Communication-Information and Communication Management(Date:2014/05/15)

Presentation
表紙

,  

[Date]2014/5/15
[Paper #]
目次

,  

[Date]2014/5/15
[Paper #]
Updating method of distributed data in secret sharing system

HIDEYUKI FURUTA,  YUJI SUGA,  KEIICHI IWAMURA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.1,Vol.2014-IOT-25 No.1
Multivalue-converting of 2 value series in Secret Sharing Scheme using XOR, and Secure Function Evaluation which uses it

KAZUKO TAKAHASHI,  YUJI SUGA,  KEIICHI IWAMURA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.2,Vol.2014-IOT-25 No.2
RSA暗号の公開鍵への所有者情報埋め込み手法とその著作権管理システムへの応用(サービス管理,運用管理技術,セキュリティ管理及び一般)

,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.3,Vol.2014-IOT-25 No.3
Study of security request / requirement acquisition technique of Web application renewal time

MUTSUO NOGUCHI,  TAKAO OKUBO,  HIDEHIKO TANAKA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.4,Vol.2014-IOT-25 No.4
Visualization of query log of authoritative DNS server for attack analysis and detection

KENRYU WATANABE,  KAZUNO MATSUI,  MINORU IKEBE,  KAZUYUKI YOSHIDA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.5,Vol.2014-IOT-25 No.5
Detection and Blocking of a host behind NAT in the User Authentication Network

MITSUHIRO SUENAGA,  HISAHARU TANAKA,  MAKOTO OTANI,  YOSHIAKI HORI,  YASUHISA OKAZAKI,  KENZI WATANABE,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.6,Vol.2014-IOT-25 No.6
GPUを用いた行列演算ソフトウェアの開発(サービス管理,運用管理技術,セキュリティ管理及び一般)

,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.7,Vol.2014-IOT-25 No.7
Proposal of Evaluation Method for Wireless Network Condition using Raspberry Pi

YOSHIAKI KITAGUCHI,  TOMOHIRO ISHIHARA,  TAKETO TAKASHIMA,  MASAKI TAGAWA,  SHINTARO TANAKA,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.8,Vol.2014-IOT-25 No.8
Cloud Computing Trends and Operations management

Masayuki Hayashi,  

[Date]2014/5/15
[Paper #]ICM2014-1
A report on TM Forum Action Week Madrid 2014(Special Talk)

Shingo HORIUCHI,  

[Date]2014/5/15
[Paper #]ICM2014-2
A Proposal of Privacy Protection by Separation Package of Android Application

SHINYA KOBAYASHI,  TOMIAKI SUZUKI,  JUNYA KANI,  HIDEAKI KAWABATA,  KEISUKE TAKEMORI,  MASAKATSU NISHIGAKI,  

[Date]2014/5/15
[Paper #]VoL2014-CSEC-65 No.11,Vol.2014-IOT-25 No.11
A Proposal on Method to Visualizing Web Browsing History for Digital Forensics

SHINICHI MATSUMOTO,  YUUYA ONITSUKA,  JUNPEI KAWAMOTO,  KOUICHI SAKURAI,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.12,Vol.2014-IOT-25 No.12
Proposal for Shellcode Extraction from Malicious Document File

KAZUKI IWAMOTO,  MASAKI KAMIZONO,  Yu TSUDA,  TAKASHI TOMINE,  DAISUKE INOUE,  KOJI NAKAO,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.13,Vol.2014-IOT-25 No.13
ネットあんしんセンターの取組と情報モラル普及啓発について(サービス管理,運用管理技術,セキュリティ管理及び一般)

,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.14,Vol.2014-IOT-25 No.14
Backstage of International Workshop ADMNET

Nariyoshi YAMAI,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.15,Vol.2014-IOT-25 No.15
Observing Distributed Reflection Denial-of-Service Attacks by Several Kinds of Honeypots

TAKUYA TSUTSUMI,  YOSHIAKI NONOGAKI,  RUI TANABE,  DAISUKE MAKITA,  KATSUNARI YOSHIOKA,  TSUTOMU MATSUMOTO,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.16,Vol.2014-IOT-25 No.16
Analysis of SSH access to IP addresses which not assigned in University of Tsukuba using a honeypod

,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.17,Vol.2014-IOT-25 No.17
Implementation of an Environment for Reproducing Targeted Attacks

Yu TSUDA,  MASAKI KAMIZONO,  TAKASHI TOMINE,  SHINGO YASUDA,  RYOSUKE MIURA,  TOSHIYUKI MIYACHI,  MASASHI ETO,  DAISUKE INOUE,  KOJI NAKAO,  

[Date]2014/5/15
[Paper #]Vol.2014-CSEC-65 No.18,Vol.2014-IOT-25 No.18
12>> 1-20hit(38hit)