Engineering Sciences/NOLTA-Information Security(Date:2004/07/14)

Presentation
表紙

,  

[Date]2004/7/14
[Paper #]
目次

,  

[Date]2004/7/14
[Paper #]
正誤表

,  

[Date]2004/7/14
[Paper #]
Modeling and Analysis of Computer Virus Diffusion Process

Masato UCHIDA,  Daisuke SATOH,  

[Date]2004/7/14
[Paper #]ISEC2004-41
An E-mail Virus Diffusion Model

Daisuke SATOH,  Masato UCHIDA,  Keisuke ISHIBASHI,  Makoto KOBAYASHI,  

[Date]2004/7/14
[Paper #]ISEC2004-42
A Proposal of Estimation Method o Magnitude of Worm Infection by using Site Level Profiling

KANBA KOIZUMI,  HIDEKI KOIKE,  MICHIAKI YASUMURA,  

[Date]2004/7/14
[Paper #]ISEC2004-43
Protecting Memories in Multitask OSes : A Cryptographic Memory System for Resource-poor Platforms

YU INAMURA,  TORU EGASHIRA,  ATSUSHI TAKESHITA,  

[Date]2004/7/14
[Paper #]ISEC2004-44
Protecting Memories in Multitask OSes : Tampering Detection

Toru EGASHIRA,  Yu INAMURA,  Atsushi TAKESHITA,  

[Date]2004/7/14
[Paper #]ISEC2004-45
Implementation of Secure Seamless Roaming Method by IPsec/IKE

Masahiko TAKENAKA,  Shingo FUJIMOTO,  Nobutsugu FUJINO,  

[Date]2004/7/14
[Paper #]ISEC2004-46
A Note on Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables

Toshihiro OHIGASHI,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2004/7/14
[Paper #]ISEC2004-47
SSSM : A New Key Stream Generator with Time-variant Tables

Sanzo UGAWA,  Toshihiro OHIGASHI,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2004/7/14
[Paper #]ISEC2004-48
Evaluation of Guess-and-Determine Attacks on Clock Controlled Stream Ciphers

Shinsaku KIYOMOTO,  Toshiaki TANAKA,  Kouichi SAKURAI,  

[Date]2004/7/14
[Paper #]ISEC2004-49
A Study on the DFT Test in NIST SP800-22

Hisashi YAMAMOTO,  Toshinobu KANEKO,  

[Date]2004/7/14
[Paper #]ISEC2004-50
The mechanism of DPRP in Flexible Private Network

Hidekazu SUZUKI,  Akira WATANABE,  

[Date]2004/7/14
[Paper #]ISEC2004-51
The Proposal of Practical Cipher Communication Systems

Shinya MASUDA,  Akira WATANABE,  

[Date]2004/7/14
[Paper #]ISEC2004-52
Researches on Detection Method of Island Hop in Flexible Private Network

Daisuke TAKEO,  Akira WATANABE,  

[Date]2004/7/14
[Paper #]ISEC2004-53
A Privacy Protection Method using Information Entropy : LooM

Miyuki IMADA,  Koichi TAKASUGI,  Masakatsu OHTA,  

[Date]2004/7/14
[Paper #]ISEC2004-54
Development of DPA Evaluation Platform for 8 bit Processor

Koichi FUJISAKI,  Yuki TOMOEDA,  Hideyuki MIYAKE,  Yuichi KOMANO,  Atsushi SHIMBO,  Shinichi KAWAMURA,  

[Date]2004/7/14
[Paper #]ISEC2004-55
Side Channel Attacks on XTR and An Efficient Countermeasure

Dong-Guk Han,  Tetsuya IZU,  Jongin LIM,  Kouichi SAKURAI,  

[Date]2004/7/14
[Paper #]ISEC2004-56
Construction of DPA Leakage Model and Evaluation by Logic Simulation

Minoru SAEKI,  Daisuke SUZUKI,  Tetsuya ICHIKAWA,  

[Date]2004/7/14
[Paper #]ISEC2004-57
12>> 1-20hit(31hit)