IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 60  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2012-05-18
16:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Separating Short Structure-Preserving Signatures from Non-Interactive Assumptions
Masayuki Abe (NTT Labs.)
(To be available after the conference date) [more]
LOIS 2012-03-08
13:50
Okinawa Meio Univ. A Proposal of Situation-Sensitive Application Launcher for Smartphones
Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] LOIS2011-83
pp.61-66
NS, IN
(Joint)
2012-03-09
11:20
Miyazaki Miyazaki Seagia Proposal and Evaluation of a Stable Traffic Engineering Method for Live Migration in Cloud Computing
Motohiro Seki, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2011-173
Virtual machine live migration, which migrate a virtual machine between data centers, is studied as a way to improve qua... [more] IN2011-173
pp.217-222
MoNA, AN, USN
(Joint)
2012-01-20
14:25
Mie Todaya (Toba) A Disaster Victim Search System based on Avalanche Beacons
Tomohiro Nagai (UEC), Yukio Tsuruoka (NTT), Hirozumi Yamaguchi (Osaka University), Yoshikatsu Tada (UEC) MoMuC2011-44
(To be available after the conference date) [more] MoMuC2011-44
pp.43-48
IN, NV
(Joint)
2011-07-21
10:40
Hokkaido Hokkaido University Proposal of quick fallback system in IPv4/IPv6 Dual-stack environment
Shingo Okada, Tomohiro Fujisaki (NTT) IN2011-45
In an IPv4/IPv6 Dual-stack environment, an IPv4/IPv6 Dual-stack node gives priority to protocol of either and communicat... [more] IN2011-45
pp.1-4
IN 2011-04-21
14:00
Kagawa Kagawa University A proposal of the Twice NAT method for VPN On-demand Interconnection System
Takaaki Koyama, Hideki Yamada, Toshiharu Kishi, Kimihiko Fukami, Hideo Kitazume (NTT) IN2011-4
This article proposes an efficient method in VPN On-demand Interconnection System by one-time TwiceNAT devices. Now pres... [more] IN2011-4
pp.19-22
ICSS 2011-03-25
15:10
Tokyo Suspended Automatic Unpacking Based on Entropy of Memory-Access Values
Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Mitsutaka Itoh (NTT Corp.) ICSS2010-63
Malware executables are often obfuscated with encryption or compression using a technique known as packing, thus perform... [more] ICSS2010-63
pp.41-46
LOIS 2011-03-04
09:10
Okinawa Ishigaki IT business support center A Consideration of Security Risk in Compromising Hash Function -- An Exposure of Vulnerability against Information Storage System --
Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] LOIS2010-81
pp.95-100
IN, NS
(Joint)
2011-03-03
10:30
Okinawa Okinawa Convention Center Proposal of Inter-Cloud System Architecture
Kunio Hato, Hu Bo, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-169
Commercial services using cloud systems have been spreading widely because server virtualization technologies and broadb... [more] IN2010-169
pp.151-156
IN, NS
(Joint)
2011-03-03
10:50
Okinawa Okinawa Convention Center Proposal of an Inter-Cloud Resource Assignment Algorithm
Hu Bo, Kunio Hato, Yuichi Murata, Junichi Murayama (NTT Corp.) IN2010-170
We proposes a resource assignment algorithm for inter-cloud computing systems. An inter-cloud computing system is promis... [more] IN2010-170
pp.157-162
IN 2011-01-20
08:50
Osaka Osaka Univ. On Estimating Referring Block in Hyperlinked Web Page based on Block-to-Block Similarity
Keiichiro Tsukamoto, Yuki Koizumi, Hiroyuki Ohsaki (Osaka Univ.), Kunio Hato, Junichi Murayama (NTT), Makoto Imase (Osaka Univ.) IN2010-118
(Advance abstract in Japanese is available) [more] IN2010-118
pp.1-6
ISEC, LOIS 2010-11-17
16:55
Ibaraki Tsukuba Univ. Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system
Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.) ISEC2010-58 LOIS2010-37
The computational hardness of number-theoretic problems used in
cryptography is generally proved in a generic model of ... [more]
ISEC2010-58 LOIS2010-37
pp.57-64
ISEC, LOIS 2010-11-18
09:30
Ibaraki Tsukuba Univ. A Proposal of a method to Check Cryptographic Algorithms in Security Protocols -- A Countermeasure against Compromising of Cryptosystems in SSL --
Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] ISEC2010-60 LOIS2010-39
pp.73-80
COMP 2010-10-15
13:55
Miyagi Tohoku Univ. Robust Quantum Codeword-State Decoding and Pseudorandomness of the Legendre Sequence (Extended Abstract)
Akinori Kawachi (Tokyo Inst. of Tech.), Keita Xagawa (NTT) COMP2010-35
 [more] COMP2010-35
pp.27-33
IA 2010-08-06
16:35
Tokyo IIJ Kanda Jinbocho Bldg. Traffic Monitoring System based on BGP Message and Flow Data
Atsushi Kobayashi, Hiroshi Kurakami, Shingo Kashima, Yousuke Takahashi, Keisuke Ishibashi (NTT) IA2010-28
An anomalous traffic change in traffic distributions caused by external inter-domain routing change leads to congestion ... [more] IA2010-28
pp.65-70
IN 2010-07-08
15:25
Hokkaido Hokkaido Univ. Investigation and Evaluation of Attack Monitoring Methods Using Web Honeypots
Takeshi Yagi (NTT Corp.), Alberto Chan (Univ. of British Columbia), Naoto Tanimoto, Takeo Hariu, Mitsutaka Itoh (NTT Corp.) IN2010-29
 [more] IN2010-29
pp.37-42
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:25
Aomori Hirosaki University Evaluating Destination Hosts of Malware Based on Search Engine Results
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] ISEC2010-18 SITE2010-14 ICSS2010-24
pp.75-80
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
11:20
Aomori Hirosaki University A note for secure information sharing systems
Gembu Morohashi, Akira Nagai (NTT Corp.) ISEC2010-28 SITE2010-24 ICSS2010-34
 [more] ISEC2010-28 SITE2010-24 ICSS2010-34
pp.141-145
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
11:45
Aomori Hirosaki University On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] ISEC2010-29 SITE2010-25 ICSS2010-35
pp.147-152
IA, ICSS 2010-06-17
14:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University How to Identify Code Region after Detecting Entry Point of Malware
Makoto Iwamura, Mitsutaka Itoh (NTT/Waseda Univ.), Yoichi Muraoka (Waseda Univ.) IA2010-4 ICSS2010-4
The goal of many existing methods for unpacking was finding OEP (Original Entry Point), not identifying where the origin... [more] IA2010-4 ICSS2010-4
pp.19-24
 Results 1 - 20 of 60  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan