Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2011-03-25 10:20 |
Tokyo |
Suspended |
On a Data Sensitivity Diagnosis Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ICSS2010-56 |
[more] |
ICSS2010-56 pp.1-4 |
ICSS |
2011-03-25 10:45 |
Tokyo |
Suspended |
Proposal of an Order Preserving Encryption for Anonymity Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57 |
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] |
ICSS2010-57 pp.5-10 |
ICSS |
2011-03-25 11:10 |
Tokyo |
Suspended |
Security Level Evaluation of Quaternion Based Hash Function Tomohiro Suto, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-58 |
One of the security features for designing hash functions is collision resistance. It means that it is difficult to find... [more] |
ICSS2010-58 pp.11-16 |
ICSS |
2011-03-25 11:35 |
Tokyo |
Suspended |
On Security Model of Cryptographic Protocols for Mobile Devices Shin'ichiro Matsuo (NICT) ICSS2010-59 |
Recently, information devices, with lower computational power than general personal computers such as smartphone, are ge... [more] |
ICSS2010-59 pp.17-21 |
ICSS |
2011-03-25 13:25 |
Tokyo |
Suspended |
Consideration on hidden-communication channel in the Internet communication device. Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60 |
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more] |
ICSS2010-60 pp.23-28 |
ICSS |
2011-03-25 13:50 |
Tokyo |
Suspended |
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-61 |
The development of today's wireless technology with its sophisticated devices and applications has attracted many users ... [more] |
ICSS2010-61 pp.29-34 |
ICSS |
2011-03-25 14:15 |
Tokyo |
Suspended |
Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Networks Iichiro Nishimura, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-62 |
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infr... [more] |
ICSS2010-62 pp.35-40 |
ICSS |
2011-03-25 15:10 |
Tokyo |
Suspended |
Automatic Unpacking Based on Entropy of Memory-Access Values Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63 |
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] |
ICSS2010-63 pp.41-46 |
ICSS |
2011-03-25 15:35 |
Tokyo |
Suspended |
Development and evaluation of PDF malware analysis system using dynamic analysis Masaki Kamizono, Masata Nishida, Yuji Hoshizawa (Securebrain Corp.) ICSS2010-64 |
Several Adobe Reader zero-day vulnerabilities have been discovered recently, and the threat of PDF malware continues to ... [more] |
ICSS2010-64 pp.47-52 |
ICSS |
2011-03-25 16:00 |
Tokyo |
Suspended |
Network Observation and Analysis Report on nicter
-- Transition Analysis of Cyber Attacks Based on Long-term Observation -- Junji Nakazato (NICT), Jumpei Shimamura (For Schooner), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ICSS2010-65 |
[more] |
ICSS2010-65 pp.53-58 |
ICSS |
2011-03-25 16:25 |
Tokyo |
Suspended |
Implementation and Operation of an Alert System Based on Large-scale Darknet Monitoring Mio Suzuki, Daisuke Inoue, Masashi Eto (NICT), Satoshi Uda (JAIST), Koji Nakao (NICT) ICSS2010-66 |
A darknet is a set of globally announced unused IP addresses and using it is a good way to monitor network attacks such ... [more] |
ICSS2010-66 pp.59-64 |