Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 11:20 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Development of an Outsourcing Password Evaluation System using Intel SGX Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93 |
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] |
ICSS2023-93 pp.174-179 |
ICSS |
2022-11-07 14:20 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Real-time detection method for DOM-based XSS via multiple files Shu Hiura, Akira Kanaoka (Toho Univ.) ICSS2022-40 |
DOM Based XSS is one of the most common vulnerabilities related to injection attacks and is caused by improper JavaScrip... [more] |
ICSS2022-40 pp.13-18 |
ISEC |
2019-05-17 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A secure method of provisioning IoT devices with few operations Dai Yamamoto, Hirotaka Kokubo, Takanori Machida, Ikuya Morikawa (FUJITSU LABORATORIES LTD.), Akira Kanaoka (Toho Univ.) ISEC2019-8 |
Recently, most IoT devices have been connected to cloud servers, which provide users with useful services such as remote... [more] |
ISEC2019-8 pp.37-44 |
ICSS, IA |
2016-06-07 11:00 |
Saga |
Saga University |
Measuring BGP Origin Validation Effect for Mis-Origination Masahito Ando (Toho Univ.), Masayuki Okada (JPNIC), Akira Kanaoka (Toho Univ.) IA2016-10 ICSS2016-10 |
Current Border Gateway Protocol (BGP) operation in the Internet has serious problem about Mis-Origination which is hijac... [more] |
IA2016-10 ICSS2016-10 pp.51-56 |
ICSS, IA |
2014-06-06 11:20 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Ransomware: Threat Analysis and Countermeasures Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7 |
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] |
IA2014-7 ICSS2014-7 pp.33-38 |
SWIM |
2014-05-23 15:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Simple Secret Computation Method to increase User's Sense of Safety in Cloud Services Yohtaro Miyanishi (ISEM), Xiagong Han, Shinji Kitagami (Waseda Univ.), Akira Kanaoka, Fumiaki Sato (Toho Univ.), Yoshiyori Urano, Norio Shiratori (Waseda Univ.) SWIM2014-4 |
Users of cloud computing could not wipe away the anxiety about the data and programs may be abused or leaked, because us... [more] |
SWIM2014-4 pp.19-24 |
ICSS, IPSJ-SPT |
2014-03-27 15:45 |
Okinawa |
Meio Univiersity |
On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers Yuka Enomoto, Akira Kanaoka (Toho Univ.) ICSS2013-68 |
From Windows Vista, automatic network printer discovery and configuration is available by UPnP functions.
Recent Window... [more] |
ICSS2013-68 pp.37-41 |
ICSS, IPSJ-SPT |
2014-03-27 16:10 |
Okinawa |
Meio Univiersity |
Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices Tomoko Kazama, Akira Kanaoka (Toho Univ.) ICSS2013-69 |
Current OpenFlow specification apply TLS to establish mutual authentication between a controller and a switch, as option... [more] |
ICSS2013-69 pp.43-48 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 14:50 |
Hokkaido |
|
TLS with Pre-shared Key Extended by Identity-based Encryption Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.) ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 |
TLS-PSK is a protocol to support mutual authentication based on pre-shared keys (PSKs). Since TLS-PSK does not need any ... [more] |
ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 pp.315-321 |
ICSS |
2012-11-22 14:05 |
Hiroshima |
Miyajima Mori-no-Yado |
Evaluation of Probabilistic Packet Marking Methods using Arrival Probabilisity of Marked Packets Nasato Gotoh, Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (JPNIC), Eiji Okamoto (Univ. of Tsukuba) ICSS2012-50 |
Probabilistic Packet Marking (PPM) is one of the IP traceback technologies which is used to defense Denial of Service (D... [more] |
ICSS2012-50 pp.31-36 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:50 |
Hokkaido |
|
Architecture Design for Visualizing Risks and Implementing Adequate Security Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT) ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17 |
[more] |
ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17 pp.109-114 |
ICSS |
2012-03-16 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Device for Transparent Probabilistic Packet Marking Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (Univ. of Tsukuba/JPNIC), Eiji Okamoto (Univ. of Tsukuba) ICSS2011-43 |
Probabilistic Packet Marking (PPM) is known as better defence solution for Denial of Service (DoS) attack. However, most... [more] |
ICSS2011-43 pp.25-30 |
ICSS |
2011-11-18 16:30 |
Tokushima |
Naruto University of Education |
Soko Soko Security: Providing Appropriate Security in Required Level Akira Kanaoka (Univ. of Tsukuba) ICSS2011-38 |
[more] |
ICSS2011-38 pp.39-41 |
ICSS |
2010-11-05 14:30 |
Hiroshima |
Hiroshima City University |
Network Topology Analysys for Web Malware Risk Assesment Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50 |
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] |
ICSS2010-50 pp.35-40 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 10:55 |
Aomori |
Hirosaki University |
Implementation of Key Generation Center for Identity-based Encryption Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) ISEC2010-27 SITE2010-23 ICSS2010-33 |
Identity-based Encryption (IBE) is approaching to practical use recently,
but several significant points to be solved r... [more] |
ISEC2010-27 SITE2010-23 ICSS2010-33 pp.133-139 |
ICSS |
2009-11-13 10:40 |
Miyazaki |
University of Miyazaki |
Identifying Potentially-Impacted Area using CVSS for Networked Systems Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.of Tsukuba), Masahiko Kato (IIJ Tech. Inc.) ICSS2009-54 |
CVSS(Common Vulnerability Scoring System) is a vulnerability scoring method. CVSS is composed of
three metrics groups: ... [more] |
ICSS2009-54 pp.1-6 |
ISEC |
2009-09-25 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A verifiable server-aided computation of scalar multiplication on elliptic curves Kouta Tamura, Naoki Kanayama, Akira Kanaoka, Tadahiko Ito, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba) ISEC2009-50 |
Server-aided computation is the method which delegates computation to server side to execute heavy computation
like a ... [more] |
ISEC2009-50 pp.73-78 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 14:15 |
Akita |
Akita University |
Risk Assessment Method for Networked Systems using CVSS Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48 |
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] |
ISEC2009-34 SITE2009-26 ICSS2009-48 pp.189-194 |