IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 8 of 8  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
R 2021-11-30
13:25
Online Online Predicting Vulnerability Discovery Processes in Support Periods for an Operating System
Kento Kubota, Tadashi Dohi, Hiroyuki Okamura (Hiroshima Univ.) R2021-35
In this note, we classify the severity level of software vulnerabilities founded in Debian Linux Version 8.0, which is a... [more] R2021-35
pp.7-12
CPSY, RECONF, VLD, IPSJ-ARC, IPSJ-SLDM [detail] 2021-01-26
15:05
Online Online Detection of Vulnerability Inducing Code Optimization Based on Binary Code
Yuka Azuma, Nagisa Ishiura (Kwansei Gakuin Univ.) VLD2020-65 CPSY2020-48 RECONF2020-84
In this paper, we propose a method to detect vulnerability inducing code elimination by compiler optimization. It is re... [more] VLD2020-65 CPSY2020-48 RECONF2020-84
pp.148-153
ASN, ICTSSL 2018-05-14
16:00
Hiroshima Hiroshima City Univ. [Special Talk] Security check for campus-wide network using vulnerability diagnosis software
Kenji Ishida, Susumu Idenoue (Hiroshima City Univ.) ICTSSL2018-6 ASN2018-6
Security management is important in operation and management of campus wide network. For this security management, it is... [more] ICTSSL2018-6 ASN2018-6
pp.29-33
ISEC 2015-09-04
11:45
Tokyo Kikai-Shinko-Kaikan Bldg. An extension of cryptographic protocol in distributed in-memory caching system
Ruo Ando (NICT) ISEC2015-28
Recent distributed system adopts object caching subsystem in order to achieve scalability. In many cases, its transactio... [more] ISEC2015-28
pp.21-26
R 2010-05-28
16:35
Tottori   Security evaluation of software system with security patch maintenance
Masataka Tokuzane, Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2010-16
This paper proposes software security criterion based
on a stochastic model. Especially we consider the software syste... [more]
R2010-16
pp.55-60
R 2008-05-30
15:00
Hyogo Kobe Gakuin Univ. Quantitative Security Analysis of an IMS-based VoIP Network System
Toshikazu Uemura, Tadashi Dohi, Naoto Kaio (Hiroshima Univ.) R2008-12
In multimedia wireless networks, the VoIP (voice of internet protocol) technology is commonly used to compress the voice... [more] R2008-12
pp.19-24
SS 2008-03-04
09:55
Nagasaki Nagasaki Univ. A Proposal of The Secure Software Engineering
Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] SS2007-71
pp.85-90
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:10
Hokkaido Future University-Hakodate Evaluation of a library against injection attacks
Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC)
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] ISEC2007-41 SITE2007-35
pp.177-184
 Results 1 - 8 of 8  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan