Engineering Sciences/NOLTA-Information Security(Date:2014/06/26)

Presentation
Some Properties on Disaster Prevention Broadcasting Based on Data Hiding Technique

Tetsuya KOJIMA,  Akihiro OIZUMI,  

[Date]2014/6/26
[Paper #]ISEC2014-36,SITE2014-31,ICSS2014-40,EMM2014-36
Information Hiding Technique to Protect Copyright of Digital Data for 3-D Printing

Piyarat Silapasuphakornwong,  Masahiro Suzuki,  Hiroshi Unno,  Kazutake Uehira,  Youichi Takashima,  

[Date]2014/6/26
[Paper #]ISEC2014-37,SITE2014-32,ICSS2014-41,EMM2014-37
Integration for Web reservation data of Hotel

Yu ICHIFUJI,  Noboru SONEHARA,  

[Date]2014/6/26
[Paper #]ISEC2014-38,SITE2014-33,ICSS2014-42,EMM2014-38
Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2)

Hiroyuki INABA,  Takuto TAMAI,  

[Date]2014/6/26
[Paper #]ISEC2014-39,SITE2014-34,ICSS2014-43,EMM2014-39
Proposal on Fast Searchable Encryption Scheme Using Bloom Filter

Shunsuke KIMURA,  Hiroyuki INABA,  

[Date]2014/6/26
[Paper #]ISEC2014-40,SITE2014-35,ICSS2014-44,EMM2014-40
Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption

Yumi SAKEMI,  Masahiko TAKENAKA,  Naoya TORII,  Masaya YASUDA,  

[Date]2014/6/26
[Paper #]ISEC2014-41,SITE2014-36,ICSS2014-45,EMM2014-41
Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption

Yumi SAKEMI,  Masahiko TAKENAKA,  Naoya TORII,  Masaya YASUDA,  

[Date]2014/6/26
[Paper #]ISEC2014-42,SITE2014-37,ICSS2014-46,EMM2014-42
Evaluating Resistance of Android Applications to Automated Repackaging

Fumihiro Kanei,  Yuki Shoda,  Katsunari Yoshioka,  Tsutomu Matsumoto,  

[Date]2014/6/26
[Paper #]ISEC2014-43,SITE2014-38,ICSS2014-47,EMM2014-43
A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis

Mitsuhiro HATADA,  Takanori INAZUMI,  Jun ARIKAWA,  Yasuyuki TANAKA,  

[Date]2014/6/26
[Paper #]ISEC2014-44,SITE2014-39,ICSS2014-48,EMM2014-44
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes

Takashi SATOH,  Daichi MISUMI,  Masaki SHIMOIZUMI,  Masakazu SOSHI,  

[Date]2014/6/26
[Paper #]ISEC2014-45,SITE2014-40,ICSS2014-49,EMM2014-45
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell

Masaki KAMIZONO,  Yuji HOSHIZAWA,  Takahiro KASAMA,  Masashi ETO,  Daisuke INOUE,  Katsunari YOSHIOKA,  Tsutomu MATSUMOTO,  

[Date]2014/6/26
[Paper #]ISEC2014-46,SITE2014-41,ICSS2014-50,EMM2014-46
A user mode implementation of filtering rule management plane on virtualized networking environment

RUO ANDO,  

[Date]2014/6/26
[Paper #]
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attacks, and its Implementation and Evaluation using OpenFlow

HIROSHI KOBAYASHI,  HIROFUMI YAMAKI,  YUKI SUEHIRO,  YOICHIRO UENO,  KAORU SANO,  RYOICHI SASAKI,  

[Date]2014/6/26
[Paper #]
複写される方へ

,  

[Date]2014/6/26
[Paper #]
Notice for Photocopying

,  

[Date]2014/6/26
[Paper #]
奥付

,  

[Date]2014/6/26
[Paper #]
裏表紙

,  

[Date]2014/6/26
[Paper #]
<<123 41-57hit(57hit)