IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, LOIS 2022-11-18
16:55
Online Online Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing
Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] ISEC2022-44 SITE2022-48 LOIS2022-28
pp.85-91
IE, IMQ, MVE, CQ
(Joint) [detail]
2020-03-06
11:05
Fukuoka Kyushu Institute of Technology
(Cancelled but technical report was issued)
Analyzing Effectiveness of Blacklisting Policy Focusing on ON/OFF Pattern of Scan Activities
Takashi Fujita, Naoki Fukushi, Masato Uchida (Waseda Univ.) CQ2019-151
A blacklist registers IP addresses and domain names found to be involved in malicious activity. Blacklist providers set ... [more] CQ2019-151
pp.87-92
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
ISEC, COMP 2017-12-21
16:15
Kochi Eikokuji Campus, Kochi University of Technology Blacklistable Anonymous Credential System with Reputation Using Accumulator
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] ISEC2017-81 COMP2017-35
pp.59-65
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
COMP, ISEC 2016-12-21
09:30
Hiroshima Hiroshima University Improvements of Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2016-70 COMP2016-31
In current ID-based user authentication schemes, privacy issues may occur, since users’ behavior histories are collected... [more] ISEC2016-70 COMP2016-31
pp.1-7
LOIS, ISEC, SITE 2015-11-06
16:45
Kanagawa Kanagawa Univ. Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2015-47 SITE2015-34 LOIS2015-41
In current ID-based user authentication schemes, privacy issues may occur, since users' behavior histories are collected... [more] ISEC2015-47 SITE2015-34 LOIS2015-41
pp.75-80
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
ICSS 2014-11-28
11:10
Miyagi Tohoku Gakuin University (Tagajo Campus) searching malicious URL from vast webspace
Bo Sun (Waseda Univ.), Mitsuaki Akiyama, Takeshi Yagi (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-61
Many Web-based attacks such as Drive-by-download and phishing scam
are easily triggered by accessing landing page URL.... [more]
ICSS2014-61
pp.61-66
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:50
Hokkaido San-Refure Hakodate A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis
Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications) ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44
In order to detect the malware infection in internal network, we focus on HTTP traffic to the Internet. URL blacklist is... [more] ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44
pp.309-314
ICSS, IPSJ-SPT 2014-03-28
12:05
Okinawa Meio Univiersity Identifying C&C Server by Analyzing Relation between Control Flow and Communications
Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81
In recent years, it is difficult to prevent malware infection entirely because of the diversi cation of attack vectors a... [more] ICSS2013-81
pp.137-142
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:55
Nara Todaiji Total Cultural Center A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] SITE2012-52 IA2012-90
pp.43-48
IA 2012-11-19
17:10
Fukushima Kanponoyado Iwaki (Fukushima) Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] IA2012-56
pp.23-28
IN, RCS
(Joint)
2012-05-17
15:50
Tokyo Kuramae-Kaikan, Tokyo Institute of Technology [Invited Talk] Design of a blacklisting system for Countermeasures against Malware Infection
Takeshi Yagi (NTT) IN2012-16 RCS2012-30
With the widespread use of the Internet, the number of security problems, such as phishing and spam, continues to steadi... [more] IN2012-16 RCS2012-30
pp.25-30(IN), pp.49-54(RCS)
IN, MoNA
(Joint)
2010-11-18
14:50
Fukuoka Fukuoka Institute of Technology Architecture Design of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] IN2010-85
pp.25-30
ICSS 2010-11-05
16:00
Hiroshima Hiroshima City University Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] ICSS2010-53
pp.53-58
IT 2010-01-08
14:50
Overseas Univ. of Hawaii Performance analysis of the blacklist scheme for collusion-secure code
Yoshinobu Iriguchi, Brian Kurkoski, Kazuhiko Yamaguchi (Univ. of Electro-Comm.) IT2009-68
We have proposed a scheme for collusion-secure code which utilizes a blacklist of colluders in order to improve efficien... [more] IT2009-68
pp.93-98
ICSS 2009-11-13
13:55
Miyazaki University of Miyazaki Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis
Akira Yamada (KDDI R&D Labs. Inc.,), Masanori Hara (KDDI Corp.), Yutaka Miyake (KDDI R&D Labs. Inc.,), Kazuo Hashimoto (Tohoku Univ.) ICSS2009-58
Web tracking sites or Web bugs are potential but serious threats to users' privacy during Web browsing. Web sites and th... [more] ICSS2009-58
pp.25-30
IA, ICSS 2009-06-18
11:35
Tokyo Kikai-Shinko-Kaikan Bldg A Study on effective usage of the URL Blacklists
Takahiro Matsuki, Yuu Arai (LAC) IA2009-4 ICSS2009-12
In these days, various menaces are increasing in the Web. The web-based malware infection become the mainstream. Many we... [more] IA2009-4 ICSS2009-12
pp.19-23
IT 2008-07-24
15:40
Chiba University of Tokyo, Kashiwa Campus A usage of collusion-secure codes to enhance their trace back rates
Yoshinobu Iriguchi, Kazuhiko Yamaguchi (UEC) IT2008-14
Collusion-secure codes are one of countermeasures against collusion attacks, a severe problem in digital fingerprinting.... [more] IT2008-14
pp.33-38
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan