IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E92-D No.5  (Publication Date:2009/05/01)
Previous | 
Next
Special Section on Information and Communication System Security

pp.765-765  FOREWORD  Open Access Paper
FOREWORD
Kouichi SAKURAI  
Summary | FreeFull Text:PDF(52.7KB)

pp.766-776  INVITED PAPER
Extensible Authentication Protocol Overview and Its Applications
Heung Youl YOUM  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.777-786  INVITED PAPER
A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks
Hsiao-Chien TSAI  Nai-Wei LO  Tzong-Chen WU  
Summary | Full Text:PDF (387.7KB) >>Buy this Article

pp.787-798  INVITED PAPER
Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
Koji NAKAO  Daisuke INOUE  Masashi ETO  Katsunari YOSHIOKA  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.799-809  INVITED PAPER
Concept, Characteristics and Defending Mechanism of Worms
Yong TANG  Jiaqing LUO  Bin XIAO  Guiyi WEI  
Summary | Full Text:PDF (808.4KB) >>Buy this Article

pp.810-817  PAPER-Ad-Hoc/Sensor Networks
An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET
Youngho PARK  Kyung-Hyune RHEE  
Summary | Full Text:PDF (293.4KB) >>Buy this Article

pp.818-825  PAPER-Ad-Hoc/Sensor Networks
Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks
Tae DEMPSEY  Gokhan SAHIN  Yu T. (Jade) MORTON  
Summary | Full Text:PDF (597.4KB) >>Buy this Article

pp.826-835  PAPER-Authentication and Authorization Techniques
Development of Single Sign-On System with Hardware Token and Key Management Server
Daiki NOBAYASHI  Yutaka NAKAMURA  Takeshi IKENAGA  Yoshiaki HORI  
Summary | Full Text:PDF (795.9KB) >>Buy this Article

pp.836-850  PAPER-Authentication and Authorization Techniques
Information-Flow-Based Access Control for Web Browsers
Sachiko YOSHIHAMA  Takaaki TATEISHI  Naoshi TABUCHI  Tsutomu MATSUMOTO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.851-858  PAPER-Contents Protection
An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding
Su-Wan PARK  Sang Uk SHIN  
Summary | Full Text:PDF (547.9KB) >>Buy this Article

pp.859-875  PAPER-Contents Protection
A Trade-off Traitor Tracing Scheme
Go OHTAKE  Kazuto OGAWA  Goichiro HANAOKA  Hideki IMAI  
Summary | Full Text:PDF (786.3KB) >>Buy this Article

pp.876-887  PAPER-Contents Protection
Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs
Shuhui HOU  Tetsutaro UEHARA  Takashi SATOH  Yoshitaka MORIMURA  Michihiko MINOH  
Summary | Full Text:PDF (364.1KB) >>Buy this Article

pp.888-896  PAPER-Cryptographic Techniques
Combining Public Key Encryption with Keyword Search and Public Key Encryption
Rui ZHANG  Hideki IMAI  
Summary | Full Text:PDF (196.5KB) >>Buy this Article

pp.897-908  PAPER-Implementation Issues
Collision-Based Power Attack for RSA with Small Public Exponent
Kouichi ITOH  Dai YAMAMOTO  Jun YAJIMA  Wakaha OGATA  
Summary | Full Text:PDF (748.3KB) >>Buy this Article

pp.909-917  PAPER-Implementation Issues
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
Masaaki SHIRASE  Yukinori MIYAZAKI  Tsuyoshi TAKAGI  Dong-Guk HAN  Dooho CHOI  
Summary | Full Text:PDF (253.2KB) >>Buy this Article

pp.918-928  PAPER-Implementation Issues
TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes
Seog Chung SEO  Dong-Guk HAN  Seokhie HONG  
Summary | Full Text:PDF (676.4KB) >>Buy this Article

pp.929-936  PAPER-Internet Security
A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies
Ping DU  Shunji ABE  Yusheng JI  Seisho SATO  Makio ISHIGURO  
Summary | Full Text:PDF (981.7KB) >>Buy this Article

pp.937-944  PAPER-Internet Security
A Trust Ranking Method to Prevent IM Spam
Jun BI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.945-954  PAPER-Malware Detection
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Daisuke INOUE  Katsunari YOSHIOKA  Masashi ETO  Yuji HOSHIZAWA  Koji NAKAO  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.955-966  PAPER-Malware Detection
Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation
Katsunari YOSHIOKA  Daisuke INOUE  Masashi ETO  Yuji HOSHIZAWA  Hiroki NOGAWA  Koji NAKAO  
Summary | Full Text:PDF (3.2MB) >>Buy this Article

pp.967-970  LETTER-Cryptographic Techniques
CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
Yang CUI  Goichiro HANAOKA  Hideki IMAI  
Summary | Full Text:PDF (86.2KB) >>Buy this Article

Special Section on Formal Approach

pp.971-971  FOREWORD  Open Access Paper
FOREWORD
Yukiyoshi KAMEYAMA  
Summary | FreeFull Text:PDF(51.9KB)

pp.972-984  PAPER-Hardware Verification
Word-Level Equivalence Checking in Bit-Level Accuracy by Synthesizing Designs onto Identical Datapath
Tasuku NISHIHARA  Takeshi MATSUMOTO  Masahiro FUJITA  
Summary | Full Text:PDF (1022KB) >>Buy this Article

pp.985-994  PAPER-Hardware Verification
A Unified Framework for Equivalence Verification of Datapath Oriented Applications
Bijan ALIZADEH  Masahiro FUJITA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.995-1002  PAPER-Foundation
Pre- and Post-Conditions Expressed in Variants of the Modal µ-Calculus
Yoshinori TANABE  Toshifusa SEKIZAWA  Yoshifumi YUASA  Koichi TAKAHASHI  
Summary | Full Text:PDF (316.3KB) >>Buy this Article

pp.1003-1011  PAPER-Model Checking
Probabilistic Model Checking of the One-Dimensional Ising Model
Toshifusa SEKIZAWA  Tatsuhiro TSUCHIYA  Koichi TAKAHASHI  Tohru KIKUNO  
Summary | Full Text:PDF (706.6KB) >>Buy this Article

pp.1012-1021  PAPER-Software Testing
Generating Test Cases for Invariant Properties from Proof Scores in the OTS/CafeOBJ Method
Masaki NAKAMURA  Takahiro SEINO  
Summary | Full Text:PDF (233KB) >>Buy this Article

pp.1022-1032  PAPER-Security
Verification of the Security against Inference Attacks on XML Databases
Kenji HASHIMOTO  Kimihide SAKANO  Fumikazu TAKASUKA  Yasunori ISHIHARA  Toru FUJIWARA  
Summary | Full Text:PDF (814.8KB) >>Buy this Article

pp.1033-1036  LETTER
Comparison of the Expressive Power of Language-Based Access Control Models
Yoshiaki TAKATA  Hiroyuki SEKI  
Summary | Full Text:PDF (201.6KB) >>Buy this Article

Regular Section

pp.1037-1048  PAPER-Computation and Computational Models
A Distributed Variational Bayesian Algorithm for Density Estimation in Sensor Networks
Behrooz SAFARINEJADIAN  Mohammad B. MENHAJ  Mehdi KARRARI  
Summary | Full Text:PDF (640.7KB) >>Buy this Article

pp.1049-1061  PAPER-VLSI Systems
PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS
Tran Ngoc THINH  Surin KITTITORNKUN  Shigenori TOMIYAMA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1062-1078  PAPER-Computer Systems
TTN: A High Performance Hierarchical Interconnection Network for Massively Parallel Computers
M.M. Hafizur RAHMAN  Yasushi INOGUCHI  Yukinori SATO  Susumu HORIGUCHI  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1079-1092  PAPER-Contents Technology and Web Information Systems
XSemantic: An Extension of LCA Based XML Semantic Search
Umaporn SUPASITTHIMETHEE  Toshiyuki SHIMIZU  Masatoshi YOSHIKAWA  Kriengkrai PORKAEW  
Summary | Full Text:PDF (613.9KB) >>Buy this Article

pp.1093-1102  PAPER-Data Mining
An Identification Method of Data-Specific GO Terms from a Microarray Data Set
Yoichi YAMADA  Ken-ichi HIROTANI  Kenji SATOU  Ken-ichiro MURAMOTO  
Summary | Full Text:PDF (328.1KB) >>Buy this Article

pp.1103-1124  PAPER-Networks
Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks
Yi WANG  Liang DONG  Taotao LIANG  Xinyu YANG  Deyun ZHANG  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1125-1136  PAPER-Distributed Cooperation and Agents
A Biologically Inspired Self-Adaptation of Replica Density Control
Tomoko IZUMI  Taisuke IZUMI  Fukuhito OOSHITA  Hirotsugu KAKUGAWA  Toshimitsu MASUZAWA  
Summary | Full Text:PDF (868.8KB) >>Buy this Article

pp.1137-1145  PAPER-Speech and Hearing
Speech Enhancement Based on Noise Eigenspace Projection
Dongwen YING  Masashi UNOKI  Xugang LU  Jianwu DANG  
Summary | Full Text:PDF (385.7KB) >>Buy this Article

pp.1146-1158  PAPER-Image Recognition, Computer Vision
A Lexicon-Driven Handwritten City-Name Recognition Scheme for Indian Postal Automation
Umapada PAL  Kaushik ROY  Fumitaka KIMURA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1159-1167  PAPER-Image Recognition, Computer Vision
An Efficient Local Stereo Matching Algorithm for Dense Disparity Map Estimation Based on More Effective Use of Intensity Information and Matching Constraints
Ali M. FOTOUHI  Abolghasem A. RAIE  
Summary | Full Text:PDF (276.7KB) >>Buy this Article

pp.1168-1176  PAPER-Biological Engineering
Detection of Fundus Lesions Using Classifier Selection
Hiroto NAGAYOSHI  Yoshitaka HIRAMATSU  Hiroshi SAKO  Mitsutoshi HIMAGA  Satoshi KATO  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1177-1180  LETTER-System Programs
Enriching OSGi Service Composition with Web Services
Choonhwa LEE  Sunghoon KO  Eunsam KIM  Wonjun LEE  
Summary | Full Text:PDF (645.1KB) >>Buy this Article

pp.1181-1185  LETTER-Database
Dynamic Forest: An Efficient Index Structure for NAND Flash Memory
Chul-Woong YANG  Ki YONG LEE  Myoung HO KIM  Yoon-Joon LEE  
Summary | Full Text:PDF (220.4KB) >>Buy this Article

pp.1186-1189  LETTER-Networks
A Fuzzy Control-Based Service Configuration Approach for Ubiquitous Computing Applications
Yong ZHANG  Shensheng ZHANG  Songqiao HAN  
Summary | Full Text:PDF (194.5KB) >>Buy this Article

pp.1190-1193  LETTER-Networks
A Feasibility Study on Crash Avoidance at Four-Way Stop-Sign-Controlled Intersections Using Wireless Sensor Networks
Do Hyun KIM  Kyoung Ho CHOI  Kyeong Tae KIM  Ki Joune LI  
Summary | Full Text:PDF (595.2KB) >>Buy this Article

pp.1194-1196  LETTER-Networks
Cryptographic Energy Costs Are Assumable in Ad Hoc Networks
Helena RIFA-POUS  Jordi HERRERA-JOANCOMARTI  
Summary | Full Text:PDF (58.3KB) >>Buy this Article

pp.1197-1199  LETTER-Dependable Computing
Application-Dependent Interconnect Testing of Xilinx FPGAs Based on Line Branches Partitioning
Teng LIN  Jianhua FENG  Dunshan YU  
Summary | Full Text:PDF (137.3KB) >>Buy this Article

pp.1200-1203  LETTER-Application Information Security
Searchable Encryption with Keyword-Recoverability
Ik Rae JEONG  Jeong Ok KWON  Dowon HONG  Dong Hoon LEE  
Summary | Full Text:PDF (94.5KB) >>Buy this Article

pp.1204-1208  LETTER-Artificial Intelligence and Cognitive Science
On Computational Issues of Semi-Supervised Local Fisher Discriminant Analysis
Masashi SUGIYAMA  
Summary | Full Text:PDF (94.1KB) >>Buy this Article

pp.1209-1212  LETTER-Image Recognition, Computer Vision
Salient Edge Detection in Natural Images
Yihang BO  Siwei LUO  Qi ZOU  
Summary | Full Text:PDF (504.5KB) >>Buy this Article

pp.1213-1217  LETTER-Natural Language Processing
Three-Phase Text Error Correction Model for Korean SMS Messages
Jeunghyun BYUN  So-Young PARK  Seung-Wook LEE  Hae-Chang RIM  
Summary | Full Text:PDF (88.1KB) >>Buy this Article

pp.1218-1221  LETTER-Biological Engineering
Differentiating Honeycombed Images from Normal HRCT Lung Images
Aamir Saeed MALIK  Tae-Sun CHOI  
Summary | Full Text:PDF (198.8KB) >>Buy this Article

Previous | 
Next
go to Page Top