Information and Systems-Information and Communication System Security(Date:2009/06/11)

Presentation
表紙

,  

[Date]2009/6/11
[Paper #]
目次

,  

[Date]2009/6/11
[Paper #]
A study on detection of botnet based on probabilistic dependencies

Shintarou MURAKAMI,  Hiroki HAMASAKI,  Masanori KAWAKITA,  Jnu'ichi TAKEUCHI,  Katsunari YOSHIOKA,  Daisuke INOUE,  Masashi ETO,  Koji NAKAO,  

[Date]2009/6/11
[Paper #]IA2009-1,ICSS2009-9
Detection of Shellcodes in Remote Exploits Detection Method based on Structural Analysis

Hiroki NOGAWA,  Fuminori ADACHI,  Yasumitsu TSUJINO,  Seiji MORIYA,  Kazunori SAITO,  

[Date]2009/6/11
[Paper #]IA2009-2,ICSS2009-10
A proposal for autonomous crawling client honeypot

Yuji HOSHIZAWA,  Kazuo KAWAMORITA,  Tsuyoshi TACHIKAWA,  Masaki KAMIZONO,  

[Date]2009/6/11
[Paper #]IA2009-3,ICSS2009-11
A Study on effective usage of the URL Blacklists

Takahiro MATSUKI,  Yuu ARAI,  

[Date]2009/6/11
[Paper #]IA2009-4,ICSS2009-12
The Modeling of An Anonymity Method for The Widely Distributed Incidents Analysis System

Ryoichi ISAWA,  Kota KONDO,  Masakatu MORII,  Sadako TAKASUKA,  Koji NAKAO,  

[Date]2009/6/11
[Paper #]IA2009-5,ICSS2009-13
Proposal and Consideration for An Anonymity Method for The Widely Ditributed Incidents Analysis System

Kota KONDO,  Ryoichi ISAWA,  Masakatu MORII,  Sadako TAKASUKA,  Koji NAKAO,  

[Date]2009/6/11
[Paper #]IA2009-6,ICSS2009-14
Notes on A Secure One-Time Password Method against the Stolen-Verifier Attack

Satoshi HASHIMOTO,  Ryoichi ISAWA,  Tatsuya TAKEHISA,  Masakatu MORII,  Koji NAKAO,  

[Date]2009/6/11
[Paper #]IA2009-7,ICSS2009-15
Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes

Tatsuya Takehisa,  Ryoichi Isawa,  Masanori Hirotomo,  Masakatu Morii,  Koji Nakao,  

[Date]2009/6/11
[Paper #]IA2009-8,ICSS2009-16
Bleeding edge Security Technology for supporting following generation of network

Masakazu TAKAHASHI,  

[Date]2009/6/11
[Paper #]IA2009-9,ICSS2009-17
On network security technologies that redefine next generation networks

Youki KADOBAYASHI,  

[Date]2009/6/11
[Paper #]IA2009-10,ICSS2009-18
A Reduction Method of Advertising Messages on QoS Routing Protocols for Excluding Crankbacks

Kenji FUJIKAWA,  Masataka OHTA,  

[Date]2009/6/11
[Paper #]IA2009-11,ICSS2009-19
The simple browser based application platform : Application of the single GUI window system which executes one or more GUI window programs

Takatoshi YANASE,  

[Date]2009/6/11
[Paper #]IA2009-12,ICSS2009-20
Design and Verification of Dual Redundant Communication Protocols using Model Checking

Satoshi IKEDA,  Masahiro JIBIKI,  Yasushi KUNO,  Taketoshi NISHIMORI,  

[Date]2009/6/11
[Paper #]IA2009-13,ICSS2009-21
Validation of packet origin using public route information

Meidai SAITO,  Keisuke ISHIBASHI,  

[Date]2009/6/11
[Paper #]IA2009-14,ICSS2009-22
Evaluation of Traffic Engineering Mechanism for Peer-to-Peer Appications

Satoshi KAMEI,  Takeshi INOUE,  Tomohiro NISHITANI,  

[Date]2009/6/11
[Paper #]IA2009-15,ICSS2009-23
Reducing Network Power Consumption Using Dynamic Link Metric Method and Power Off Links

JIA Zhou,  SHAN Gao,  AYA Tsurusaki,  NAOKI Yamanaka,  

[Date]2009/6/11
[Paper #]IA2009-16,ICSS2009-24
Key escrow method of personal decryptographic key by using elliptic curve calculation

Michiko HARAYAMA,  Kouji SAKAI,  Hiroyuki GOTO,  

[Date]2009/6/11
[Paper #]IA2009-17,ICSS2009-25
Design and Evaluation of NGN/IPv6 Security Test System

Kenji RIKITAKE,  Masashi ETO,  Mio SUZUKI,  Daisuke INOUE,  Koji NAKAO,  Satoshi KOBAYASHI,  Suminobu AKIBA,  

[Date]2009/6/11
[Paper #]IA2009-18,ICSS2009-26
12>> 1-20hit(25hit)