Information and Systems-Information and Communication System Security(Date:2014/03/20)

Presentation
表紙

,  

[Date]2014/3/20
[Paper #]
目次

,  

[Date]2014/3/20
[Paper #]
The countermeasures against extraction of AES keys from memory dumping

Michiyoshi SATO,  

[Date]2014/3/20
[Paper #]ICSS2013-62
An Active Attack on RC4 in SSL/TLS

Toshihiro OHIGASHI,  Takanori ISOBE,  Yuhei WATANABE,  Ryo NOJIMA,  Masakatu MORII,  

[Date]2014/3/20
[Paper #]ICSS2013-63
Implementation and Evaluation of a Distributed Secure Multi-party Computation System

Koki HAMADA,  

[Date]2014/3/20
[Paper #]ICSS2013-64
General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature

Hitoshi MIYAZAKI,  Masami MOHRI,  Hiroshi DOI,  Yoshiaki SHIRAISHI,  Akira IWATA,  

[Date]2014/3/20
[Paper #]ICSS2013-65
SSL Client Authentication with TPM : Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate

Akihito SHINODA,  Youji FUKUTA,  Masanori HIROTOMO,  Masami MOHRI,  Yoshiaki SHIRAISHI,  Akira IWATA,  

[Date]2014/3/20
[Paper #]ICSS2013-66
An authenticated key exchange protocol for the network between a server and terminals

Yumiko MURAKAMI,  Yutaka KAWAI,  Nobuhiro KOBAYASHI,  

[Date]2014/3/20
[Paper #]ICSS2013-67
On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers

Yuka ENOMOTO,  Akira KANAOKA,  

[Date]2014/3/20
[Paper #]ICSS2013-68
Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices

Tomoko KAZAMA,  Akira KANAOKA,  

[Date]2014/3/20
[Paper #]ICSS2013-69
Practical Password Management System against password-list-attacks : Proposal of protection of Master Password

Hironao TERUYA,  Wataru NAKAMURA,  Keisuke FURUMOTO,  Takeshi TENGAN,  Katsuyoshi TANABE,  Masakatsu MORII,  

[Date]2014/3/20
[Paper #]ICSS2013-70
Measuring Lifetime of Malicious Website Based on Redirection from Compromised Websites

Mitsuaki AKIYAMA,  Takeshi YAGI,  Takeo HARIU,  

[Date]2014/3/20
[Paper #]ICSS2013-71
An Investigation of Malicious JavaScript Code used in Drive-by Download

Yuta TAKATA,  Mitsuaki AKIYAMA,  Takeo HARIU,  

[Date]2014/3/20
[Paper #]ICSS2013-72
Implementation and Evaluation of Web Phantom : Hybrid Web Honeypot

Takeshi YAGI,  Takeo HARU,  

[Date]2014/3/20
[Paper #]ICSS2013-73
A Voice Support for Visually Impaired Persons Using Multi-level Two-dimensional Code

KEISUKE FURUMOTO,  MASAKATSU MORII,  

[Date]2014/3/20
[Paper #]Vol.2014-SPT-8. No.13
A System for Sharing and Alerting to Fake Profiles among Online Social Networks Users

YU TSUDA,  TAKASHI TOMINE,  DAISUKE INOUE,  

[Date]2014/3/20
[Paper #]Vol.2014-SPT-8. No.14
インターネット利用時の不安発生モデルに対する心理学的知見の適用に関する一考察(通信セキュリティ,セキュリティ心理学とトラスト,一般)

,  

[Date]2014/3/20
[Paper #]Vol.2014-SPT-8. No.15
Survey on Sense of Security and Consent for Information Systems and Services

KAORI OKUMURA,  MASAMI MOHRI,  YOSHIAKI SHIRAISHI,  AKIRA IWATA,  

[Date]2014/3/20
[Paper #]Vol.2014-SPT-8. No.16
Ruleset Optimization for Detecting Malware-Derived Traffic Based on Network-Dependent Log Analysis

Kensuke NAKATA,  Kazunori KAMIYA,  Hiroshi KURAKAMI,  Kazufumi AOKI,  Takeshi YAGI,  

[Date]2014/3/20
[Paper #]ICSS2013-74
Spam Analysis based on Mail Relay Route

Junji NAKAZATO,  Tao BAN,  Jumpei SHIMAMURA,  MASASHI Eto,  Daisuke INOUE,  Koji NAKAO,  

[Date]2014/3/20
[Paper #]ICSS2013-75
123>> 1-20hit(46hit)