Communication-Communication Systems(Date:2016/06/06)

Presentation
Using Signal Strength to Improve the Key-Exchange Protocol in Wireless LAN

Nariaki Tamaki(NTT),  Takehiro Kawata(NTT),  

[Date]2016-06-06
[Paper #]IA2016-4,ICSS2016-4
Design of a flow-level monitoring middleware for automatic flow categorization

Xuliang Wang(NAIST),  Pongsakorn U-chupala(NAIST),  Kohei Ichikawa(NAIST),  Yasuhiro Watashiba(NAIST),  Chantana Chantrapornchai(Kasetsart Univ.),  Putchong Uthayopas(Kasetsart Univ.),  Hajimu Iida(NAIST),  

[Date]2016-06-06
[Paper #]IA2016-1,ICSS2016-1
Analysis of recursive queries from the Internet to the authoritative name servers in Oita University

Masashi Nakamura(Oita Univ.),  Minoru Ikebe(Oita Univ.),  Kazuyuki Yoshida(Oita Univ.),  

[Date]2016-06-06
[Paper #]IA2016-2,ICSS2016-2
Method to Locate Cryptographic Functions from Malware

Ryoya Furukawa(Kobe Univ.),  Ryoichi Isawa(NICT),  Masakatu Morii(Kobe Univ.),  Daisuke Inoue(NICT),  Koji Nakao(NICT),  

[Date]2016-06-06
[Paper #]
局所的な同報通信のためのマルチグループ署名方式

Kenta Nomura(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2016-06-06
[Paper #]IA2016-5,ICSS2016-5
A Visualization system of network packets with alert function for suspicious communications

Reido Horigome(Tokyo Univ. of Agriculture and Technology),  Naoya Kitagawa(Tokyo Univ. of Agriculture and Technology),  Nariyoshi Yamai(Tokyo Univ. of Agriculture and Technology),  

[Date]2016-06-06
[Paper #]IA2016-3,ICSS2016-3
Multidimensional Lamport-like one-time password authentication schemes

Yuji Suga(IIJ),  

[Date]2016-06-06
[Paper #]IA2016-6,ICSS2016-6
Development of Network Forensic System Using Filter Drivers

Kouki Oda(Saga Univ.),  Masanori Hirotomo(Saga Univ.),  Youji Fukuta(Kinki Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2016-06-06
[Paper #]
An Experiment to Shut off DDoS Attacks on Testbed Simulating Autonomous Internet Security Infrastructure

Kishi Yuya(Tokyo Denki Univ),  Eguchi Ken(Tokyo Denki Univ),  Ishikawa Tsuyoshi(Tokyo Denki Univ),  Suzuki Ryusei(Tokyo Denki Univ),  Miyaguchi Yuki(Tokyo Denki Univ),  Ohsawa Kazuo(Tokyo Denki Univ),  Yogosawa Mamoru(Tokyo Denki Univ),  Sano Kaoru(Tokyo Denki Univ),  Yamaki Hiroshi(Tokyo Denki Univ),  Ueno Yoichirou(Tokyo Denki Univ),  Sasaki Ryoichi(Tokyo Denki Univ),  Kobayashi Hiroshi(Tokyo Denki Univ),  

[Date]2016-06-07
[Paper #]IA2016-9,ICSS2016-9
Report on the 2016 Network and Distributed System Security Symposium

Shinichi Matsumoto(ISIT),  Daiki Chiba(NTT),  Kuniyasu Suzaki(AIST),  Mirang Park(Kanagawa Institute of Technology),  

[Date]2016-06-07
[Paper #]IA2016-8,ICSS2016-8
Measuring BGP Origin Validation Effect for Mis-Origination

Masahito Ando(Toho Univ.),  Masayuki Okada(JPNIC),  Akira Kanaoka(Toho Univ.),  

[Date]2016-06-07
[Paper #]IA2016-10,ICSS2016-10
Named Data Networking上の仮想ストレージとエリア限定情報配信

Daiki Ito(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  Masakatu Morii(Kobe Univ.),  

[Date]2016-06-07
[Paper #]IA2016-7,ICSS2016-7
マルチ環境でのDrive-by-Download攻撃のリンク構造解析について

Tatsuya Nagai(Kobe Univ.),  Masaki Kamizono(PwC Cyber Services LLCPwC Cyber Services),  Yoshiaki Shiraishi(Kobe Univ.),  Masami Mohri(Gifu Univ.),  Yuji Hoshizawa(PwC Cyber Services LLCPwC Cyber Services),  Masakatu Morii(Kobe Univ.),  

[Date]2016-06-07
[Paper #]IA2016-12,ICSS2016-12
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis

Yuya Nishio(Saga Univ.),  Masanori Hirotomo(Saga Univ.),  Youji Fukuta(Kindai Univ.),  Masami Mohri(Gifu Univ.),  Yoshiaki Shiraishi(Kobe Univ.),  

[Date]2016-06-07
[Paper #]IA2016-11,ICSS2016-11