|
|
Technical Committee on Information and Communication System Security (ICSS) (Searched in: 2009)
|
|
Search Results: Keywords 'from:2009-05-15 to:2009-05-15'
|
[Go to Official ICSS Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2009-05-15 13:15 |
Hyogo |
Kobe University |
[Special Talk]
Trends of International Standardization in ISO/IEC JTC1/SC27/WG4
-- Trends of Network/Application Security -- Koji Nakao (KDDI) ICSS2009-1 |
[more] |
ICSS2009-1 p.1 |
ICSS |
2009-05-15 13:40 |
Hyogo |
Kobe University |
[Special Talk]
Internatinal Standarization Activities in ITU-T Study Group 17 (Security)
-- Standarizatoin on Network Security and ID Management -- Yutaka Miyake, Ryu Watanabe (KDDI Labs.) ICSS2009-2 |
This paper describes activities of international standard related security issues at the ITU-T which is international st... [more] |
ICSS2009-2 pp.3-8 |
ICSS |
2009-05-15 14:20 |
Hyogo |
Kobe University |
Notes on Malware Detection System Based on Process Monitoring Yuko Ozasa, Kengo Kuniyoshi, Akira Morikawa, Masakatu Morii (Kobe Univ.) ICSS2009-3 |
Due to the increase of malwares and its variants, such as bots, worms,
spywares and adwares, both personal and busines... [more] |
ICSS2009-3 pp.9-14 |
ICSS |
2009-05-15 14:45 |
Hyogo |
Kobe University |
Network Observation and Analysis Report on nicter Junji Nakazato, Kazuhiro Ohtaka (NICT), Jumpei Shimamura (For Schooner), Koji Nakao (NICT) ICSS2009-4 |
(To be available after the conference date) [more] |
ICSS2009-4 pp.15-20 |
ICSS |
2009-05-15 15:10 |
Hyogo |
Kobe University |
Investigation of Spam Mail Driven Web-Based Passive Attack Yuhei Kawakoya, Mitsuaki Akiyama, Kazufumi Aoki, Mitsutaka Itoh (NTT), Hiroki Takakura (Kyoto Univ) ICSS2009-5 |
In recent years, the number of web-based passive attacks which are driven by URLs included in spam mail is increasing. B... [more] |
ICSS2009-5 pp.21-26 |
ICSS |
2009-05-15 15:35 |
Hyogo |
Kobe University |
Anti-spam E-mail Method based on Characteristic Token Ratio Accounting for All Tokens Masahiro Uemura, Toshihiro Tabata (Okayama Univ.) ICSS2009-6 |
Using Bayesian filter is a popular approach to distinguish between spam and legitimate e-mails.
This filter proffers au... [more] |
ICSS2009-6 pp.27-32 |
ICSS |
2009-05-15 16:15 |
Hyogo |
Kobe University |
A Study on Modification Attacks on WPA Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) |
[more] |
|
ICSS |
2009-05-15 16:40 |
Hyogo |
Kobe University |
Private List Matching Protocol and its Application Hiroaki Kikuchi, Daisuke Kagawa (Tokai Univ.) ICSS2009-7 |
We may collaborate with someone with common preference in particular fields, e.g.,
sharing, exchange useful information... [more] |
ICSS2009-7 pp.33-36 |
ICSS |
2009-05-15 17:05 |
Hyogo |
Kobe University |
A Mutual Authentication System for Web Access Using Web Browser Extension and Cellular Phone Yukiko Sawaya, Yutaka Miyake (KDDI Labs.) ICSS2009-8 |
The two-factor client authentication methods such as one-time password scheme or using cellular phone network with ID/pa... [more] |
ICSS2009-8 pp.37-42 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|