Engineering Sciences/NOLTA-Information Security(Date:2004/11/02)

Presentation
表紙

,  

[Date]2004/11/2
[Paper #]
目次

,  

[Date]2004/11/2
[Paper #]
Implentation Mechanisms of Scalable Event-Ordering System without Single Point of Attack

Eiichi Horita,  Satoshi Ono,  Hidetaka Ishimoto,  

[Date]2004/11/2
[Paper #]ISEC2004-85,OIS2004-52
Time-stamping systems ensuring long term validity based on event-ordering systems

Hidetaka Ishimoto,  Sathoshi Ono,  Eiichi Horita,  

[Date]2004/11/2
[Paper #]ISEC2004-86,OIS2004-53
A Formal Method for Finding the Lowest Cost Attack on Cryptographic Protocols

Takane UMAYAMA,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2004/11/2
[Paper #]ISEC2004-87,OIS2004-54
Transformation-Free Proxy Cryptosystems with Limited Authorization

Lihua WANG,  Zhenfu GAG,  Eiji OKAMOTO,  Ying MIAO,  Takeshi OKAMOTO,  

[Date]2004/11/2
[Paper #]ISEC2004-88,OIS2004-55
One-Time Key Type Authentication Scheme for P2P Service

Youji FUKUTA,  Takumi HOSOYA,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2004/11/2
[Paper #]ISEC2004-89,OIS2004-56
Access Control by Service Connector with Single Sign-On Function

Youji FUKUTA,  Takehito NINOMIYA,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2004/11/2
[Paper #]ISEC2004-90,OIS2004-57
A Study of Competition and Diffusion of IP Phone Services

Naoki MIZUTANI,  

[Date]2004/11/2
[Paper #]ISEC2004-91,OIS2004-58
Virtual Transmission Monitoring System for Behavior Analysis of Virus

Toshihiko HIROOKA,  Yoshiaki SHIRAISHI,  Masakatu MORII,  Yuji HOSHIZAWA,  Koji NAKAO,  

[Date]2004/11/2
[Paper #]ISEC2004-92,OIS2004-59
ウイルス解析を目的としたメモリ上の不正コード検出システムの構築

Sachihiro ICHIKAWA,  Masaki KAMIZONO,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2004/11/2
[Paper #]ISEC2004-93,OIS2004-60
Design of Damage Prediction System By Event Dependent Model for Illegal Access

Ryoji HASUI,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2004/11/2
[Paper #]ISEC2004-94,OIS2004-61
A Software Vulnerabilty Management System for a Server Farm by Using Digital Certificates

Motomu NISHIKAWA,  Takeshi OKUDA,  Suguru YAMAGUCHl,  

[Date]2004/11/2
[Paper #]ISEC2004-95,OIS2004-62
Internet Accounting System : The Development Using Model Driven Architecture

Daisuke HORINOUE,  Kenji OHMORI,  

[Date]2004/11/2
[Paper #]ISEC2004-96,OIS2004-63
Complexity of the Chabaud-Joux Attack on SHA-0 with Different Message Schedules

Mitsuhiro HATTORN,  Shouichi HIROSE,  Susumu YOSHIDA,  

[Date]2004/11/2
[Paper #]ISEC2004-97,OIS2004-64
複写される方へ

,  

[Date]2004/11/2
[Paper #]
奥付

,  

[Date]2004/11/2
[Paper #]