IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Internet Architecture (IA)  (Searched in: 2015)

Search Results: Keywords 'from:2015-06-11 to:2015-06-11'

[Go to Official IA Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2015-06-11
13:05
Fukuoka Kyushu Institute of Technology Univ. [Invited Talk] Recent trends in multivariate cryptography
Takanori Yasuda (ISIT) IA2015-1 ICSS2015-1
 [more] IA2015-1 ICSS2015-1
pp.1-2
IA, ICSS 2015-06-11
13:45
Fukuoka Kyushu Institute of Technology Univ. [Invited Talk] Establishment of Cybersecurity Education by Industry-Academia Collaboration
Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-2 ICSS2015-2
 [more] IA2015-2 ICSS2015-2
pp.3-8
IA, ICSS 2015-06-11
14:35
Fukuoka Kyushu Institute of Technology Univ. An Efficient Rainbow Table Compression
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IA2015-3 ICSS2015-3
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] IA2015-3 ICSS2015-3
pp.9-14
IA, ICSS 2015-06-11
14:55
Fukuoka Kyushu Institute of Technology Univ. An Empirical Evaluation of Locating Cryptographic Functions on the Memory
Ryoya Furukawa (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.), Daisuke Inoue, Koji Nakao (NICT) IA2015-4 ICSS2015-4
This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis.
... [more]
IA2015-4 ICSS2015-4
pp.15-20
IA, ICSS 2015-06-11
15:15
Fukuoka Kyushu Institute of Technology Univ. Implementation of a Pairing Library Using BN Elliptic Curve
Yusuke Kanbara, Naoki Kanayama, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) IA2015-5 ICSS2015-5
Bilinear mapping which called a pairing can realize high performance cryptographic protocols which could not be construc... [more] IA2015-5 ICSS2015-5
pp.21-26
IA, ICSS 2015-06-11
15:45
Fukuoka Kyushu Institute of Technology Univ. The Analysis of the CREAM vulnerability against OpenSSL
Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] IA2015-6 ICSS2015-6
pp.27-32
IA, ICSS 2015-06-11
16:05
Fukuoka Kyushu Institute of Technology Univ. Traffic Data Analysis for Multiple Darknet and its Applications
Kensho Murai, Keisuke Furumoto (Kobe Univ.), Kosuke Murakami (KDDI), Koji Nakao (KDDI/NICT), Masakatu Morii (Kobe Univ.) IA2015-7 ICSS2015-7
The Internet is transcending national boundaries to become an important and essential communication approach in the worl... [more] IA2015-7 ICSS2015-7
pp.33-38
IA, ICSS 2015-06-11
16:25
Fukuoka Kyushu Institute of Technology Univ. Report on the 23rd USENIX Security Symposium
Shinichi Matsumoto (ISIT), Kazuomi Oishi (SIST), Kuniyasu Suzaki (AIST) IA2015-8 ICSS2015-8
 [more] IA2015-8 ICSS2015-8
pp.39-44
IA, ICSS 2015-06-12
10:30
Fukuoka Kyushu Institute of Technology Univ. Experimental Results on an Attack Detection System for Advanced Persistent Threats
Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] IA2015-9 ICSS2015-9
pp.45-50
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
IA, ICSS 2015-06-12
11:10
Fukuoka Kyushu Institute of Technology Univ. Knapsack Cryptosystems with Random Secret Sequences using Logical And Operation
Yasuyuki Murakami, Shinsuke Hamasho (OECU), Masao Kasahara (WU/CU) IA2015-11 ICSS2015-11
In 2012, the present authors proposed a knapsack public-key cryptosystem using a random secret sequence, which will be r... [more] IA2015-11 ICSS2015-11
pp.57-62
IA, ICSS 2015-06-12
11:30
Fukuoka Kyushu Institute of Technology Univ. A Report on International Conference NDSS2015
Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] IA2015-12 ICSS2015-12
pp.63-68
IA, ICSS 2015-06-12
13:00
Fukuoka Kyushu Institute of Technology Univ. [Invited Talk] Hardware Security for Mobile Devices in Public Spaces
Yu-ichi Hayashi (Tohoku Gakuin Univ.), Naofumi Homma, Takafumi Aoki, Hideaki Sone (Tohoku Univ.) IA2015-13 ICSS2015-13
The users of tablet PCs are rapidly spreading, and accordingly there are many scenes browsing and inputting personal inf... [more] IA2015-13 ICSS2015-13
pp.69-74
IA, ICSS 2015-06-12
13:50
Fukuoka Kyushu Institute of Technology Univ. Camera Based Data Recognition for Enbedding Invisible Information in Images -- New Type for Two-Dimensional Barcode and Its Application --
Tomoe Hatanaka, Yuki Saji, Makoto Takita, Masakatu Morii (Kobe Univ.) IA2015-14 ICSS2015-14
Because Two-dimensional barcodes like a QR code can be read by terminals which equip camera device, it is frequently use... [more] IA2015-14 ICSS2015-14
pp.75-80
IA, ICSS 2015-06-12
14:10
Fukuoka Kyushu Institute of Technology Univ. Can internet measurement be a noise for analysis of darknet?
Yumehisa Haga, Akira Saso, Tatsuya Mori, Shigeki Goto (Waseda Univ.) IA2015-15 ICSS2015-15
Darknet is a passive sensor system dedicated to monitoring traffic
routed to unused IP address space.
Darknets have be... [more]
IA2015-15 ICSS2015-15
pp.81-86
IA, ICSS 2015-06-12
14:30
Fukuoka Kyushu Institute of Technology Univ. A detect method for an undesirable use of e-mail server using cardinality analysis
Akira Sato, Yuki Kato, Kenichi Yoshida, Yasushi Shinjo (Univ. of Tsukuba) IA2015-16 ICSS2015-16
 [more] IA2015-16 ICSS2015-16
pp.87-92
IA, ICSS 2015-06-12
15:00
Fukuoka Kyushu Institute of Technology Univ. Droid Dowser: an APK information gathering system using headless WebKit scriptable with a JavaScript API
Ruo Ando (NICT) IA2015-17 ICSS2015-17
With rising popularization of Android application, more sophisticated methodology is required for inspect information fl... [more] IA2015-17 ICSS2015-17
pp.93-97
IA, ICSS 2015-06-12
15:20
Fukuoka Kyushu Institute of Technology Univ. A study on a Tool for Automated Vulnerability Monitoring and Alerting on Software Assets inside Organizations
Takeshi Takahashi, Daisuke Miyamoto, Bhola Panta, Koji Nakao (NICT) IA2015-18 ICSS2015-18
Each organization needs to manage its IT assets and related vulnerabilities in order to maintain its security level.
Ne... [more]
IA2015-18 ICSS2015-18
pp.99-104
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan