Information and Systems-Software Science(Date:2010/10/29)

Presentation
表紙

,  

[Date]2010/10/29
[Paper #]
目次

,  

[Date]2010/10/29
[Paper #]
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application

Masakazu SOSHI,  

[Date]2010/10/29
[Paper #]ICSS2010-44
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks

Yuudai MIYOSHI,  Masakazu SOSHI,  

[Date]2010/10/29
[Paper #]ICSS2010-45
Proposal of Time-limited Key Management Scheme Using One-way Functions

Ryoichi ISAWA,  Minoru KURIBAYASHI,  Masakatu MORII,  Sadako TAKASUKA,  

[Date]2010/10/29
[Paper #]ICSS2010-46
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications

Keita EMURA,  Atsuko MIYAJI,  Kazumasa OMOTE,  

[Date]2010/10/29
[Paper #]ICSS2010-47
A Timed-Release Proxy Re-Encryption Scheme and its Applications

Keita EMURA,  Atsuko MIYAJI,  Kazumasa OMOTE,  

[Date]2010/10/29
[Paper #]ICSS2010-48
Ontological Approach Toward Cybersecurity in Cloud Computing

Takeshi TAKAHASHI,  Youki KADOBAYASHI,  Hiroyuki FUJIWARA,  

[Date]2010/10/29
[Paper #]ICSS2010-49
Network Topology Analysys for Web Malware Risk Assessment

Akira KANAOKA,  Masahiko KATOH,  Eiji OKAMOTO,  

[Date]2010/10/29
[Paper #]ICSS2010-50
A Document Access Control Model Based on Role and Security Policy

Liangjian MAO,  Kouichi SAKURAI,  

[Date]2010/10/29
[Paper #]ICSS2010-51
Development of a Multifactor Authentication Platform with a Single Sign-On Function

Jiro YAMADA,  Satoshi YAGI,  Isoo UENO,  Takeshi KITAGAWA,  Hidetoshi TAKASUGI,  

[Date]2010/10/29
[Paper #]ICSS2010-52
Determining granularity of URL filtering based on tree structure of malicious website URL

Mitsuaki AKIYAMA,  Takeshi YAGI,  Mitsutaka ITOH,  

[Date]2010/10/29
[Paper #]ICSS2010-53
A Shellcode Analysis Method using CPU Emulator and Dynamic Binary Instrumentation

Chiaki JIMBO,  Katsunari YOSHIOKA,  Junji SHIKATA,  Tsutomu MATSUMOTO,  Masashi ETO,  Daisuke INOUE,  Koji NAKAO,  

[Date]2010/10/29
[Paper #]ICSS2010-54
A Method of Sandbox Analysis of Malware Acting with Use of Online Services

Kousuke Murakami,  Katsunari Yoshioka,  Tsutomu Matsumoto,  

[Date]2010/10/29
[Paper #]ICSS2010-55
複写される方へ

,  

[Date]2010/10/29
[Paper #]
奥付

,  

[Date]2010/10/29
[Paper #]
裏表紙

,  

[Date]2010/10/29
[Paper #]