Engineering Sciences/NOLTA-Information Theory(Date:2005/07/14)

Presentation
表紙

,  

[Date]2005/7/14
[Paper #]
目次

,  

[Date]2005/7/14
[Paper #]
A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot

Maki KATAOKA,  Yumiko ISHIGE,  Nobutaka MANTANI,  Humiharu OHASHI,  

[Date]2005/7/14
[Paper #]ISEC2005-9,SITE2005-7
A Study on Implementation of the Worm Prevention System Following the Infection Process

Shusuke MAEDA,  Tatsuya BABA,  Hisamichi OHTANI,  Masataka KADO,  Tsutomu INADA,  

[Date]2005/7/14
[Paper #]ISEC2005-10,SITE2005-8
A Study on a Method for Malware Quarantine in a Multi-OS Environment

Tatsuya BABA,  Hiroshi FUJIMOTO,  Masataka KADO,  Tsutomu INADA,  

[Date]2005/7/14
[Paper #]ISEC2005-11,SITE2005-9
A Consideration of Spyware Detection using Traffic Analysis

Akira YONAHARA,  Hisamichi OHTANI,  Tatsuya BABA,  Tsutomu INADA,  

[Date]2005/7/14
[Paper #]ISEC2005-12,SITE2005-10
Evaluation of the quarantine system using "in the wild" viruses

Osamu Tanaka,  Katuya Uchida,  

[Date]2005/7/14
[Paper #]ISEC2005-13,SITE2005-11
A Note of Intrusion Detection using Alteration of Data

Fumiaki NAGANO,  Kohei TATARA,  Toshihiro TABATA,  Kouichi SAKURAI,  

[Date]2005/7/14
[Paper #]ISEC2005-14,SITE2005-12
Comparison of Error Probabilities of The Miller-Rabin Test by Experimental Measurement Value and Theoretical Upper Bound

Toshiya NAKAJIMA,  

[Date]2005/7/14
[Paper #]ISEC2005-15,SITE2005-13
On Security of Superelliptic Curves and C_ Curves Based Cryptosystems against GHS Weil Descent Attack

Tsutomu IIJIMA,  Mahoro SHIMURA,  Jinhui CHAO,  Shigeo TSUJII,  

[Date]2005/7/14
[Paper #]ISEC2005-16,SITE2005-14
Performance of Prime Order Elliptic Curve Generation based on y-twist

Mayumi OBARA,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2005/7/14
[Paper #]ISEC2005-17,SITE2005-15
Defeating Simple Power Analysis on Koblitz Curves

Katsuyuki OKEYA,  Tsuyoshi TAKAGI,  Camille VUILLAUME,  

[Date]2005/7/14
[Paper #]ISEC2005-18,SITE2005-16
Development of power analysis evaluation platform for 32 bit processor

Koichi Fujisaki,  Hideo Shimizu,  Atsushi Shimbo,  

[Date]2005/7/14
[Paper #]ISEC2005-19,SITE2005-17
Study of the Incident Tendency Detection Method on Frequency Analysis

Hirofumi Nakakoji,  Masato Terada,  Kenichi Sakamoto,  

[Date]2005/7/14
[Paper #]ISEC2005-20,SITE2005-18
A Study on Host Profiling for Incident Analysis

Kazuya Ohkouchi,  Kenji Rikitake,  Koji Nakao,  

[Date]2005/7/14
[Paper #]ISEC2005-21,SITE2005-19
A Simulation-based UDP Traffic Analysis of DNSSEC

Kenji RIKITAKE,  Koji NAKAO,  Shinji SHIMOJO,  Hiroki NOGAWA,  

[Date]2005/7/14
[Paper #]ISEC2005-22,SITE2005-20
Research of Epidemiologic Approach for Anti Computer Viruses-2 : Application on a model of anti mass-mail viruses

Satoshi SEKI,  Ryoichi SASAKI,  Mitsuru IWAMURA,  Hiroshi MOTOSUGI,  

[Date]2005/7/14
[Paper #]ISEC2005-23,SITE2005-21
Extension and Evaluation of Check Function for Improper Sending of Personal Information in Encrypted Mail System

Kenji YASU,  Yasuhiko AKAHANE,  Masami OZAKI,  Koji SEMOTO,  Ryoichi SASAKI,  

[Date]2005/7/14
[Paper #]ISEC2005-24,SITE2005-22
Guardian watch support system for the children's Web access

Tatsumi UEDA,  Yoshiaki TAKAI,  

[Date]2005/7/14
[Paper #]ISEC2005-25,SITE2005-23
Sharing and Circulation of Nonwritten Cultural Materials in COE

Keiko KINOSHITA,  Yasuhiro INAZUMI,  Hirotsugu KINOSHITA,  Tetsuya MORIZUMI,  

[Date]2005/7/14
[Paper #]ISEC2005-26,SITE2005-24
12>> 1-20hit(39hit)