|
|
Technical Committee on Information and Communication System Security (ICSS) (Searched in: 2013)
|
|
Search Results: Keywords 'from:2014-03-27 to:2014-03-27'
|
[Go to Official ICSS Homepage] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2014-03-28 13:30 |
Okinawa |
Meio Univiersity |
A Method To Detect Android Privilege Escalation Wataru Hasegawa, Lujo Bauer (Carnegie Mellon Univ.), Kilho Shin (Univ. of Hyogo) ICSS2013-82 |
Privilege Escalation on mobile devices is a particular concern, due both to the large amount of sensitive personal data ... [more] |
ICSS2013-82 pp.143-148 |
ICSS, IPSJ-SPT |
2014-03-28 13:55 |
Okinawa |
Meio Univiersity |
Proposal of malware classification method based on pattern similarity of traffic Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura (Nagoya Univ.) ICSS2013-83 |
[more] |
ICSS2013-83 pp.149-154 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Design of HTTP Communication Profiling for Infected Hosts Detection Daiki Chiba, Kensuke Nakata, Mitsuaki Akiyama, Kazufumi Aoki, Kazunori Kamiya, Takeshi Yagi (NTT) ICSS2013-84 |
Countermeasures against malware should need both prevention and detection of malware infection. Detection of malware-inf... [more] |
ICSS2013-84 pp.155-160 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) ICSS2013-85 |
It is not always true that enough information can be got by just using website analysis services, because some malicious... [more] |
ICSS2013-85 pp.161-166 |
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
A Study on the Formulation of Re-identification of Anonymized Personal Information Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) ICSS2013-86 |
Anonymizing personal information is one way to preserve human's privacy.
But combination of anonymized information mig... [more] |
ICSS2013-86 pp.167-172 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Comparison of Privacy Policies in Different Domains Toru Nakamura (KDDI Lab.), Milena Tasic (Univ. of Belgrade), Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) ICSS2013-87 |
Improvement of description of privacy policy is required for effective
utilization of personal data. The goal of this ... [more] |
ICSS2013-87 pp.173-178 |
ICSS, IPSJ-SPT |
2014-03-28 09:50 |
Okinawa |
Meio Univiersity |
Shortening of High Load Virtual Machine Live Migration Time by Controlling CPU Resource Yasuhiro Teramoto, Toshiharu Kishi, Yukio Nagafuchi, Takaaki Koyama, Hideo Kitazume (NTT) ICSS2013-88 |
The growth of virtualizing technology makes it possible to provide virtual network hosting service such as IaaS. In IaaS... [more] |
ICSS2013-88 pp.179-184 |
ICSS, IPSJ-SPT |
2014-03-28 10:15 |
Okinawa |
Meio Univiersity |
Evaluation of user average delay reducing method in the live migration environment between datacenters Yukio Nagafuchi, Yasuhiro Teramoto, Toshiharu Kishi, Takaaki Koyama, Hideo Kitazume (NTT) ICSS2013-89 |
The network virtualization technology enables to construct L2 network between remote data centers (DCs); furthermore it ... [more] |
ICSS2013-89 pp.185-190 |
ICSS, IPSJ-SPT |
2014-03-28 13:30 |
Okinawa |
Meio Univiersity |
A Speculation of Operating an Integrated Service for Manifatures on Public Clouds and Issues Regarding Security Takashi Sakakura (Mitsubishi Electric) ICSS2013-90 |
[more] |
ICSS2013-90 pp.211-215 |
ICSS, IPSJ-SPT |
2014-03-28 13:55 |
Okinawa |
Meio Univiersity |
Evaluation of hash tree construction on P2P networks Tomoyuki Asaeda, Taihei Higuchi, Masakazu Soshi (Hiroshima City Univ.) ICSS2013-91 |
In recent years communication systems called P2P, where the peers communicate with one another
without the support of... [more] |
ICSS2013-91 pp.217-224 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Path Authentication for VANET with Group One-Way Cross-Networks Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) ICSS2013-92 |
In recent years, the implementation of advanced traffic information networks has been made possible with the development... [more] |
ICSS2013-92 pp.225-229 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
System Security Analysis using Dependency Relationship on Cloud Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) ICSS2013-93 |
Recently, many systems are developed using the cloud computing environment. In those systems, an operator of a SaaS uses... [more] |
ICSS2013-93 pp.231-236 |
ICSS, IPSJ-SPT |
2014-03-28 15:10 |
Okinawa |
Meio Univiersity |
Higher Order Differential Property of LBlock(II) Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ICSS2013-94 |
LBlock is a block cipher with 64-bit block length and 80-bit key length, which was proposed by Wu et.al in 2011.It has b... [more] |
ICSS2013-94 pp.237-242 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|