Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2012-05-18 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Separating Short Structure-Preserving Signatures from Non-Interactive Assumptions Masayuki Abe (NTT Labs.) |
(To be available after the conference date) [more] |
|
LOIS |
2012-03-08 13:50 |
Okinawa |
Meio Univ. |
A Proposal of Situation-Sensitive Application Launcher for Smartphones Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] |
LOIS2011-83 pp.61-66 |
NS, IN (Joint) |
2012-03-09 11:20 |
Miyazaki |
Miyazaki Seagia |
Proposal and Evaluation of a Stable Traffic Engineering Method for Live Migration in Cloud Computing Motohiro Seki, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-173 |
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] |
IN2011-173 pp.217-222 |
MoNA, AN, USN (Joint) |
2012-01-20 14:25 |
Mie |
Todaya (Toba) |
A Disaster Victim Search System based on Avalanche Beacons Tomohiro Nagai (UEC), Yukio Tsuruoka (NTT), Hirozumi Yamaguchi (Osaka University), Yoshikatsu Tada (UEC) MoMuC2011-44 |
(To be available after the conference date) [more] |
MoMuC2011-44 pp.43-48 |
IN, NV (Joint) |
2011-07-21 10:40 |
Hokkaido |
Hokkaido University |
Proposal of quick fallback system in IPv4/IPv6 Dual-stack environment Shingo Okada, Tomohiro Fujisaki (NTT) IN2011-45 |
In an IPv4/IPv6 Dual-stack environment, an IPv4/IPv6 Dual-stack node gives priority to protocol of either and communicat... [more] |
IN2011-45 pp.1-4 |
IN |
2011-04-21 14:00 |
Kagawa |
Kagawa University |
A proposal of the Twice NAT method for VPN On-demand Interconnection System Takaaki Koyama, Hideki Yamada, Toshiharu Kishi, Kimihiko Fukami, Hideo Kitazume (NTT) IN2011-4 |
This article proposes an efficient method in VPN On-demand Interconnection System by one-time TwiceNAT devices. Now pres... [more] |
IN2011-4 pp.19-22 |
ICSS |
2011-03-25 15:10 |
Tokyo |
Suspended |
Automatic Unpacking Based on Entropy of Memory-Access Values Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63 |
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] |
ICSS2010-63 pp.41-46 |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
IN, NS (Joint) |
2011-03-03 10:30 |
Okinawa |
Okinawa Convention Center |
Proposal of Inter-Cloud System Architecture Kunio Hato, Hu Bo, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-169 |
Commercial services using cloud systems have been spreading widely because server virtualization technologies and broadb... [more] |
IN2010-169 pp.151-156 |
IN, NS (Joint) |
2011-03-03 10:50 |
Okinawa |
Okinawa Convention Center |
Proposal of an Inter-Cloud Resource Assignment Algorithm Hu Bo, Kunio Hato, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-170 |
We proposes a resource assignment algorithm for inter-cloud computing systems. An inter-cloud computing system is promis... [more] |
IN2010-170 pp.157-162 |
IN |
2011-01-20 08:50 |
Osaka |
Osaka Univ. |
On Estimating Referring Block in Hyperlinked Web Page based on Block-to-Block Similarity Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2010-118 |
(Advance abstract in Japanese is available) [more] |
IN2010-118 pp.1-6 |
ISEC, LOIS |
2010-11-17 16:55 |
Ibaraki |
Tsukuba Univ. |
Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.) ISEC2010-58 LOIS2010-37 |
The computational hardness of number-theoretic problems used in
cryptography is generally proved in a generic model of ... [more] |
ISEC2010-58 LOIS2010-37 pp.57-64 |
ISEC, LOIS |
2010-11-18 09:30 |
Ibaraki |
Tsukuba Univ. |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39 |
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] |
ISEC2010-60 LOIS2010-39 pp.73-80 |
COMP |
2010-10-15 13:55 |
Miyagi |
Tohoku Univ. |
Robust Quantum Codeword-State Decoding and Pseudorandomness of the Legendre Sequence (Extended Abstract) Akinori Kawachi (Tokyo Inst. of Tech.), Keita Xagawa (NTT) COMP2010-35 |
[more] |
COMP2010-35 pp.27-33 |
IA |
2010-08-06 16:35 |
Tokyo |
IIJ Kanda Jinbocho Bldg. |
Traffic Monitoring System based on BGP Message and Flow Data Atsushi Kobayashi, Hiroshi Kurakami, Shingo Kashima, Yousuke Takahashi, Keisuke Ishibashi (NTT) IA2010-28 |
An anomalous traffic change in traffic distributions caused by external inter-domain routing change leads to congestion ... [more] |
IA2010-28 pp.65-70 |
IN |
2010-07-08 15:25 |
Hokkaido |
Hokkaido Univ. |
Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots Takeshi Yagi (NTT Corp.), Alberto Chan (Univ. of British Columbia), Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2010-29 |
[more] |
IN2010-29 pp.37-42 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:25 |
Aomori |
Hirosaki University |
Evaluating Destination Hosts of Malware Based on Search Engine Results Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24 |
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] |
ISEC2010-18 SITE2010-14 ICSS2010-24 pp.75-80 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:20 |
Aomori |
Hirosaki University |
A note for secure information sharing systems Gembu Morohashi, Akira Nagai (NTT Corp.) ISEC2010-28 SITE2010-24 ICSS2010-34 |
[more] |
ISEC2010-28 SITE2010-24 ICSS2010-34 pp.141-145 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:45 |
Aomori |
Hirosaki University |
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35 |
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] |
ISEC2010-29 SITE2010-25 ICSS2010-35 pp.147-152 |
IA, ICSS |
2010-06-17 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
How to Identify Code Region after Detecting Entry Point of Malware Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4 |
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] |
IA2010-4 ICSS2010-4 pp.19-24 |