Information and Systems-Information and Communication System Security(Date:2015/02/24)

Presentation
A Cyber Attack Information Gathering Method That Adopts Integrated Malware Detection Service and Dynamic Analysis

Shuta MORISHIMA,  Takuya TSUTSUMI,  Rui TANABE,  Yusuke TAKAHASHI,  Masaaki KOBAYASHI,  Ryota KIKKAWA,  Katsunari YOSHIOKA,  Tsutomu MATSUMOTO,  

[Date]2015/2/24
[Paper #]ICSS2014-81
Internet Alive Monitoring Method around Disaster Areas Using Large-scale Darknet, Autonomous System Information, and Geographical Information

Mio SUZUKI,  Jumpei SHIMAMURA,  Junji NAKAZATO,  Daisuke INOUE,  Masashi ETO,  Koji NAKAO,  

[Date]2015/2/24
[Paper #]ICSS2014-82
Finding Network Address Blocks Intensively Used for Cyber Attacks

Takuya TSUTSUMI,  Syuta MORISHIMA,  Shogo SUZUKI,  Kenichi SHIBAHARA,  Katsunari YOSHIOKA,  Tsutomu MATSUMOTO,  

[Date]2015/2/24
[Paper #]ICSS2014-83
Improving certificate validation function in SSL/TLS implementations of web browser

Satoshi KAMEKAWA,  Atsuko MIYAJI,  Yuichi FUTA,  

[Date]2015/2/24
[Paper #]ICSS2014-84
New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA

Daiki MICHIHIRO,  Atsuko MIYAJI,  Ryoma ITO,  

[Date]2015/2/24
[Paper #]ICSS2014-85
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology

Hitoshi MIYAZAKI,  Masami MOHRI,  Yoshiaki SHIRAISHI,  

[Date]2015/2/24
[Paper #]ICSS2014-86
Consideration for Path Authentication for VANET with Group One-Way Cross-Networks

Shoma KITAYAMA,  Masakazu SOSHI,  

[Date]2015/2/24
[Paper #]ICSS2014-87
The Geographical Origin Estimation of Malware Using Language Information

Masaru KAWAKITA,  Shigeyoshi SHIMA,  

[Date]2015/2/24
[Paper #]ICSS2014-88
Targeted Malware Detection Focused on Dummy Document Display

Yusuke Takahashi,  Ryota Kikkawa,  Katsunari Yoshioka,  Tsutomu Matsumoto,  

[Date]2015/2/24
[Paper #]ICSS2014-89
Visualization of Various DoS Attacks Observed by Malware Sandbox Analysis

Hiroshi MORI,  Katsunari YOSHIOKA,  Tsutomu MATSUMOTO,  

[Date]2015/2/24
[Paper #]ICSS2014-90
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking

Makoto SATO,  Masami MOHRI,  Hiroshi DOI,  Yoshiaki SHIRAISHI,  

[Date]2015/2/24
[Paper #]ICSS2014-91
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function

Koji TOMIDA,  Hiroshi DOI,  Masami MOHRI,  Yoshiaki SHIRAISHI,  

[Date]2015/2/24
[Paper #]ICSS2014-92
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data

Takeru NARUSE,  Masami MOHRI,  Yoshiaki SHIRAISHI,  

[Date]2015/2/24
[Paper #]ICSS2014-93
Understanding Android apps that are similar to legitimate ones

Yuta ISHII,  Takuya WATANABE,  Mitsuaki AKIYAMA,  Tatsuya MORI,  

[Date]2015/2/24
[Paper #]ICSS2014-94
A Study on Risk Quantification Techniques for Android Applications with Category Information

Takeshi TAKAHASHI,  Takao MIMURA,  Masata NISHIDA,  Koji NAKAO,  

[Date]2015/2/24
[Paper #]ICSS2014-95
Evaluation on Malware Classification by Combining Traffic Analysis and Fuzzy Hashing of Malware Binary

Shohei HIRUTA,  Yukiko YAMAGUCHI,  Hajime SHIMADA,  Hiroki TAKAKURA,  

[Date]2015/2/24
[Paper #]ICSS2014-96
A message authentication scheme with variable-length MAC

Yumiko MURAKAMI,  Nobuhiro KOBAYASHI,  

[Date]2015/2/24
[Paper #]ICSS2014-97
Flexible Constructions of Hash Chains and Their Key Generation

Shoki NISHIYAMA,  Masakazu SOSHI,  

[Date]2015/2/24
[Paper #]ICSS2014-98
An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation

Kazuomi OISHI,  Naoki YOSHIDA,  Naoki WATANABE,  Jun'ichi SAKAMOTO,  Tsutomu MATSUMOTO,  

[Date]2015/2/24
[Paper #]ICSS2014-99
複写される方へ

,  

[Date]2015/2/24
[Paper #]
<<123>> 21-40hit(43hit)