Communication-Information and Communication Management(Date:2013/05/02)

Presentation
Visualization for scan attacks with Network Traffic Viewing System

TOMOYA KOTONE,  KAZUNO MATSUI,  MINORU IKEBE,  KAZUYUKI YOSHIDA,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.18,Vol.2013-IOT-21 No.18
A distribution of MTAs for mail to the Oita University

KAZUNO MATSUI,  TOMOYA KOTONE,  HAZIME KANETAKA,  MINORU IKEBE,  KAZUYUKI YOSHIDA,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.19,Vol.2013-IOT-21 No.19
Improving Network Availability in Saga University

HIROFUMI ETO,  MAKOTO OTANI,  MASANORI HIROTOMO,  YOSHITSUGU MATSUBARA,  SHIN-ICHI TADAKI,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.20,Vol.2013-IOT-21 No.20
Development of Opengate Capable of Detecting Usage Termination by WebSocket

MAKOTO OTANI,  HIROFUMI ETO,  KENZI WATANABE,  SHIN-ICHI TADAKI,  YOSHIAKI WATANABE,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.21,Vol.2013-IOT-21 No.21
Dynamic Grammar Composition for Efficient XMPP Encoding in EXI

,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.22,Vol.2013-IOT-21 No.22
Database development and evaluation of a point card system

ISAO OKAZAKI,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.23,Vol.2013-IOT-21 No.23
A study on resource management model considering a sway in the network service systems

Shinichiro SUDA,  

[Date]2013/5/2
[Paper #]ICM2013-6
Evaluating Integrated Monitoring Method for Cloud Infrastructure

Kengo Kawashima,  Jun Ishida,  Hiroko Ikawa,  Takahiro Shimozori,  Yasuhiro Yamamoto,  Shinichi Okano,  

[Date]2013/5/2
[Paper #]ICM2013-7
A Study on Design Method of Hadoop-based OSSs

Manabu NISHIO,  Naoki TAKE,  

[Date]2013/5/2
[Paper #]ICM2013-8
Operation Issues of Large Scale Authentication Network in Okayama University (2)

NARIYOSHI YAMAI,  KIYOHIKO OKAYAMA,  YOSHIHIRO OHSUMI,  TAKAOKI FUJIWARA,  KEITA KAWANO,  TAKASHI HIEDA,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.27,Vo1.2013-10T-21 No.27
Trial Implementation of SAML-OpenID Gateway for realizing Student Discount Services

Motonori NAKAMURA,  Takeshi NISHIMURA,  Kazutsuna YAMAJI,  Hiroyuki SATO,  Yasuo OKABE,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.28,Vol.2013-IOT-21 No.28
Toward the better design of a national identification number and its utilization system : from the viewpoint of privacy

,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.29,Vol.2013-IOT-21 No.29
A Generating Method of Accessible Verbal Questions for substitution of CAPTCHA-like tests

,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.30,Vol.2013-IOT-21 No.30
On Efficient Space-Time Encoding for DDoS Attacks

MASAKAZU SOSHI,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.31,Vol.2013-IOT-21 No.31
Improvement and Evaluation of Mutable S-box

TAKEAKI NAKABAYASHI,  RYO SAITO,  TOMOYUKI NAGASE,  

[Date]2013/5/2
[Paper #]Vol.2013-CSEC-61 No.32,Vol.2013-IOT-21 No.32
A suitable pseudo-random number generator for stream cipher

AYUMI NAGAO,  SATOSHI MATSUO,  TOMOYUKI NAGASE,  

[Date]2013/5/2
[Paper #]Vo1.2013-CSEC-61 No.33,Vol.2013-IOT-21 No.33
複写される方へ

,  

[Date]2013/5/2
[Paper #]
Notice for Photocopying

,  

[Date]2013/5/2
[Paper #]
奥付

,  

[Date]2013/5/2
[Paper #]
裏表紙

,  

[Date]2013/5/2
[Paper #]
<<12 21-40hit(40hit)