
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:40
Aomori Hirosaki University An Artifact-Metric System which Extracts Values Unique to Individual Paper
Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2010-16 SITE2010-12 ICSS2010-22
Artifact-metrics is an automated method of authenticating physical object based on a measurable intrinsic characteristic... [more] ISEC2010-16 SITE2010-12 ICSS2010-22
pp.41-46
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
15:05
Aomori Hirosaki University Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol
Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.) ISEC2010-17 SITE2010-13 ICSS2010-23
Recently, the cellular phone penetration rate increased. One person came to own two or more cellular phones. On the othe... [more] ISEC2010-17 SITE2010-13 ICSS2010-23
pp.47-53
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:25
Aomori Hirosaki University Evaluating Destination Hosts of Malware Based on Search Engine Results
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] ISEC2010-18 SITE2010-14 ICSS2010-24
pp.75-80
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:50
Aomori Hirosaki University Image Authentication with Access Control Based on Reversible Data Hiding
Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2010-19 SITE2010-15 ICSS2010-25
This paper proposes an image authentication with access control based on reversible data hiding. The proposed method gen... [more] ISEC2010-19 SITE2010-15 ICSS2010-25
pp.81-86
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:15
Aomori Hirosaki University Building Ontology of Cybersecurity Operational Information
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ISEC2010-20 SITE2010-16 ICSS2010-26
Cyber threats come beyond the border of countries. However, most organizations are currently coping with them individual... [more] ISEC2010-20 SITE2010-16 ICSS2010-26
pp.87-91
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
14:40
Aomori Hirosaki University Access policy management architecture for virtual server consolidation systems
Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC) ISEC2010-21 SITE2010-17 ICSS2010-27
Recently virtual-machine based server consolidation systems have been rapidly adopted in the market. With these systems ... [more] ISEC2010-21 SITE2010-17 ICSS2010-27
pp.93-100
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
15:05
Aomori Hirosaki University On the use and misuse of E-mail sender authentication mechanisms
Tatsuya Mori (NTT) ISEC2010-22 SITE2010-18 ICSS2010-28
E-mail sender authentication is a promising way of verifying the sources of e-mail messages. Since to- day’s primary e-m... [more] ISEC2010-22 SITE2010-18 ICSS2010-28
pp.101-106
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:00
Aomori Hirosaki University Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] ISEC2010-23 SITE2010-19 ICSS2010-29
pp.107-112
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:25
Aomori Hirosaki University Improvement of Rainbow MPKC Signature system
Masahito Gotaishi (Chuo Univ.) ISEC2010-24 SITE2010-20 ICSS2010-30
Rainbow signature system is making effective use of the advantage of
multivariate public key cryptosystem (MPKC) and o... [more]
ISEC2010-24 SITE2010-20 ICSS2010-30
pp.113-117
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
09:50
Aomori Hirosaki University Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions
Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-25 SITE2010-21 ICSS2010-31
 [more] ISEC2010-25 SITE2010-21 ICSS2010-31
pp.119-122
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
10:30
Aomori Hirosaki University On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2010-26 SITE2010-22 ICSS2010-32
pp.123-132
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
10:55
Aomori Hirosaki University Implementation of Key Generation Center for Identity-based Encryption
Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) ISEC2010-27 SITE2010-23 ICSS2010-33
Identity-based Encryption (IBE) is approaching to practical use recently,
but several significant points to be solved r... [more]
ISEC2010-27 SITE2010-23 ICSS2010-33
pp.133-139
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
11:20
Aomori Hirosaki University A note for secure information sharing systems
Gembu Morohashi, Akira Nagai (NTT Corp.) ISEC2010-28 SITE2010-24 ICSS2010-34
 [more] ISEC2010-28 SITE2010-24 ICSS2010-34
pp.141-145
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
11:45
Aomori Hirosaki University On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] ISEC2010-29 SITE2010-25 ICSS2010-35
pp.147-152
 Results 1 - 20 of 28  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan