Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2006/07/13)

Presentation
Efficient Implementation of Secure Circuit Evaluation Using Batch Processing

Koji CHIDA,  Go YAMAMOTO,  

[Date]2006/7/13
[Paper #]ISEC2006-26,SITE2006-23
Inspection of sufficient conditions of MD5

Yuto NAKANO,  Hidenori KUWAKADO,  Masakatu MORII,  

[Date]2006/7/13
[Paper #]ISEC2006-27,SITE2006-24
Possibility of the Key Recovery Attack against Py

Takanori ISOBE,  Toshihiro OHIGASHI,  Hidenori KUWAKADO,  Masakatu MORII,  

[Date]2006/7/13
[Paper #]ISEC2006-28,SITE2006-25
Reconsideration of the security of RC6 against asymmetric chi-square test attack

Takatomi WADA,  Atsuko MIYAJI,  Tomohiko HINOUE,  

[Date]2006/7/13
[Paper #]ISEC2006-29,SITE2006-26
On the security of Piece In Hand Concept based on Sequential Solution Method

Daisuke ITO,  Yoshitomo FUKUSHIMA,  Toshinobu KANEKO,  

[Date]2006/7/13
[Paper #]ISEC2006-30,SITE2006-27
Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems

Seiji NAKANO,  Hidenori KUWAKADO,  Masakatu MORII,  

[Date]2006/7/13
[Paper #]ISEC2006-31,SITE2006-28
Intrusion Detection for Encrypted Web Traffic

Akira YAMADA,  Yutaka MIYAKE,  Keisuke TAKEMORI,  

[Date]2006/7/13
[Paper #]ISEC2006-32,SITE2006-29
DHT-based VPN Infrastructure for Home Network Users

Ayumu KUBOTA,  Akira YAMADA,  Yutaka MIYAKE,  

[Date]2006/7/13
[Paper #]ISEC2006-33,SITE2006-30
Performance Improvement of Anomaly Detection System by Simplifying Call Stack Inspection

Katsuhiro SUZUKI,  Hirotake ABE,  Kazuhiko KATO,  Akira KINNO,  Yuka IKEBE,  Takehiro NAKAYAMA,  Atsushi TAKESHITA,  

[Date]2006/7/13
[Paper #]ISEC2006-34,SITE2006-31
A Proposal of Response Delay Method for Spam Mail from BOTNET

Tomonari SEKIYAMA,  Yoshinori KOBAYASHI,  Masakazu TAKAHASHI,  Ryoichi SASAKI,  

[Date]2006/7/13
[Paper #]ISEC2006-35,SITE2006-32
A Method of Correction Plan Generation in the Security Configuration Analyzing System

Sumitaka OKAJO,  Katsushi MATSUDA,  

[Date]2006/7/13
[Paper #]ISEC2006-36,SITE2006-33
On Enforcement of Noninterference

Naoyuki NAGATOU,  Takuo WATANABE,  

[Date]2006/7/13
[Paper #]ISEC2006-37,SITE2006-34
Preventing Buffer Overflow Attacks bypassing NXbit Protection

Takahiro SHINAGAWA,  

[Date]2006/7/13
[Paper #]ISEC2006-38,SITE2006-35
Security Enhancement of HTTP-FUSE KNOPPIX Client by Trusted Computing

Megumi NAKAMURA,  Seiji MUNETOH,  Kuniyasu SUZAKI,  Kengo IIJIMA,  Toshiki YAGI,  Ichiro OSAWA,  

[Date]2006/7/13
[Paper #]ISEC2006-39,SITE2006-36
複写される方へ

,  

[Date]2006/7/13
[Paper #]
Notice about photocopying

,  

[Date]2006/7/13
[Paper #]
奥付

,  

[Date]2006/7/13
[Paper #]
<<12 21-37hit(37hit)