IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E91-D No.5  (Publication Date:2008/05/01)
Previous | 
Next
Special Section on Information and Communication System Security

pp.1225-1225  FOREWORD  Open Access Paper
FOREWORD
Koji NAKAO  
Summary | FreeFull Text:PDF(47.9KB)

pp.1226-1233  INVITED PAPER
Safe and Secure Services Based on NGN
Tomoo FUKAZAWA  Takemi NISASE  Masahisa KAWASHIMA  Takeo HARIU  Yoshihito OSHIMA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1234-1241  INVITED PAPER
Hybrid Intrusion Forecasting Framework for Early Warning System
Sehun KIM  Seong-jun SHIN  Hyunwoo KIM  Ki Hoon KWON  Younggoo HAN  
Summary | Full Text:PDF (482.5KB) >>Buy this Article

pp.1242-1251  INVITED PAPER
Integrity Management Infrastructure for Trusted Computing
Seiji MUNETOH  Megumi NAKAMURA  Sachiko YOSHIHAMA  Michiharu KUDO  
Summary | Full Text:PDF (554KB) >>Buy this Article

pp.1252-1260  INVITED PAPER
Efficient Fingercode Classification
Hong-Wei SUN  Kwok-Yan LAM  Dieter GOLLMANN  Siu-Leung CHUNG  Jian-Bin LI  Jia-Guang SUN  
Summary | Full Text:PDF (606.3KB) >>Buy this Article

pp.1261-1273  PAPER-Network Security
UDP Large-Payload Capability Detection for DNSSEC
Kenji RIKITAKE  Koji NAKAO  Shinji SHIMOJO  Hiroki NOGAWA  
Summary | Full Text:PDF (882.8KB) >>Buy this Article

pp.1274-1281  PAPER-Network Security
IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks
Ping DU  Shunji ABE  
Summary | Full Text:PDF (749.6KB) >>Buy this Article

pp.1282-1291  PAPER-Network Security
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System
Jungsuk SONG  Kenji OHIRA  Hiroki TAKAKURA  Yasuo OKABE  Yongjin KWON  
Summary | Full Text:PDF (470.3KB) >>Buy this Article

pp.1292-1299  PAPER-Network Security
Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic
Yoshihide MATSUMOTO  Hiroaki HAZEYAMA  Youki KADOBAYASHI  
Summary | Full Text:PDF (342.4KB) >>Buy this Article

pp.1300-1310  PAPER-Network Security
Toward a Scalable Visualization System for Network Traffic Monitoring
Erwan LE MALECOT  Masayoshi KOHARA  Yoshiaki HORI  Kouichi SAKURAI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1311-1318  PAPER-Implementation
A Proposal of TLS Implementation for Cross Certification Model
Tadashi KAJI  Takahiro FUJISHIRO  Satoru TEZUKA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1319-1329  PAPER-Implementation
OpenIKEv2: Design and Implementation of an IKEv2 Solution
Alejandro Perez MENDEZ  Pedro J. Fernandez RUIZ  Rafael Marin LOPEZ  Gregorio Martinez PEREZ  Antonio F. Gomez SKARMETA  Kenichi TANIUCHI  
Summary | Full Text:PDF (720.5KB) >>Buy this Article

pp.1330-1337  PAPER-Implementation
Efficient Implementation of the Pairing on Mobilephones Using BREW
Motoi YOSHITOMI  Tsuyoshi TAKAGI  Shinsaku KIYOMOTO  Toshiaki TANAKA  
Summary | Full Text:PDF (272.9KB) >>Buy this Article

pp.1338-1347  PAPER-Implementation
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
Seog Chung SEO  Dong-Guk HAN  Hyung Chan KIM  Seokhie HONG  
Summary | Full Text:PDF (525.8KB) >>Buy this Article

pp.1348-1358  PAPER-Watermarking
Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information
Mitsuo OKADA  Hiroaki KIKUCHI  Yasuo OKABE  
Summary | Full Text:PDF (497.3KB) >>Buy this Article

pp.1359-1368  PAPER-Watermarking
Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents
Kyung-Su KIM  Hae-Yeoun LEE  Dong-Hyuck IM  Heung-Kyu LEE  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1369-1379  PAPER-Biometrics
Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication
Davar PISHVA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1380-1389  PAPER-Biometrics
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
Masashi UNE  Akira OTSUKA  Hideki IMAI  
Summary | Full Text:PDF (724.7KB) >>Buy this Article

pp.1390-1397  PAPER-Contents Protection
Copyright Protection for Modifiable Digital Content Based on Distributed Environment
Heejae PARK  Jong KIM  
Summary | Full Text:PDF (456.2KB) >>Buy this Article

pp.1398-1407  PAPER-Contents Protection
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA
Yohei HORI  Hiroyuki YOKOYAMA  Hirofumi SAKANE  Kenji TODA  
Summary | Full Text:PDF (840.1KB) >>Buy this Article

pp.1408-1415  PAPER-Key Management
A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol
Albert JENG  Li-Chung CHANG  Sheng-Hui CHEN  
Summary | Full Text:PDF (295.1KB) >>Buy this Article

pp.1416-1423  PAPER-Key Management
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry
Hisashi MOHRI  Ritsuko MATSUMOTO  Yuichi KAJI  
Summary | Full Text:PDF (371.7KB) >>Buy this Article

pp.1424-1438  PAPER-Key Management
RSA-Based Password-Authenticated Key Exchange, Revisited
SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  
Summary | Full Text:PDF (408KB) >>Buy this Article

pp.1439-1446  PAPER-Information Leakage
Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest
Hidema TANAKA  
Summary | Full Text:PDF (284.2KB) >>Buy this Article

pp.1447-1456  PAPER-Access Control
Security Violation Detection for RBAC Based Interoperation in Distributed Environment
Xinyu WANG  Jianling SUN  Xiaohu YANG  Chao HUANG  Di WU  
Summary | Full Text:PDF (403.2KB) >>Buy this Article

pp.1457-1465  PAPER-Authentication
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
Yang CUI  Kazukuni KOBARA  Kanta MATSUURA  Hideki IMAI  
Summary | Full Text:PDF (293.4KB) >>Buy this Article

pp.1466-1476  PAPER-Cryptographic Techniques
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
Takahiro MATSUDA  Nuttapong ATTRAPADUNG  Goichiro HANAOKA  Kanta MATSUURA  Hideki IMAI  
Summary | Full Text:PDF (335.9KB) >>Buy this Article

pp.1477-1480  LETTER-Secure Communication
Security Analysis of Yeh-Tsai Security Mechanism
Dae Hyun YUM  Jong Hoon SHIN  Pil Joong LEE  
Summary | Full Text:PDF (108.7KB) >>Buy this Article

pp.1481-1484  LETTER-Secure Communication
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
Taek-Young YOUN  Young-Ho PARK  Taekyoung KWON  Soonhak KWON  Jongin LIM  
Summary | Full Text:PDF (109.8KB) >>Buy this Article

pp.1485-1488  LETTER-Key Management
Reliable Key Distribution Scheme for Lossy Channels
Ryuzou NISHI  Yoshiaki HORI  Kouichi SAKURAI  
Summary | Full Text:PDF (184.6KB) >>Buy this Article

pp.1489-1491  LETTER-Cryptographic Techniques
Generalized Combinatoric Accumulator
Dae Hyun YUM  Jae Woo SEO  Pil Joong LEE  
Summary | Full Text:PDF (73.1KB) >>Buy this Article

Regular Section

pp.1492-1503  PAPER-Fundamentals of Software and Theory of Programs
A Specification Translation from Behavioral Specifications to Rewrite Specifications
Masaki NAKAMURA  Weiqiang KONG  Kazuhiro OGATA  Kokichi FUTATSUGI  
Summary | Full Text:PDF (306.5KB) >>Buy this Article

pp.1504-1511  PAPER-Contents Technology and Web Information Systems
Design of Content-Based Publish/Subscribe Systems over Structured Overlay Networks
Shou-Chih LO  Yi-Ting CHIU  
Summary | Full Text:PDF (619.8KB) >>Buy this Article

pp.1512-1521  PAPER-Application Information Security
Robust Watermarking of 3D Polygonal Meshes
Han Sae SONG  Nam Ik CHO  
Summary | Full Text:PDF (1001.7KB) >>Buy this Article

pp.1522-1530  PAPER-Speech and Hearing
Ears of the Robot: Direction of Arrival Estimation Based on Pattern Recognition Using Robot-Mounted Microphones
Naoya MOCHIKI  Tetsuji OGAWA  Tetsunori KOBAYASHI  
Summary | Full Text:PDF (489.7KB) >>Buy this Article

pp.1531-1542  PAPER-Image Recognition, Computer Vision
Task Recognition and Person Identification in Cyclic Dance Sequences with Multi Factor Tensor Analysis
Manoj PERERA  Takaaki SHIRATORI  Shunsuke KUDOH  Atsushi NAKAZAWA  Katsushi IKEUCHI  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1543-1551  PAPER-Image Recognition, Computer Vision
Automatic Facial Skin Segmentation Based on EM Algorithm under Varying Illumination
Mousa SHAMSI  Reza Aghaiezadeh ZOROOFI  Caro LUCAS  Mohammad Sadeghi HASANABADI  Mohammad Reza ALSHARIF  
Summary | Full Text:PDF (739KB) >>Buy this Article

pp.1552-1561  PAPER-Natural Language Processing
On the Use of Structures for Spoken Language Understanding: A Two-Step Approach
Minwoo JEONG  Gary Geunbae LEE  
Summary | Full Text:PDF (526.6KB) >>Buy this Article

pp.1562-1572  PAPER-Biocybernetics, Neurocomputing
A Sieving ANN for Emotion-Based Movie Clip Classification
Saowaluk C. WATANAPA  Bundit THIPAKORN  Nipon CHAROENKITKARN  
Summary | Full Text:PDF (515.2KB) >>Buy this Article

pp.1573-1576  LETTER-Pattern Recognition
Kernel TV-Based Quotient Image Employing Gabor Analysis and Its Application to Face Recognition
GaoYun AN  JiYing WU  QiuQi RUAN  
Summary | Full Text:PDF (968.3KB) >>Buy this Article

pp.1577-1580  LETTER-Pattern Recognition
Approximating the Best Linear Unbiased Estimator of Non-Gaussian Signals with Gaussian Noise
Masashi SUGIYAMA  Motoaki KAWANABE  Gilles BLANCHARD  Klaus-Robert MULLER  
Summary | Full Text:PDF (159.7KB) >>Buy this Article

pp.1581-1583  LETTER-Image Processing and Video Processing
Noise Robust Motion Refinement for Motion Compensated Noise Reduction
Jong-Sun KIM  Lee-Sup KIM  
Summary | Full Text:PDF (300.9KB) >>Buy this Article

pp.1584-1587  LETTER-Natural Language Processing
Automatic Acronym Dictionary Construction Based on Acronym Generation Types
Yeo-Chan YOON  So-Young PARK  Young-In SONG  Hae-Chang RIM  Dae-Woong RHEE  
Summary | Full Text:PDF (91.2KB) >>Buy this Article

Previous | 
Next
go to Page Top