IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, LOIS 2022-11-18
16:55
Online Online Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing
Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] ISEC2022-44 SITE2022-48 LOIS2022-28
pp.85-91
IE, IMQ, MVE, CQ
(Joint) [detail]
2020-03-06
11:05
Fukuoka Kyushu Institute of Technology
(Cancelled but technical report was issued)
Analyzing Effectiveness of Blacklisting Policy Focusing on ON/OFF Pattern of Scan Activities
Takashi Fujita, Naoki Fukushi, Masato Uchida (Waseda Univ.) CQ2019-151
A blacklist registers IP addresses and domain names found to be involved in malicious activity. Blacklist providers set ... [more] CQ2019-151
pp.87-92
IA, IN
(Joint)
2018-12-13
15:35
Hiroshima Hiroshima Univ. Clustering Malicious DNS Queries Detected by Using Blacklists
Akihiro Satoh, Yutaka Nakamura, Mitsutaka Ogura, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2018-42
(To be available after the conference date) [more] IA2018-42
pp.17-22
ICSS, IPSJ-SPT 2018-03-07
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A study of security requirements and function implementation for home networks in a period of IoT expansion
Shingo Kashima, Tsuyoshi Kondoh, Tetsuhiko Murata, Masami Ueno (NTT) ICSS2017-59
We discuss the security requirements in the home networks in a period of IoT expansion. Based on the security requiremen... [more] ICSS2017-59
pp.49-54
NS, IN
(Joint)
2018-03-01
09:20
Miyazaki Phoenix Seagaia Resort A distributed security gateway scheme for preventing advanced targeted attacks by cooperated multiple hosts
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-90
Recently, cyber attacks that targeting enterprises become serious.The majority of the damage is information leakage.As a... [more] IN2017-90
pp.5-10
ISEC, COMP 2017-12-21
16:15
Kochi Eikokuji Campus, Kochi University of Technology Blacklistable Anonymous Credential System with Reputation Using Accumulator
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] ISEC2017-81 COMP2017-35
pp.59-65
RCS, IN, NV
(Joint)
2017-05-12
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Distributive Analyzing Scheme of Host Operation for Blocking Information Leakage from an Intranet
Ryuji Maeda, Junichi Murayama (Tokai Univ.) IN2017-5
Recently, damage by targeted attacks is getting worse. These attacks leak corporate information. For preventing such lea... [more] IN2017-5
pp.21-24
COMP, ISEC 2016-12-21
09:30
Hiroshima Hiroshima University Improvements of Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2016-70 COMP2016-31
In current ID-based user authentication schemes, privacy issues may occur, since users’ behavior histories are collected... [more] ISEC2016-70 COMP2016-31
pp.1-7
LOIS, ISEC, SITE 2015-11-06
16:45
Kanagawa Kanagawa Univ. Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2015-47 SITE2015-34 LOIS2015-41
In current ID-based user authentication schemes, privacy issues may occur, since users' behavior histories are collected... [more] ISEC2015-47 SITE2015-34 LOIS2015-41
pp.75-80
IA, ICSS 2015-06-12
10:50
Fukuoka Kyushu Institute of Technology Univ. Detecting Malicious Domain Names based on the Time-series Analysis of Attackers Network Resources
Daiki Chiba (NTT/Waseda Univ.), Takeshi Yagi, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.), Takeshi Yada, Takeo Hariu (NTT), Shigeki Goto (Waseda Univ.) IA2015-10 ICSS2015-10
Attackers launching cyber attacks frequently change their malicious websites to evade countermeasures such as blacklisti... [more] IA2015-10 ICSS2015-10
pp.51-56
EMM 2015-01-28
15:15
Miyagi Tohoku University Proposal for 3D-Printing Regulation Technique in Fabricating Dangerous Devices Using Feature-Vector Based Matching Algorithm of 3D Shapes
Toshio Modegi (DNP) EMM2014-69
In the previous report, we have proposed a 3D-printing regulation system in fabricating dangerous devices, which can rej... [more] EMM2014-69
pp.15-20
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:50
Hokkaido San-Refure Hakodate A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis
Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications) ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44
In order to detect the malware infection in internal network, we focus on HTTP traffic to the Internet. URL blacklist is... [more] ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44
pp.309-314
ICSS, IPSJ-SPT 2014-03-28
12:05
Okinawa Meio Univiersity Identifying C&C Server by Analyzing Relation between Control Flow and Communications
Tomonori Ikuse, Kazufumi Aoki, Takeo Hariu (NTT) ICSS2013-81
In recent years, it is difficult to prevent malware infection entirely because of the diversi cation of attack vectors a... [more] ICSS2013-81
pp.137-142
IA, SITE, IPSJ-IOT [detail] 2013-03-14
11:55
Nara Todaiji Total Cultural Center A proposal of implementation template to facilitate development of Collaborative Intrusion Detection System
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) SITE2012-52 IA2012-90
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] SITE2012-52 IA2012-90
pp.43-48
IA 2012-11-19
17:10
Fukushima Kanponoyado Iwaki (Fukushima) Consideration of Peer-to-peer Architecture for Collaborative Intrusion Detection
Yoshimasa Obana, Masatoshi Enomoto, Hiroaki Hazeyama, Youki Kadobayashi (NAIST) IA2012-56
Collaborative IDS is an IDS(Intrusion Detection System) architecture to solve common IDS problems like accuracy of detec... [more] IA2012-56
pp.23-28
IN, RCS
(Joint)
2012-05-17
15:50
Tokyo Kuramae-Kaikan, Tokyo Institute of Technology [Invited Talk] Design of a blacklisting system for Countermeasures against Malware Infection
Takeshi Yagi (NTT) IN2012-16 RCS2012-30
With the widespread use of the Internet, the number of security problems, such as phishing and spam, continues to steadi... [more] IN2012-16 RCS2012-30
pp.25-30(IN), pp.49-54(RCS)
IN 2011-01-21
14:55
Osaka Osaka Univ. Face Routing Protocol based on Incomplete Location Information of Neighbor Nodes
Tomokazu Ezaki, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-137
In Face ad-hoc routing protocols, a wireless multihop transmission route from a source node to a destination one is dete... [more] IN2010-137
pp.109-114
IN, MoNA
(Joint)
2010-11-18
14:50
Fukuoka Fukuoka Institute of Technology Architecture Design of Web Phantom: Hybrid Web Honeypot
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT) IN2010-85
This paper proposes a hybrid web honeypot, namely Web Phantom, which generates a blacklist to prevent malware infection ... [more] IN2010-85
pp.25-30
ICSS 2010-11-05
16:00
Hiroshima Hiroshima City University Determining granularity of URL filtering based on tree structure of malicious website URL
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) ICSS2010-53
A network administrator takes a measure based on the blacklist to prevent end users from accessing unwanted malicious we... [more] ICSS2010-53
pp.53-58
ICSS 2009-11-13
13:55
Miyazaki University of Miyazaki Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis
Akira Yamada (KDDI R&D Labs. Inc.,), Masanori Hara (KDDI Corp.), Yutaka Miyake (KDDI R&D Labs. Inc.,), Kazuo Hashimoto (Tohoku Univ.) ICSS2009-58
Web tracking sites or Web bugs are potential but serious threats to users' privacy during Web browsing. Web sites and th... [more] ICSS2009-58
pp.25-30
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan