Communication-Communication Systems(Date:2014/06/26)

Presentation
表紙

,  

[Date]2014/6/26
[Paper #]
目次

,  

[Date]2014/6/26
[Paper #]
Consideration on Side-Channel Information Toward Authentication

Arisa MATSUBARA,  Yang LI,  Yu-ichi HAYASHI,  Kazuo SAKIYAMA,  

[Date]2014/6/26
[Paper #]ISEC2014-10,SITE2014-5,ICSS2014-14,EMM2014-10
A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals

Katsuyuki UMEZAWA,  Satoru TEZUKA,  

[Date]2014/6/26
[Paper #]ISEC2014-11,SITE2014-6,ICSS2014-15,EMM2014-11
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack

Daisuke MORIYAMA,  

[Date]2014/6/26
[Paper #]ISEC2014-12,SITE2014-7,ICSS2014-16,EMM2014-12
Privacy Preserving Conditional Disclosure II

Kohtaro TADAKI,  Shigeo TSUJII,  

[Date]2014/6/26
[Paper #]ISEC2014-13,SITE2014-8,ICSS2014-17,EMM2014-13
Consideration of a Mobile Payment System using Endorsement in MANETs for a Disaster Area

BABATUNDE OJETUNDE,  NAOKI SHIBATA,  JUNTAO GAO,  MINORU ITO,  

[Date]2014/6/26
[Paper #]
Proposal of a method to detect malicious document file based on ROP attack code detection

YASUYUKI TANAKA,  ATSUHIRO GOTO,  

[Date]2014/6/26
[Paper #]
Implementation of Simple StackTrace and its Application to Permission Control System in Android

TAKUHO TAKASE,  SHOTA HIOKI,  SHOICHI SAITO,  EIJI TAKIMOTO,  KOICHI MOURI,  HIROSHI MATSUO,  

[Date]2014/6/26
[Paper #]
Proposal of Autonomous and Distributed Authentication for VANET

HIROAKI HIURA,  SHOMA KITAYAMA,  MASAKAZU SOSHI,  MITSURU OHBA,  

[Date]2014/6/26
[Paper #]
Dynamic Security Control Architecture on Hybrid-cloud

Yuuki KAJIURA,  Atsushi KANAI,  Shigeaki TANIMOTO,  Hiroyuki SATO,  

[Date]2014/6/26
[Paper #]ISEC2014-14,SITE2014-9,ICSS2014-18,EMM2014-14
Deceptive Defense Architecture toward Protection against APT

Takahiro KAKUMARU,  Shigeyoshi SHIMA,  Masafumi WATANABE,  Katsunari YOSHIOKA,  

[Date]2014/6/26
[Paper #]ISEC2014-15,SITE2014-10,ICSS2014-19,EMM2014-15
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation

Shun YANASE,  Hajime SHIMADA,  Yukiko YAMAGUCHI,  Hiroki TAKAKURA,  

[Date]2014/6/26
[Paper #]ISEC2014-16,SITE2014-11,ICSS2014-20,EMM2014-16
Experimental Platform for CAN

Kazuomi OISHI,  

[Date]2014/6/26
[Paper #]ISEC2014-17,SITE2014-12,ICSS2014-21,EMM2014-17
On a PRNG based on non-commutative algebra and its applications

Satoshi IRIYAMA,  Yoshiharu TANAKA,  Toshihide HARA,  Masanori OHYA,  

[Date]2014/6/26
[Paper #]ISEC2014-18,SITE2014-13,ICSS2014-22,EMM2014-18
Security of RSA with Many Decryption Exponents

Atsushi TAKAYASU,  Noboru KUNIHIRO,  

[Date]2014/6/26
[Paper #]ISEC2014-19,SITE2014-14,ICSS2014-23,EMM2014-19
A New Precomputation Method with Perfect Conjugate-Addition Sequence

Ryota TAKAHASHI,  Atsuko MIYAJI,  

[Date]2014/6/26
[Paper #]ISEC2014-20,SITE2014-15,ICSS2014-24,EMM2014-20
A detection method of malware infections based on "graylists"

Tomo KAKUTA,  TOMOYA OHTORI,  YASUHIRO FUJII,  NOBUHIKO TANIGUCHI,  TAKEYASU KISHIRO,  

[Date]2014/6/26
[Paper #]
A Method to Visualize the Result of Malware Dynamic Analysis

YUJI HOSHIZAWA,  MASAKI KAMIZONO,  

[Date]2014/6/26
[Paper #]
Method for Network Switching to Support Investigation of Malware with SDN

ICHIRO KURIMA,  SATOSHI KAI,  TAKEYASU KISHIRO,  YOSHIAKI ISOBE,  

[Date]2014/6/26
[Paper #]
123>> 1-20hit(57hit)