IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2011)

Search Results: Keywords 'from:2011-06-16 to:2011-06-16'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2011-06-16
13:05
Fukuoka Kyushu Institute of Technology Combining the outcomes of IP reputation services
Tatsuya Mori, Kazumichi Sato, Yousuke Takahashi, Tatsuaki Kimura, Keisuke Ishibashi (NTT) IA2011-1 ICSS2011-1
(To be available after the conference date) [more] IA2011-1 ICSS2011-1
pp.1-6
IA, ICSS 2011-06-16
13:30
Fukuoka Kyushu Institute of Technology An Architecture of A Multifactor Authentication Platform for Hybrid Cloud
Satoshi Yagi, Ryoichi Kasuga, Satoshi Imamura, Jiro Yamada, Hidetoshi Takasugi (NTT Communications) IA2011-2 ICSS2011-2
The multifactor authentication platform which manages user identity with the authentication information like the passwor... [more] IA2011-2 ICSS2011-2
pp.7-12
IA, ICSS 2011-06-16
13:55
Fukuoka Kyushu Institute of Technology [Invited Talk] IPA's Activities on Cloud Security and Recent Topics of Cloud Security Alliance (CSA)
Ben T. Katsumi (IPA) IA2011-3 ICSS2011-3
(To be available after the conference date) [more] IA2011-3 ICSS2011-3
pp.13-18
IA, ICSS 2011-06-16
15:00
Fukuoka Kyushu Institute of Technology An Extension of Hierarchical Automatic Locator Number Allocation Protocol HANA for a Hierarchical Routing Protocol
Kenji Fujikawa (NICT), Masataka Ohta (TITECH) IA2011-7 ICSS2011-7
In order to suppress the increase in the global routing table size,
address hierarchicalization
and multihoming that d... [more]
IA2011-7 ICSS2011-7
pp.37-40
IA, ICSS 2011-06-16
16:35
Fukuoka Kyushu Institute of Technology A Practical Usage of Large-scale Darknet Monitoring for Disaster Recovery
Daisuke Inoue, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Koji Nakao (NICT) IA2011-5 ICSS2011-5
 [more] IA2011-5 ICSS2011-5
pp.25-30
IA, ICSS 2011-06-16
17:00
Fukuoka Kyushu Institute of Technology A study of the information system at the time of earthquake disaster
Masahiro Hiji (Tohoku Univ./Hitachi East Japan Solutions, Ltd.) IA2011-6 ICSS2011-6
The 2011 off the Pacific coast of Tohoku Earthquake caused serious damage in the Pacific coast of the Tohoku district. T... [more] IA2011-6 ICSS2011-6
pp.31-36
IA, ICSS 2011-06-17
10:00
Fukuoka Kyushu Institute of Technology A Profiling Method of Attacking Hosts based on Scan Feature Extraction
Masashi Eto, Yaichiro Takagi, Jungsuk Song, Daisuke Inoue, Koji Nakao (NICT) IA2011-4 ICSS2011-4
 [more] IA2011-4 ICSS2011-4
pp.19-24
IA, ICSS 2011-06-17
10:25
Fukuoka Kyushu Institute of Technology Secure and Traceable Online Image Sharing Scheme for Service Providers
Kohei Sugiyama, Masaki Fukushima, Teruyuki Hasegawa (KDDI Labs.) IA2011-8 ICSS2011-8
We propose a scheme for application service providers to provide a secure and traceable online image sharing service. To... [more] IA2011-8 ICSS2011-8
pp.41-46
IA, ICSS 2011-06-17
10:50
Fukuoka Kyushu Institute of Technology [Invited Talk] Trend on Information Security and Technologies for Solving Issues
Ryoichi Sasaki (Tokyo Denki Univ.) IA2011-9 ICSS2011-9
Information security issues can be considered to reach new stage judging from appearances of Wikileaks and Stuxnet, and ... [more] IA2011-9 ICSS2011-9
pp.47-56
IA, ICSS 2011-06-17
13:00
Fukuoka Kyushu Institute of Technology Detecting Original Entry Point based on Comparing Runtime Library Codes in Malware Unpacking
Kazuki Iwamoto, Katsumi Wasaki (Shinshu Univ.) IA2011-10 ICSS2011-10
Almost malwares are compressed or encrypted by packer.
So we can't analyse them directly.
Several methods to extract a... [more]
IA2011-10 ICSS2011-10
pp.57-62
IA, ICSS 2011-06-17
13:50
Fukuoka Kyushu Institute of Technology DenseShip: Virtual Machine Monitor Specialized for Server-Type Honeypot
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2011-11 ICSS2011-11
(To be available after the conference date) [more] IA2011-11 ICSS2011-11
pp.63-68
IA, ICSS 2011-06-17
14:35
Fukuoka Kyushu Institute of Technology Automatically Removing Malware Using Malware Analysis System
Nobutaka Kawaguchi, Takayuki Yoda, Hiroki Yamaguchi (Hitachi), Toshihiko Kasagi (KDDI), Yuji Hoshizawa (SecureBrain) IA2011-12 ICSS2011-12
 [more] IA2011-12 ICSS2011-12
pp.69-74
IA, ICSS 2011-06-17
15:00
Fukuoka Kyushu Institute of Technology Analysis of Website Infections using Malware
Takeshi Yagi, Shinta Nakayama, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Mitsutaka Itoh (NTT) IA2011-13 ICSS2011-13
This paper reports the actual situation of website infections using malware. Recently, with the widespread of the web, m... [more] IA2011-13 ICSS2011-13
pp.75-80
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan