Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2010-11-05 10:30 |
Hiroshima |
Hiroshima City University |
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application Masakazu Soshi (Hiroshima City Univ.) ICSS2010-44 |
We have proposed simple and efficient authentication schemes with several
novel elaborate hash chains. We also discu... [more] |
ICSS2010-44 pp.1-5 |
ICSS |
2010-11-05 10:55 |
Hiroshima |
Hiroshima City University |
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.) ICSS2010-45 |
This paper discusses the probrem of an efficient group key distribution
protocol for wireless sensor networks,which is ... [more] |
ICSS2010-45 pp.7-10 |
ICSS |
2010-11-05 11:20 |
Hiroshima |
Hiroshima City University |
Proposal of Time-limited Key Management Scheme Using One-way Functions Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46 |
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] |
ICSS2010-46 pp.11-15 |
ICSS |
2010-11-05 13:00 |
Hiroshima |
Hiroshima City University |
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-47 |
There are many cryptographic schemes with anonymity, such as group signatures.
As one important property, anonymous us... [more] |
ICSS2010-47 pp.17-22 |
ICSS |
2010-11-05 13:25 |
Hiroshima |
Hiroshima City University |
A Timed-Release Proxy Re-Encryption Scheme and its Applications Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-48 |
Timed-Release Encryption (TRE) prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time S... [more] |
ICSS2010-48 pp.23-28 |
ICSS |
2010-11-05 13:50 |
Hiroshima |
Hiroshima City University |
Ontological Approach toward Cybersecurity in Cloud Computing Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49 |
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more] |
ICSS2010-49 pp.29-34 |
ICSS |
2010-11-05 14:30 |
Hiroshima |
Hiroshima City University |
Network Topology Analysys for Web Malware Risk Assesment Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50 |
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] |
ICSS2010-50 pp.35-40 |
ICSS |
2010-11-05 14:55 |
Hiroshima |
Hiroshima City University |
A Document Access Control Model Based on Role and Security Policy Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51 |
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] |
ICSS2010-51 pp.41-46 |
ICSS |
2010-11-05 15:20 |
Hiroshima |
Hiroshima City University |
Development of Multifactor Authentication Platform with a Single Sign-On Function Jiro Yamada, Satoshi Yagi, Isoo Ueno, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications) ICSS2010-52 |
We developed a multifactor authentication platform with a single sign-on function for high security and usability. The p... [more] |
ICSS2010-52 pp.47-52 |
ICSS |
2010-11-05 16:00 |
Hiroshima |
Hiroshima City University |
Determining granularity of URL filtering based on tree structure of malicious website URL Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53 |
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] |
ICSS2010-53 pp.53-58 |
ICSS |
2010-11-05 16:25 |
Hiroshima |
Hiroshima City University |
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-54 |
The epidemic of Conficker shows that remote exploit attack is still one of the most serious threats on the computer syst... [more] |
ICSS2010-54 pp.59-64 |
ICSS |
2010-11-05 16:50 |
Hiroshima |
Hiroshima City University |
A Method of Sandbox Analysis of Malware Acting with Use of Online Services Kousuke Murakami, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2010-55 |
[more] |
ICSS2010-55 pp.65-70 |