Engineering Sciences/NOLTA-Information Security(Date:2008/07/17)

Presentation
表紙

,  

[Date]2008/7/17
[Paper #]
目次

,  

[Date]2008/7/17
[Paper #]
Detection of Unknown Computer Virus Variants Based on Computer Behavior

Haruka MIMORI,  Koki ABE,  

[Date]2008/7/17
[Paper #]ISEC2008-35
Improving Resistance to DoS using Attack History in Signature-based Intrusion Detection Systems

Ryota MIYAZAWA,  Koki ABE,  

[Date]2008/7/17
[Paper #]ISEC2008-36
A Proposal of Intrusion Detection using Third-parties Support

Masakazu Fujii,  Kenichi Takahashi,  Yoshiaki Hori,  Kouichi Sakurai,  

[Date]2008/7/17
[Paper #]ISEC2008-37
Examination of the issues in designing of electronic signature-documentation system

Miyuki TAKAO,  Koichiro HAYASHI,  

[Date]2008/7/17
[Paper #]ISEC2008-38
Clone Resistance of Paper Artifact-Metrics with Segmented Matching

Yoichi KOBAYASHI,  Sho SAKAKURA,  Mitsutoshi TAIRA,  Manabu YAMAKOSHI,  Tsutomu MATSUMOTO,  

[Date]2008/7/17
[Paper #]ISEC2008-39
Architecture Optimization of a Group Signature Circuit

Sumio MORIOKA,  Toshinori ARAKI,  Toshiyuki ISSHIKI,  Satoshi OBANA,  Kazue SAKO,  Isamu TERANISHI,  

[Date]2008/7/17
[Paper #]ISEC2008-40
The Lattice Model of the Generalized Confidentiality Policy

Taketoshi SAKURABA,  Kouichi SAKURAI,  

[Date]2008/7/17
[Paper #]ISEC2008-41
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases

Masanori SHIMURA,  Tsukasa ENDO,  Kunihiko MIYAZAKI,  Hiroshi YOSHIURA,  

[Date]2008/7/17
[Paper #]ISEC2008-42
Proposal of Anonymos Routing Technique with DHT

Masaki KONDO,  Shoich SAITO,  Hiroshi MATSUO,  

[Date]2008/7/17
[Paper #]ISEC2008-43
Information Hiding Method utilizing Low Visible Natural Fiber Pattern for Printed Document

Kitahiro KANEDA,  Kenji HIRANO,  Keiichi IWAMURA,  Seiichiro HANGAI,  

[Date]2008/7/17
[Paper #]ISEC2008-44
Implementation of Block Cipher Camellia with a Configurable and Extensible Processor

Kazuyoshi MATSUO,  Koki ABE,  

[Date]2008/7/17
[Paper #]ISEC2008-45
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function

Hidenori KUWAKADO,  Shoichi HIROSE,  

[Date]2008/7/17
[Paper #]ISEC2008-46
Hash Function Using MMO Compression Function and MDP Domain Extension

Shoichi HIROSE,  Hidenori KUWAKADO,  

[Date]2008/7/17
[Paper #]ISEC2008-47
Traitor Tracing from ID based Broadcast Encryption

Ryuichi SAKAI,  

[Date]2008/7/17
[Paper #]ISEC2008-48
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography

Tomoki YOSHIDA,  Hidehiro KATO,  Kenta NEKADO,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2008/7/17
[Paper #]ISEC2008-49
Invalidation of a Mailing-list Address against Spam

Kenichi TAKAHASHI,  Akihiro SAKAI,  Kouichi SAKURAI,  

[Date]2008/7/17
[Paper #]ISEC2008-50
Proposal of a Cue & Response Based User Authentication Using Unclear Image

Takumi YAMAMOTO,  Takeo ISARIDA,  Masakatsu NISHIGAKI,  

[Date]2008/7/17
[Paper #]ISEC2008-51
Self expandable RBAC for distributed systems

Yoshiharu ASAKURA,  Atsushi HONDA,  Naoshi HIGUCHI,  Yoshinori SAIDA,  

[Date]2008/7/17
[Paper #]ISEC2008-52
12>> 1-20hit(33hit)