Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2012-05-18 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Separating Short Structure-Preserving Signatures from Non-Interactive Assumptions Masayuki Abe (NTT Labs.) |
(To be available after the conference date) [more] |
|
LOIS |
2012-03-08 13:50 |
Okinawa |
Meio Univ. |
A Proposal of Situation-Sensitive Application Launcher for Smartphones Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] |
LOIS2011-83 pp.61-66 |
NS, IN (Joint) |
2012-03-09 11:20 |
Miyazaki |
Miyazaki Seagia |
Proposal and Evaluation of a Stable Traffic Engineering Method for Live Migration in Cloud Computing Motohiro Seki, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-173 |
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] |
IN2011-173 pp.217-222 |
MoNA, AN, USN (Joint) |
2012-01-20 14:25 |
Mie |
Todaya (Toba) |
A Disaster Victim Search System based on Avalanche Beacons Tomohiro Nagai (UEC), Yukio Tsuruoka (NTT), Hirozumi Yamaguchi (Osaka University), Yoshikatsu Tada (UEC) MoMuC2011-44 |
(To be available after the conference date) [more] |
MoMuC2011-44 pp.43-48 |
ICSS |
2011-03-25 15:10 |
Tokyo |
Suspended |
Automatic Unpacking Based on Entropy of Memory-Access Values Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63 |
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] |
ICSS2010-63 pp.41-46 |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
IN, NS (Joint) |
2011-03-03 10:30 |
Okinawa |
Okinawa Convention Center |
Proposal of Inter-Cloud System Architecture Kunio Hato, Hu Bo, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-169 |
Commercial services using cloud systems have been spreading widely because server virtualization technologies and broadb... [more] |
IN2010-169 pp.151-156 |
IN, NS (Joint) |
2011-03-03 10:50 |
Okinawa |
Okinawa Convention Center |
Proposal of an Inter-Cloud Resource Assignment Algorithm Hu Bo, Kunio Hato, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-170 |
We proposes a resource assignment algorithm for inter-cloud computing systems. An inter-cloud computing system is promis... [more] |
IN2010-170 pp.157-162 |
ISEC, LOIS |
2010-11-18 09:30 |
Ibaraki |
Tsukuba Univ. |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39 |
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] |
ISEC2010-60 LOIS2010-39 pp.73-80 |
COMP |
2010-10-15 13:55 |
Miyagi |
Tohoku Univ. |
Robust Quantum Codeword-State Decoding and Pseudorandomness of the Legendre Sequence (Extended Abstract) Akinori Kawachi (Tokyo Inst. of Tech.), Keita Xagawa (NTT) COMP2010-35 |
[more] |
COMP2010-35 pp.27-33 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:25 |
Aomori |
Hirosaki University |
Evaluating Destination Hosts of Malware Based on Search Engine Results Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24 |
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] |
ISEC2010-18 SITE2010-14 ICSS2010-24 pp.75-80 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:20 |
Aomori |
Hirosaki University |
A note for secure information sharing systems Gembu Morohashi, Akira Nagai (NTT Corp.) ISEC2010-28 SITE2010-24 ICSS2010-34 |
[more] |
ISEC2010-28 SITE2010-24 ICSS2010-34 pp.141-145 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:45 |
Aomori |
Hirosaki University |
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35 |
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] |
ISEC2010-29 SITE2010-25 ICSS2010-35 pp.147-152 |
IA, ICSS |
2010-06-17 13:55 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Automatic OEP Finding Method for Malware Unpacking Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT) IA2010-3 ICSS2010-3 |
Malware analysts have to first extract hidden original code from a packed executable to analyze malware functionalities,... [more] |
IA2010-3 ICSS2010-3 pp.13-18 |
IA, ICSS |
2010-06-17 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
How to Identify Code Region after Detecting Entry Point of Malware Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4 |
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] |
IA2010-4 ICSS2010-4 pp.19-24 |
IA, ICSS |
2010-06-18 14:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Life-cycle Monitoring Method of Malware Download Sites for Websites Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IA2010-14 ICSS2010-14 |
This paper proposes a method to monitor life-cycle of malware download sites for websites and reports the actual life-cy... [more] |
IA2010-14 ICSS2010-14 pp.75-80 |
IN |
2010-06-03 13:50 |
Akita |
Akita ATORION |
A study of using existing Web applicaiton APIs in SIP-Web session linkage system Masashi Toyama, Haruno Kataoka, Shunsuke Kurumatani, Yoshiko Sueda, Michio Shimomura (NTT Corp.) IN2010-12 |
This research aims to establish a web collaborative control system for call parties. The goal is to allow any Website to... [more] |
IN2010-12 pp.11-16 |
IN |
2010-06-04 10:35 |
Akita |
Akita ATORION |
A proposal of the fault detection method for VPN On-demand Interconnection System Kazuhiro Kishi, Takaaki Koyama, Yoshinao Kikuchi, Kimihiko Fukami, Sotetsu Iwamura (NTT) IN2010-19 |
This article proposes a efficient method of fault detection system in VPN On-demand Interconnection System to minimize n... [more] |
IN2010-19 pp.47-50 |
SS |
2010-03-08 16:30 |
Kagoshima |
Kagoshima Univ. |
Similarity Analysis of programming codes by Code Clone technique Akira Sakamoto, Yasunari Kishimoto, Hiroyuki Sato, Toru Kobayashi (NTT) SS2009-60 |
Our research goal is configuring a comprehensively and organically combined repository of software assets. In this study... [more] |
SS2009-60 pp.73-78 |
SS |
2010-03-08 17:00 |
Kagoshima |
Kagoshima Univ. |
Empirical Analysis of Software Similarity Using Text Mining Technology Yasunari Kishimoto, Akira Sakamoto, Hiroyuki Sato, Toru Kobayashi (NTT) SS2009-61 |
If enterprises want to migrate their existing systems to cloud computing environment efficiently, it is considered impor... [more] |
SS2009-61 pp.79-84 |