Communication-Communication Systems(Date:2011/11/11)

Presentation
表紙

,  

[Date]2011/11/11
[Paper #]
目次

,  

[Date]2011/11/11
[Paper #]
On the possibility of detecting zero-day exploits contained in malware

Chiaki JIMBO,  Kousuke MURAKAMI,  Takayoshi FUJII,  Katsunari YOSHIOKA,  Junji SHIKATA,  Tsutomu MTASUMOTO,  

[Date]2011/11/11
[Paper #]ICSS2011-32
Feature Estimation Method for Malwares based on a Histogram of Bytecode

Ryo OKUBO,  Ryoichi ISAWA,  Masakatu MORII,  Daisuke INOUE,  Koji NAKAO,  

[Date]2011/11/11
[Paper #]ICSS2011-33
Feature Estimation Scheme for Self Modifying Malwares Using Parts of Their Own Codes

Noriaki NAKAMURA,  Ryoichi ISAWA,  Masakatu MORII,  Daisuke INOUE,  Koji NAKAO,  

[Date]2011/11/11
[Paper #]ICSS2011-34
A New Distributed Storage System Ensuring Security and Reliability

Tadashi MINOWA,  

[Date]2011/11/11
[Paper #]ICSS2011-35
Multitenant Cloud Computing : Security Challenges and Approaches

Takeshi TAKAHASHI,  Gregory BLANC,  Youki KADOBAYASHI,  Doudou FALL,  Hiroaki HAZEYAMA,  Shin'ichi MATSUO,  

[Date]2011/11/11
[Paper #]ICSS2011-36
One-Time Password Scheme against Theft Attacks for Multi Server Environment

Yuto KUNISADA,  Ryoichi ISAWA,  Masakatu MORII,  

[Date]2011/11/11
[Paper #]ICSS2011-37
Soko Soko Security : Providing Appropriate Security in Required Level

Akira KANAOKA,  

[Date]2011/11/11
[Paper #]ICSS2011-38
複写される方へ

,  

[Date]2011/11/11
[Paper #]
Notice for photocopying

,  

[Date]2011/11/11
[Paper #]
奥付

,  

[Date]2011/11/11
[Paper #]
裏表紙

,  

[Date]2011/11/11
[Paper #]