IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 65  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2012-05-18
16:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Separating Short Structure-Preserving Signatures from Non-Interactive Assumptions
Masayuki Abe (NTT Labs.)
(To be available after the conference date) [more]
LOIS 2012-03-08
13:50
Okinawa Meio Univ. A Proposal of Situation-Sensitive Application Launcher for Smartphones
Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] LOIS2011-83
pp.61-66
NS, IN
(Joint)
2012-03-09
11:20
Miyazaki Miyazaki Seagia Proposal and Evaluation of a Stable Traffic Engineering Method for Live Migration in Cloud Computing
Motohiro Seki, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-173
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] IN2011-173
pp.217-222
MoNA, AN, USN
(Joint)
2012-01-20
14:25
Mie Todaya (Toba) A Disaster Victim Search System based on Avalanche Beacons
Tomohiro Nagai (UEC), Yukio Tsuruoka (NTT), Hirozumi Yamaguchi (Osaka University), Yoshikatsu Tada (UEC) MoMuC2011-44
(To be available after the conference date) [more] MoMuC2011-44
pp.43-48
ICSS 2011-03-25
15:10
Tokyo Suspended Automatic Unpacking Based on Entropy of Memory-Access Values
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] ICSS2010-63
pp.41-46
LOIS 2011-03-04
09:10
Okinawa Ishigaki IT business support center A Consideration of Security Risk in Compromising Hash Function -- An Exposure of Vulnerability against Information Storage System --
Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] LOIS2010-81
pp.95-100
IN, NS
(Joint)
2011-03-03
10:30
Okinawa Okinawa Convention Center Proposal of Inter-Cloud System Architecture
Kunio Hato, Hu Bo, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-169
Commercial services using cloud systems have been spreading widely because server virtualization technologies and broadb... [more] IN2010-169
pp.151-156
IN, NS
(Joint)
2011-03-03
10:50
Okinawa Okinawa Convention Center Proposal of an Inter-Cloud Resource Assignment Algorithm
Hu Bo, Kunio Hato, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-170
We proposes a resource assignment algorithm for inter-cloud computing systems. An inter-cloud computing system is promis... [more] IN2010-170
pp.157-162
ISEC, LOIS 2010-11-18
09:30
Ibaraki Tsukuba Univ. A Proposal of a method to Check Cryptographic Algorithms in Security Protocols -- A Countermeasure against Compromising of Cryptosystems in SSL --
Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] ISEC2010-60 LOIS2010-39
pp.73-80
COMP 2010-10-15
13:55
Miyagi Tohoku Univ. Robust Quantum Codeword-State Decoding and Pseudorandomness of the Legendre Sequence (Extended Abstract)
Akinori Kawachi (Tokyo Inst. of Tech.), Keita Xagawa (NTT) COMP2010-35
 [more] COMP2010-35
pp.27-33
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:25
Aomori Hirosaki University Evaluating Destination Hosts of Malware Based on Search Engine Results
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] ISEC2010-18 SITE2010-14 ICSS2010-24
pp.75-80
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
11:20
Aomori Hirosaki University A note for secure information sharing systems
Gembu Morohashi, Akira Nagai (NTT Corp.) ISEC2010-28 SITE2010-24 ICSS2010-34
 [more] ISEC2010-28 SITE2010-24 ICSS2010-34
pp.141-145
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
11:45
Aomori Hirosaki University On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] ISEC2010-29 SITE2010-25 ICSS2010-35
pp.147-152
IA, ICSS 2010-06-17
13:55
Kyoto Academic Center for Computing and Media Studies, Kyoto University Automatic OEP Finding Method for Malware Unpacking
Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] IA2010-3 ICSS2010-3
pp.13-18
IA, ICSS 2010-06-17
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University How to Identify Code Region after Detecting Entry Point of Malware
Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] IA2010-4 ICSS2010-4
pp.19-24
IA, ICSS 2010-06-18
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Life-cycle Monitoring Method of Malware Download Sites for Websites
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] IA2010-14 ICSS2010-14
pp.75-80
IN 2010-06-03
13:50
Akita Akita ATORION A study of using existing Web applicaiton APIs in SIP-Web session linkage system
Masashi Toyama, Haruno Kataoka, Shunsuke Kurumatani, Yoshiko Sueda, Michio Shimomura (NTT Corp.) IN2010-12
This research aims to establish a web collaborative control system for call parties. The goal is to allow any Website to... [more] IN2010-12
pp.11-16
IN 2010-06-04
10:35
Akita Akita ATORION A proposal of the fault detection method for VPN On-demand Interconnection System
Kazuhiro Kishi, Takaaki Koyama, Yoshinao Kikuchi, Kimihiko Fukami, Sotetsu Iwamura (NTT) IN2010-19
This article proposes a efficient method of fault detection system in VPN On-demand Interconnection System to minimize n... [more] IN2010-19
pp.47-50
SS 2010-03-08
16:30
Kagoshima Kagoshima Univ. Similarity Analysis of programming codes by Code Clone technique
Akira Sakamoto, Yasunari Kishimoto, Hiroyuki Sato, Toru Kobayashi (NTT) SS2009-60
Our research goal is configuring a comprehensively and organically combined repository of software assets. In this study... [more] SS2009-60
pp.73-78
SS 2010-03-08
17:00
Kagoshima Kagoshima Univ. Empirical Analysis of Software Similarity Using Text Mining Technology
Yasunari Kishimoto, Akira Sakamoto, Hiroyuki Sato, Toru Kobayashi (NTT) SS2009-61
If enterprises want to migrate their existing systems to cloud computing environment efficiently, it is considered impor... [more] SS2009-61
pp.79-84
 Results 1 - 20 of 65  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan