Information and Systems-Software Science(Date:2016/03/03)

Presentation
Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention

Yudai Tomaru(iisec),  Masaki Hashimoto(iisec),  Hidehiko Tanaka(iisec),  

[Date]2016-03-04
[Paper #]ICSS2015-61
Selection of authentication methods with game theory in VANET

Hiroaki Hiroaki(Hiroshima City Univ.),  Masakazu Soshi(Hiroshima City Univ.),  

[Date]2016-03-04
[Paper #]ICSS2015-63
A Suspicious Processes Detection Scheme using Process Frequency and Network State

Junji Nakazato(NICT),  Yu Tsuda(NICT),  Eto Masashi(NICT),  Daisuke Inoue(NICT),  Koji Nakao(NICT),  

[Date]2016-03-04
[Paper #]ICSS2015-60
Verification of Division Property and High-Order Differential Characteristic of Lightweight Blockcipher Piccolo

Takuya Kubo(Tokyo Univ of Science),  Yasutaka Igarashi(Tokyo Univ of Science),  Toshinobu Kaneko(Tokyo Univ of Science),  

[Date]2016-03-04
[Paper #]ICSS2015-72
Instantly Self-Verifiable Pre-Shared Key Exchange for Cyber-Physical Systems

Kohei Isobe(Nagoya Inst. of Tech.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2016-03-04
[Paper #]ICSS2015-69
Higher-order differential attack on the round-reduced variants of the block cipher

Yusuke Takahashi(TUS),  Yasutaka Igarashi(TUS),  Toshinobu Kaneko(TUS),  

[Date]2016-03-04
[Paper #]ICSS2015-73
Improvement and implementation of scalar multiplication algorithms with side-channel protection

Keisuke Kito(JAIST),  Atsuko Miyaji(Osaka Univ./JAIST/JST CREST),  

[Date]2016-03-04
[Paper #]ICSS2015-71
A New Key Correlation in the Stream Cipher RC4

Daiki Michihiro(JAIST),  Atsuko Miyaji(Osaka Univ./JAIST/CREST),  

[Date]2016-03-04
[Paper #]ICSS2015-65
Cooperative Secure Network Coding

Sumiyo Ishige(JAIST),  Atsuko Miyaji(JAIST/Osaka Univ./JST CREST),  

[Date]2016-03-04
[Paper #]ICSS2015-70
<<12 21-29hit(29hit)