Communication-Internet Architecture(Date:2013/06/13)

Presentation
表紙

,  

[Date]2013/6/13
[Paper #]
目次

,  

[Date]2013/6/13
[Paper #]
CTFで変える情報セキュリティの現場 : CTF越しに見た日本と世界のセキュリティ(招待講演,インターネットセキュリティ,一般)

,  

[Date]2013/6/13
[Paper #]IA2013-1,ICSS2013-1
Threats posed by High-Perfomance Information Devices Designed for Home

Hiroki TAKAKURA,  

[Date]2013/6/13
[Paper #]IA2013-2,ICSS2013-2
Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems

Kotaro KISHIBE,  Ryoichi ISAWA,  Masakatu MORII,  

[Date]2013/6/13
[Paper #]IA2013-3,ICSS2013-3
Vulnerability of RC4 in SSL/TLS

Yuhei WATANABE,  Takanori ISOBE,  Toshihiro OHIGASHI,  Masakatu MORII,  

[Date]2013/6/13
[Paper #]IA2013-4,ICSS2013-4
Improvement of Communication Quality during Disasters by using OpenFlow : Proposal Method of Disaster ID based on Location Information

Kohichi Ogawa,  Noriaki Yoshiura,  

[Date]2013/6/13
[Paper #]IA2013-5,ICSS2013-5
PAT : Privacy aware transformation method and applications for location services

Ikuo Nakagawa,  Yoshifumi Hashimoto,  Masahiro Hiji,  Hideaki Imaizumi,  Hiroshi Esaki,  

[Date]2013/6/13
[Paper #]IA2013-6,ICSS2013-6
An experimental evaluation of long distance live migration using the wide-area distributed storage

Yoshiaki KITAGUCHI,  Tohru KONDO,  Hiroaki KASHIWAZAKI,  Ikuo NAKAGAWA,  Shinji SHIMOJO,  

[Date]2013/6/13
[Paper #]IA2013-7,ICSS2013-7
Operation and Issues of E-Mail System in Okayama University

Nariyoshi YAMAI,  Kiyohiko OKAYAMA,  Takaoki FUJIWARA,  Yoshihiro OHSUMI,  

[Date]2013/6/13
[Paper #]IA2013-8,ICSS2013-8
Experiment of Sensor Network for Snowfall Observation in Nagaoka City

Seiya KOBAYASHI,  Hiroshi YAMAMOTO,  Tatsuhito HOSHI,  Yuichi INAGAWA,  Koichi YOSHITAKE,  Katsuyuki YAMAZAKI,  

[Date]2013/6/13
[Paper #]IA2013-9,ICSS2013-9
Study on Snowblower Support Application utilizing Android Terminals

Hiroshi YAMAMOTO,  Yusuke KUBOTA,  Satoru NISHIMAKI,  Takeshi KYUZO,  Katsuyuki YAMAZAKI,  

[Date]2013/6/13
[Paper #]IA2013-10,ICSS2013-10
An Evaluation of Load Distribution Method on Multi-Source P2P Sensor Data Stream Delivery System

Tomoya KAWAKAMI,  Yoshimasa ISHI,  Tomoki YOSHIHISA,  Yuuichi TERANISHI,  

[Date]2013/6/13
[Paper #]IA2013-11,ICSS2013-11
Development of Packet Forwarding Control for Dynamic Malware Analysis Using Pseudo Internet

Soshi HIRONO,  Kenji OHIRA,  Yukiko YAMAGUCHI,  Hirofumi YAMAKI,  Hiroki TAKAKURA,  

[Date]2013/6/13
[Paper #]IA2013-12,ICSS2013-12
Generic Unpacking Method Using Data Execution Prevention

Ryoichi ISAWA,  Masaki KAMIZONO,  Daisuke INOUE,  

[Date]2013/6/13
[Paper #]IA2013-13,ICSS2013-13
Network Observation and Analysis Report on nicter : Close Encountters of Network Incident Sign

Junji NAKAZATO,  Junpei SHIMAMURA,  Masashi ETO,  Daisuke INOUE,  Koji NAKAO,  

[Date]2013/6/13
[Paper #]IA2013-14,ICSS2013-14
NONSTOP : Secure Remote Analysis Platform for Cybersecurity Information

Tatsuya TAKEHISA,  Daisuke INOUE,  Masashi ETO,  Katsunari YOSHIOKA,  Takahiro KASAMA,  Junji NAKAZATO,  Koji NAKAO,  

[Date]2013/6/13
[Paper #]IA2013-15,ICSS2013-15
複写される方へ

,  

[Date]2013/6/13
[Paper #]
Notice for photocopying

,  

[Date]2013/6/13
[Paper #]
奥付

,  

[Date]2013/6/13
[Paper #]
12>> 1-20hit(21hit)