Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2017-03-14 11:45 |
Nagasaki |
University of Nagasaki |
Representation for Attack Activity to Associate Threat Information Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64 |
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] |
ICSS2016-64 pp.147-152 |
ICSS, IPSJ-SPT |
2017-03-14 10:55 |
Nagasaki |
University of Nagasaki |
A Vulnerability Analysis of Android Applications from the View of Framework Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) |
[more] |
|
ICSS |
2016-11-25 16:10 |
Kanagawa |
Institute of Information Security |
Performance of link-mining techniques to detect malicious websites Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44 |
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] |
ICSS2016-44 pp.31-35 |
ICSS, IA |
2016-06-06 15:00 |
Saga |
Saga University |
Development of Network Forensic System Using Filter Drivers Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IA |
2016-06-06 16:05 |
Saga |
Saga University |
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5 |
(To be available after the conference date) [more] |
IA2016-5 ICSS2016-5 pp.25-30 |
ICSS, IA |
2016-06-07 09:30 |
Saga |
Saga University |
Daiki Ito (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-7 ICSS2016-7 |
[more] |
IA2016-7 ICSS2016-7 pp.33-38 |
ICSS, IA |
2016-06-07 13:00 |
Saga |
Saga University |
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11 |
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] |
IA2016-11 ICSS2016-11 pp.57-62 |
ICSS, IA |
2016-06-07 13:25 |
Saga |
Saga University |
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12 |
(To be available after the conference date) [more] |
IA2016-12 ICSS2016-12 pp.63-68 |
ICSS, IPSJ-SPT |
2016-03-03 13:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Storage-Efficient and Low-Power Packet Classification for Internet of Things Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2015-49 |
This paper addresses packet classification for Internet of Things (IoT) security. Packet Classification is a function to... [more] |
ICSS2015-49 pp.13-18 |
ICSS, IPSJ-SPT |
2016-03-04 14:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Instantly Self-Verifiable Pre-Shared Key Exchange for Cyber-Physical Systems Kohei Isobe (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2015-69 |
There exists a model operator and machines work cooperatively via dynamic connections in the context of Internet of Thin... [more] |
ICSS2015-69 pp.135-140 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 11:30 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
On Anxiety Factors in Indirect Use for Cloud Type Medical Systems Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32 |
We have conducted questionnaire survey for our university students in order to clarify anxiety factors in indirect use f... [more] |
ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32 pp.143-149 |
LOIS |
2015-03-05 09:00 |
Okinawa |
|
Wireless Multi-hop Cache Network for Regional Content Distribution Yusuke Otsuka (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) LOIS2014-61 |
In order to distribute the regional commercial contents such as coupon etc., a wireless network consisted of mobile node... [more] |
LOIS2014-61 pp.1-6 |
LOIS |
2015-03-05 09:20 |
Okinawa |
|
Session Key Exchange Scheme with Instant Authentication and Effect of Audiovisual Media Kohei Isobe (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) LOIS2014-62 |
In order to send and receive data with secrecy via network, both users can securely communicate by valid authentication ... [more] |
LOIS2014-62 pp.7-12 |
LOIS |
2015-03-05 09:40 |
Okinawa |
|
On a Decentralization Function for Deposited Data Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) LOIS2014-63 |
It is considered to be important that linkable anonymized data and its correspondence table between anonymous number and... [more] |
LOIS2014-63 pp.13-17 |
LOIS |
2015-03-06 10:30 |
Okinawa |
|
The Relation on Sense of Security, Consent and Use Intention for an Information System and Service by Degree of Use Intention Kaori Okumura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) LOIS2014-82 |
The online service that utilized the privacy information of user spreads out, and the further development is expected. F... [more] |
LOIS2014-82 pp.123-128 |
ICSS |
2015-03-03 16:15 |
Okinawa |
Meio Univiersity |
Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70 |
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] |
ICSS2014-70 pp.43-48 |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-86 |
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is require... [more] |
ICSS2014-86 pp.139-144 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] |
ICSS2014-92 pp.175-179 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] |
ICSS2014-93 pp.181-186 |