IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2010)

Search Results: Keywords 'from:2011-03-25 to:2011-03-25'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 11 of 11  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2011-03-25
10:20
Tokyo Suspended On a Data Sensitivity Diagnosis
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ICSS2010-56
 [more] ICSS2010-56
pp.1-4
ICSS 2011-03-25
10:45
Tokyo Suspended Proposal of an Order Preserving Encryption for Anonymity
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] ICSS2010-57
pp.5-10
ICSS 2011-03-25
11:10
Tokyo Suspended Security Level Evaluation of Quaternion Based Hash Function
Tomohiro Suto, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-58
One of the security features for designing hash functions is collision resistance. It means that it is difficult to find... [more] ICSS2010-58
pp.11-16
ICSS 2011-03-25
11:35
Tokyo Suspended On Security Model of Cryptographic Protocols for Mobile Devices
Shin'ichiro Matsuo (NICT) ICSS2010-59
Recently, information devices, with lower computational power than general personal computers such as smartphone, are ge... [more] ICSS2010-59
pp.17-21
ICSS 2011-03-25
13:25
Tokyo Suspended Consideration on hidden-communication channel in the Internet communication device.
Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more]
ICSS2010-60
pp.23-28
ICSS 2011-03-25
13:50
Tokyo Suspended Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-61
The development of today's wireless technology with its sophisticated devices and applications has attracted many users ... [more] ICSS2010-61
pp.29-34
ICSS 2011-03-25
14:15
Tokyo Suspended Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Networks
Iichiro Nishimura, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-62
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infr... [more] ICSS2010-62
pp.35-40
ICSS 2011-03-25
15:10
Tokyo Suspended Automatic Unpacking Based on Entropy of Memory-Access Values
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] ICSS2010-63
pp.41-46
ICSS 2011-03-25
15:35
Tokyo Suspended Development and evaluation of PDF malware analysis system using dynamic analysis
Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] ICSS2010-64
pp.47-52
ICSS 2011-03-25
16:00
Tokyo Suspended Network Observation and Analysis Report on nicter -- Transition Analysis of Cyber Attacks Based on Long-term Observation --
Junji Nakazato (NICT), Jumpei Shimamura (For Schooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-65
 [more] ICSS2010-65
pp.53-58
ICSS 2011-03-25
16:25
Tokyo Suspended Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring
Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] ICSS2010-66
pp.59-64
 Results 1 - 11 of 11  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan