IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2006)

Search Results: Keywords 'from:2006-07-20 to:2006-07-20'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 65 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2006-07-20
16:35
Okayama Okayama Univ. Possibility of the Key Recovery Attack against Py
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
Biham and Seberry have submitted the stream cipher Py to the ECRYPT
Stream Cipher Project (eSTREAM).
In this paper, ... [more]
ISEC2006-28 SITE2006-25
pp.141-148
ISEC, SITE, IPSJ-CSEC 2006-07-20
17:00
Okayama Okayama Univ. Tight theoretical estimation of the security of RC6 against chi-square attack
Takatomi Wada, Atsuko Miyaji (JAIST), Tomohiko Hinoue (OMRON)
 [more] ISEC2006-29 SITE2006-26
pp.149-154
ISEC, SITE, IPSJ-CSEC 2006-07-20
17:25
Okayama Okayama Univ. On the security of Piece In Hand Concept based on Sequential Solution Method
Daisuke Ito, Yoshitomo Fukushima, Toshinobu Kaneko (TUS)
In 2003, Tsujii et al. proposed multivariate type public key cryptosystem, named \textit{Piece In Hand Concept}. This cr... [more] ISEC2006-30 SITE2006-27
pp.155-159
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:00
Okayama Okayama Univ. A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems
Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
The interconnected IP traceback is a method for identifying theoriginator of an IP packet. A traceback server sends quer... [more] ISEC2006-31 SITE2006-28
pp.161-165
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:25
Okayama Okayama Univ. IDS for SSL Enncrypted Web Traffic
Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.)
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] ISEC2006-32 SITE2006-29
pp.167-173
ISEC, SITE, IPSJ-CSEC 2006-07-20
13:50
Okayama Okayama Univ. DHT-based Dynamic VPN Instantiation Mechanism for Secure Home Network Access
Ayumu Kubota, Akira Yamada, Yutaka Miyake (KDDI R&D Labs.)
 [more] ISEC2006-33 SITE2006-30
pp.175-182
ISEC, SITE, IPSJ-CSEC 2006-07-20
14:15
Okayama Okayama Univ. Performance Improvement of Anomaly Detection System by Simplifying Call Stack Inspection
Katsuhiro Suzuki (Univ. of Tsukuba), Hirotake Abe (JST), Kazuhiko Kato (Univ. of Tsukuba), Akira Kinno, Yuka Ikebe, Takehiro Nakayama, Atsushi Takeshita (NTT DoCoMo)
Recently, the computer is exposed to various attacks from the outside and the inside of the system. We are studying to t... [more] ISEC2006-34 SITE2006-31
pp.183-190
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:20
Okayama Okayama Univ. A Proposal of Response Delay Method for Spam Mail from BOTNET
Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU)
Recently, increasing spam mails have been becoming causes of many problems. About 80 % of spam mails have been sent from... [more] ISEC2006-35 SITE2006-32
pp.191-197
ISEC, SITE, IPSJ-CSEC 2006-07-20
15:45
Okayama Okayama Univ. A Study on Bot Detection using Response Time
Yuji Hoshizawa, Motoaki Yamamura (SecureBrain)
 [more]
ISEC, SITE, IPSJ-CSEC 2006-07-20
16:10
Okayama Okayama Univ. A Configuration Parameter Correction for Security Configuration Analyzing System
Sumitaka Okajo, Katsushi Matsuda (NEC)
 [more] ISEC2006-36 SITE2006-33
pp.199-206
ISEC, SITE, IPSJ-CSEC 2006-07-20
16:35
Okayama Okayama Univ. On Enforcement of Noninterference
Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech)
We discuss a characterization of security policies to be enforced with a monitor. The monitor is a enforcement mechanism... [more] ISEC2006-37 SITE2006-34
pp.207-214
ISEC, SITE, IPSJ-CSEC 2006-07-20
17:00
Okayama Okayama Univ. Preventing Buffer Overflow Attacks bypassing NXbit Protection
Takahiro Shinagawa (TUAT)
This paper presents a protection scheme to prevent buffer overflow attacks that bypass the NXbit protection and execute ... [more] ISEC2006-38 SITE2006-35
pp.215-222
ISEC, SITE, IPSJ-CSEC 2006-07-20
17:25
Okayama Okayama Univ. Security Enhancement of HTTP-FUSE Knoppix Client by Trusted Computing
Megumi Nakamura, Seiji Munetoh (IBM Japan), Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Ichiro Osawa (AIST)
HTTP-FUSE KNOPPIX starts by getting the root filesystem by way of the Internet. The reliability of this KNOPPIX is great... [more] ISEC2006-39 SITE2006-36
pp.223-230
ISEC, SITE, IPSJ-CSEC 2006-07-21
09:30
Okayama Okayama Univ. A Study of Partial Disclosure Problem in Ramp Schemes Using Polynomial Function -- A Proposal of Cascaded Ramp Scheme --
Keiichi Hirota (NTT), Kazuo Mogi (NTT Communications)
 [more] ISEC2006-40
pp.1-8
ISEC, SITE, IPSJ-CSEC 2006-07-21
09:55
Okayama Okayama Univ. Quantum Threshold Scheme Using Two States
Takeshi Okada, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
Cleve, Gottesman, and Lo have shown the (k,n) quantum threshold scheme using several states. However, it is not easy to... [more] ISEC2006-41
pp.9-12
ISEC, SITE, IPSJ-CSEC 2006-07-21
10:20
Okayama Okayama Univ. Traveling Salesman Problem and Tribonacci Sequence
Kunikatsu Kobayashi, Seiichirou Kokubun (Yamagata Univ.)
We consider the relation between the cycle and cycle length of traveling salesman problem using tribonacci sequence. It ... [more] ISEC2006-42
pp.13-18
ISEC, SITE, IPSJ-CSEC 2006-07-21
10:45
Okayama Okayama Univ. Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols
Hirofumi Muratani (Toshiba)
We derive a lower bound on the round complexity of an $m$-bounded concurrent black-box zero-knowledge interactive proof ... [more] ISEC2006-43
pp.19-26
ISEC, SITE, IPSJ-CSEC 2006-07-21
11:10
Okayama Okayama Univ. Privacy-preserving Scalar Product Comparison Protocol
Jun Sakuma, Shigenobu Kobayashi (TokyoTech)
 [more] ISEC2006-44
pp.27-34
ISEC, SITE, IPSJ-CSEC 2006-07-21
11:35
Okayama Okayama Univ. Secure optimization for distributed TSP using scalar product comparison protocol
Jun Sakuma, Shigenobu Kobayashi (TokyoTech)
 [more] ISEC2006-45
pp.35-42
ISEC, SITE, IPSJ-CSEC 2006-07-21
09:30
Okayama Okayama Univ. On the Standardization of Information Security -- Report on the Madrid Meeting in May, 2006 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba)
 [more] ISEC2006-46
pp.43-52
 Results 21 - 40 of 65 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan