IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 36 of 36 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2011-11-18
14:00
Tokushima Naruto University of Education Feature Estimation Scheme for Self Modifying Malwares Using Parts of Their Own Codes
Noriaki Nakamura, Ryoichi Isawa, Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) ICSS2011-34
 [more] ICSS2011-34
pp.13-18
ICSS 2011-11-18
16:00
Tokushima Naruto University of Education One-Time Password Scheme against Theft Attacks for Multi Server Environment
Yuto Kunisada, Ryoichi Isawa, Masakatu Morii (Kobe Univ.) ICSS2011-37
 [more] ICSS2011-37
pp.33-38
ICSS 2011-03-25
10:45
Tokyo Suspended Proposal of an Order Preserving Encryption for Anonymity
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] ICSS2010-57
pp.5-10
ICSS 2010-11-05
11:20
Hiroshima Hiroshima City University Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] ICSS2010-46
pp.11-15
IA, ICSS 2010-06-17
15:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] IA2010-6 ICSS2010-6
pp.31-36
IA, ICSS 2010-06-17
15:45
Kyoto Academic Center for Computing and Media Studies, Kyoto University Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack
Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] IA2010-7 ICSS2010-7
pp.37-42
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
16:50
Hiroshima Hiroshima Univ. Evaluation of Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Masanori Hirotomo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) LOIS2009-39 IE2009-80
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the ... [more] LOIS2009-39 IE2009-80
pp.119-124
IA, ICSS 2009-06-18
13:30
Tokyo Kikai-Shinko-Kaikan Bldg *
Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] IA2009-5 ICSS2009-13
pp.25-30
IA, ICSS 2009-06-18
13:55
Tokyo Kikai-Shinko-Kaikan Bldg *
Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] IA2009-6 ICSS2009-14
pp.31-36
IA, ICSS 2009-06-18
14:20
Tokyo Kikai-Shinko-Kaikan Bldg *
Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] IA2009-7 ICSS2009-15
pp.37-42
IA, ICSS 2009-06-18
14:45
Tokyo Kikai-Shinko-Kaikan Bldg Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] IA2009-8 ICSS2009-16
pp.43-48
IA, ICSS 2009-06-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg Study on Classification of Malware and it Applications
Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] IA2009-19 ICSS2009-27
pp.103-108
IA, ICSS 2009-06-19
14:15
Tokyo Kikai-Shinko-Kaikan Bldg *
Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more]
IA2009-20 ICSS2009-28
pp.109-114
IN, ICM, LOIS
(Joint)
2006-01-20
09:50
Kyoto Kyoto Univ. A method for describing the data of computer virus and its behavior
Hideo Ichimiya, Atsuko Imose, Ryoichi Isawa, Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masami Mohri (The Univ. of Tokushima), Masakatu Morii (Kobe Univ.)
Each analysis result about computer virus output by various virus analysis systems, e.g. behavior analysis system and si... [more] OIS2005-81
pp.11-16
LOIS 2005-05-13
09:30
Kagawa Sunport Hall Takamatsu On constructing the virtual virus simulation system to analyze spreading and infection on wide network
Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Naoto Sone (Naruto Univ. of Edu.), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.)
This paper presents a simulator to analyze behavior of virus, such as spreading and infection, on wide network. Network ... [more] OIS2005-8
pp.7-11
LOIS 2005-05-13
10:00
Kagawa Sunport Hall Takamatsu Definition and its description method of virtual virus for P2P type simulation system
Atsuko Imose (The Univ. of Tokushima), Naoto Sone (Naruto Univ, of Edu.), Ryoichi Isawa, Masami Mohri (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.)
It is important to know the behavior of computer virus on network from the point of view of Anti-Virus in order to keep ... [more] OIS2005-9
pp.13-18
 Results 21 - 36 of 36 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan