IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2014)

Search Results: Keywords 'from:2015-03-03 to:2015-03-03'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 38 of 38 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2015-03-04
11:40
Okinawa Meio Univiersity Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information
Mio Suzuki (NICT), Jumpei Shimamura (Clwit), Junji Nakazato, Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) ICSS2014-82
At the time of large natural disaster, the Internet could lost its functionalities caused by power outage and physical d... [more] ICSS2014-82
pp.115-120
ICSS 2015-03-04
12:05
Okinawa Meio Univiersity Finding Network Address Blocks Intensively Used for Cyber Attacks
Takuya Tsutsumi, Shuta Morishima, Shogo Suzuki, Kenichi Shibahara, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-83
Recently, cyber attacks have diversified on Internet, so immediate actions are required for them. In this report, we poi... [more] ICSS2014-83
pp.121-126
ICSS 2015-03-04
10:25
Okinawa Meio Univiersity Improving certificate validation function in SSL/TLS implementations of web browser
Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) ICSS2014-84
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] ICSS2014-84
pp.127-132
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA
Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST) ICSS2014-85
The first three bytes of the RC4 key in WPA are derived from the public parameter IV, and also the attacker can obtain t... [more] ICSS2014-85
pp.133-138
ICSS 2015-03-04
11:15
Okinawa Meio Univiersity A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-86
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is require... [more] ICSS2014-86
pp.139-144
ICSS 2015-03-04
11:40
Okinawa Meio Univiersity Consideration for Path Authentication for VANET with Group One-Way Cross-Networks
Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) ICSS2014-87
VANET (Vehicular Ad-hoc Network) is a wireless ad hoc network which interconnects many moving vehicles along roads.
The... [more]
ICSS2014-87
pp.145-150
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity The Geographical Origin Estimation of Malware Using Language Information
Masaru Kawakita, Shigeyoshi Shima (NEC) ICSS2014-88
Cyber attack using malware has become a social problem, it had an impact on the decision in the nation. In the conventio... [more] ICSS2014-88
pp.151-156
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity Targeted Malware Detection Focused on Dummy Document Display
Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] ICSS2014-89
pp.157-161
ICSS 2015-03-04
14:30
Okinawa Meio Univiersity Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis
Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ICSS2014-90
Nowadays, large-scaled DoS attacks from malware, such as bots, have become a big problem. There are several types of DoS... [more] ICSS2014-90
pp.163-168
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] ICSS2014-91
pp.169-174
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] ICSS2014-92
pp.175-179
ICSS 2015-03-04
14:30
Okinawa Meio Univiersity Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] ICSS2014-93
pp.181-186
ICSS 2015-03-04
15:05
Okinawa Meio Univiersity Understanding Android apps that are similar to legitimate ones
Yuta Ishii, Takuya Watanabe (Waseda Univ.), Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2014-94
Because it is not hard to repackage Android apps, there are many repackaged apps in the wild. Previous studies have repo... [more] ICSS2014-94
pp.187-192
ICSS 2015-03-04
15:30
Okinawa Meio Univiersity A Study on Risk Quantification Techniques for Android Applications with Category Information
Takeshi Takahashi (NICT), Takao Mimura, Masata Nishida (SecureBrain), Koji Nakao (NICT) ICSS2014-95
 [more] ICSS2014-95
pp.193-197
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary
Shohei Hiruta, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2014-96
Recent cyber attacks frequently use variants of malware programs where existing functions are drastically improved and n... [more] ICSS2014-96
pp.199-204
ICSS 2015-03-04
15:05
Okinawa Meio Univiersity A Message authentication scheme with variable-length MAC
Yumiko Murakami, Nobuhiro Kobayashi (MELCO) ICSS2014-97
 [more] ICSS2014-97
pp.205-210
ICSS 2015-03-04
15:30
Okinawa Meio Univiersity Flexible Constructions of Hash Chains and Their Key Generation
Shouki Nishiyama, Masakazu Soshi (Hiroshima City Univ.) ICSS2014-98
We have proposed simple and efficient authentication schemes with several
novel elaborate hash chains. In this paper... [more]
ICSS2014-98
pp.211-216
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more]
ICSS2014-99
pp.217-222
 Results 21 - 38 of 38 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan