IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2010)

Search Results: Keywords 'from:2010-11-05 to:2010-11-05'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2010-11-05
10:30
Hiroshima Hiroshima City University On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application
Masakazu Soshi (Hiroshima City Univ.) ICSS2010-44
We have proposed simple and efficient authentication schemes with several
novel elaborate hash chains. We also discu... [more]
ICSS2010-44
pp.1-5
ICSS 2010-11-05
10:55
Hiroshima Hiroshima City University An Efficient Group Key Distribution Protocol in Wireless Sensor Networks
Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.) ICSS2010-45
This paper discusses the probrem of an efficient group key distribution
protocol for wireless sensor networks,which is ... [more]
ICSS2010-45
pp.7-10
ICSS 2010-11-05
11:20
Hiroshima Hiroshima City University Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] ICSS2010-46
pp.11-15
ICSS 2010-11-05
13:00
Hiroshima Hiroshima City University An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-47
There are many cryptographic schemes with anonymity, such as group signatures.
As one important property, anonymous us... [more]
ICSS2010-47
pp.17-22
ICSS 2010-11-05
13:25
Hiroshima Hiroshima City University A Timed-Release Proxy Re-Encryption Scheme and its Applications
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) ICSS2010-48
Timed-Release Encryption (TRE) prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time S... [more] ICSS2010-48
pp.23-28
ICSS 2010-11-05
13:50
Hiroshima Hiroshima City University Ontological Approach toward Cybersecurity in Cloud Computing
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ICSS2010-49
Following the immense development of cloud computing, various standardization activities have been taken place.
However... [more]
ICSS2010-49
pp.29-34
ICSS 2010-11-05
14:30
Hiroshima Hiroshima City University Network Topology Analysys for Web Malware Risk Assesment
Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] ICSS2010-50
pp.35-40
ICSS 2010-11-05
14:55
Hiroshima Hiroshima City University A Document Access Control Model Based on Role and Security Policy
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] ICSS2010-51
pp.41-46
ICSS 2010-11-05
15:20
Hiroshima Hiroshima City University Development of Multifactor Authentication Platform with a Single Sign-On Function
Jiro Yamada, Satoshi Yagi, Isoo Ueno, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications) ICSS2010-52
We developed a multifactor authentication platform with a single sign-on function for high security and usability. The p... [more] ICSS2010-52
pp.47-52
ICSS 2010-11-05
16:00
Hiroshima Hiroshima City University Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] ICSS2010-53
pp.53-58
ICSS 2010-11-05
16:25
Hiroshima Hiroshima City University A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation
Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-54
The epidemic of Conficker shows that remote exploit attack is still one of the most serious threats on the computer syst... [more] ICSS2010-54
pp.59-64
ICSS 2010-11-05
16:50
Hiroshima Hiroshima City University A Method of Sandbox Analysis of Malware Acting with Use of Online Services
Kousuke Murakami, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2010-55
 [more] ICSS2010-55
pp.65-70
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan