Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2010/06/24)

Presentation
表紙

,  

[Date]2010/6/24
[Paper #]
目次

,  

[Date]2010/6/24
[Paper #]
Correlation Problems between Security Protection and Intellectual Property Protection of Information

Haruo KODAMA,  

[Date]2010/6/24
[Paper #]ISEC2010-10,SITE2010-6,ICSS2010-16
A Study on Log Analysis Based on Tendency of IDS Alert Events

Tsuyoshi TODA,  Hiroyuki INABA,  

[Date]2010/6/24
[Paper #]ISEC2010-11,SITE2010-7,ICSS2010-17
Limit of "Control Theory" of Privacy : Presentation of Identity and Context Dependency of Privacy

Takushi OTANI,  

[Date]2010/6/24
[Paper #]ISEC2010-12,SITE2010-8,ICSS2010-18
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher

Yasutaka IGARASHI,  Toshinobu KANEKO,  

[Date]2010/6/24
[Paper #]ISEC2010-13,SITE2010-9,ICSS2010-19
Protection Mode Against Cache Attack (HYRAL)

Kouzou Hirata,  

[Date]2010/6/24
[Paper #]ISEC2010-14,SITE2010-10,ICSS2010-20
An Optimization of AES Decryption Using the Bitslice Technique

Fumihiko SANO,  

[Date]2010/6/24
[Paper #]ISEC2010-15,SITE2010-11,ICSS2010-21
An Artifact-Metric System which Extracts Values Unique to Individual Paper

Yasuhiro FUKUDA,  Tsutomu MATSUMOTO,  

[Date]2010/6/24
[Paper #]ISEC2010-16,SITE2010-12,ICSS2010-22
Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol

Katsuyuki UMEZAWA,  Takashi TASHIRO,  Satoru TEZUKA,  

[Date]2010/6/24
[Paper #]ISEC2010-17,SITE2010-13,ICSS2010-23
Evaluating Detected Hosts of Malware Based on Search Engine Results

Kazufumi AOKI,  Mitsuaki AKIYAMA,  Makoto IWAMURA,  Mitsutaka ITOH,  

[Date]2010/6/24
[Paper #]ISEC2010-18,SITE2010-14,ICSS2010-24
Image Authentication with Access Control Based on Reversible Data Hiding

Kenta WATANABE,  Masaaki FUJIYOSHI,  Hitoshi KIYA,  

[Date]2010/6/24
[Paper #]ISEC2010-19,SITE2010-15,ICSS2010-25
Building Ontology of Cybersecurity Operational Information

Takeshi TAKAHASHI,  Youki KADOBAYASHI,  Hiroyuki FUJIWARA,  

[Date]2010/6/24
[Paper #]ISEC2010-20,SITE2010-16,ICSS2010-26
Access policy management architecture for virtual server consolidation systems

Ryuichi OGAWA,  Masayuki NAKAE,  Yoshiharu MAENO,  Yoichiro MORITA,  Fumio MACHIDA,  Kumiko TADANO,  

[Date]2010/6/24
[Paper #]ISEC2010-21,SITE2010-17,ICSS2010-27
On the use and misuse of E-mail sender authentication mechanisms

Tatsuya MORI,  

[Date]2010/6/24
[Paper #]ISEC2010-22,SITE2010-18,ICSS2010-28
Proposal on MPKC Signature Scheme with Check Equations

Shigeo TSUJII,  Masahito GOTAISHI,  

[Date]2010/6/24
[Paper #]ISEC2010-23,SITE2010-19,ICSS2010-29
Improvement of Rainbow MPKC Signature system

Masahito GOTAISHI,  

[Date]2010/6/24
[Paper #]ISEC2010-24,SITE2010-20,ICSS2010-30
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions

Yutaka KAWAI,  Yuichi KOMANO,  Kazuo OHTA,  

[Date]2010/6/24
[Paper #]ISEC2010-25,SITE2010-21,ICSS2010-31
On the Standardization of Information Security : ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010

Atsuko MIYAJI,  Takeshi CHIKAZAWA,  Toshio TATSUTA,  Kenji OHKUMA,  Hajime WATANABE,  

[Date]2010/6/24
[Paper #]ISEC2010-26,SITE2010-22,ICSS2010-32
Implementation of Key Generation Center for Identity-based Encryption

Akira KANAOKA,  Takuya HOURI,  Eiji OKAMOTO,  

[Date]2010/6/24
[Paper #]ISEC2010-27,SITE2010-23,ICSS2010-33
12>> 1-20hit(33hit)