IEICE TRANSACTIONS on Information and Systems

Archive Index

Online ISSN : 1745-1361
Volume E94-D No.11  (Publication Date:2011/11/01)
Previous | 
Special Section on Information and Communication System Security

pp.2067-2068  FOREWORD  Open Access Paper
Yutaka MIYAKE  
Summary | FreeFull Text:PDF(58.3KB)

pp.2069-2076  INVITED PAPER  Open Access Paper
Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
Chia-Yin LEE  Zhi-Hui WANG  Lein HARN  Chin-Chen CHANG  
Summary | FreeFull Text:PDF(222.2KB)

pp.2077-2086  INVITED PAPER  Open Access Paper
Overview of Traceback Mechanisms and Their Applicability
Heung-Youl YOUM  
Summary | FreeFull Text:PDF(1.8MB)

pp.2087-2094  INVITED PAPER  Open Access Paper
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP
Masakatu MORII  Yosuke TODO  
Summary | FreeFull Text:PDF(505.6KB)

pp.2095-2110  PAPER
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  
Summary | Full Text:PDF (693.9KB) >>Buy this Article

pp.2111-2118  PAPER
Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
Tetsuya IZU  Yumi SAKEMI  Masahiko TAKENAKA  
Summary | Full Text:PDF (196.5KB) >>Buy this Article

pp.2119-2128  PAPER
Rethinking Business Model in Cloud Computing: Concept and Example
Ping DU  Akihiro NAKAO  
Summary | Full Text:PDF (595.4KB) >>Buy this Article

pp.2129-2138  PAPER
Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks
Yuan-Cheng LAI  Ying-Dar LIN  Fan-Cheng WU  Tze-Yau HUANG  Frank C. LIN  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.2139-2149  PAPER
Analysis on the Sequential Behavior of Malware Attacks
Nur Rohman ROSYID  Masayuki OHRUI  Hiroaki KIKUCHI  Pitikhate SOORAKSA  Masato TERADA  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.2150-2158  PAPER
A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
Junji NAKAZATO  Jungsuk SONG  Masashi ETO  Daisuke INOUE  Koji NAKAO  
Summary | Full Text:PDF (944.4KB) >>Buy this Article

pp.2159-2166  PAPER
A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.2167-2170  LETTER
Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
Eun-Jun YOON  Kee-Young YOO  
Summary | Full Text:PDF (234.6KB) >>Buy this Article

pp.2171-2172  LETTER
An Improved Authenticated Encryption Scheme
Fagen LI  Jiang DENG  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (54.6KB) >>Buy this Article

Regular Section

pp.2173-2183  PAPER-Computer System
FPGA-Specific Custom VLIW Architecture for Arbitrary Precision Floating-Point Arithmetic
Yuanwu LEI  Yong DOU  Jie ZHOU  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.2184-2190  PAPER-Computer System
Modeling and Analysis for Universal Plug and Play Using PIPE2
Cheng-Min LIN  Shyi-Shiou WU  Tse-Yi CHEN  
Summary | Full Text:PDF (705.2KB) >>Buy this Article

pp.2191-2200  PAPER-Information Network
Parameter Tuning of the Protocol Interference Model Using SINR for Time Slot Assignment in Wireless Mesh Networks
Gyeongyeon KANG  Yoshiaki TANIGUCHI  Go HASEGAWA  Hirotaka NAKANO  
Summary | Full Text:PDF (655.9KB) >>Buy this Article

pp.2201-2211  PAPER-Information Network
Indoor Positioning System Using Digital Audio Watermarking
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.2212-2218  PAPER-Artificial Intelligence, Data Mining
Analyzing Emergence in Complex Adaptive System: A Sign-Based Model of Stigmergy
Chuanjun REN  Xiaomin JIA  Hongbing HUANG  Shiyao JIN  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.2219-2226  PAPER-Artificial Intelligence, Data Mining
Patent Registration Prediction Methodology Using Multivariate Statistics
Won-Gyo JUNG  Sang-Sung PARK  Dong-Sik JANG  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.2227-2233  PAPER-Artificial Intelligence, Data Mining
A Supervised Classification Approach for Measuring Relational Similarity between Word Pairs
Danushka BOLLEGALA  Yutaka MATSUO  Mitsuru ISHIZUKA  
Summary | Full Text:PDF (324.4KB) >>Buy this Article

pp.2234-2243  PAPER-Artificial Intelligence, Data Mining
A Support Vector and K-Means Based Hybrid Intelligent Data Clustering Algorithm
Liang SUN  Shinichi YOSHIDA  Yanchun LIANG  
Summary | Full Text:PDF (3MB) >>Buy this Article

pp.2244-2249  PAPER-Artificial Intelligence, Data Mining
The Lower Bound for the Nearest Neighbor Estimators with (p,C)-Smooth Regression Functions
Takanori AYANO  
Summary | Full Text:PDF (141.2KB) >>Buy this Article

pp.2250-2258  PAPER-Speech and Hearing
Decision Tree-Based Acoustic Models for Speech Recognition with Improved Smoothness
Masami AKAMINE  Jitendra AJMERA  
Summary | Full Text:PDF (495.5KB) >>Buy this Article

pp.2259-2270  PAPER-Image Processing and Video Processing
Amortized Linux Ext3 File System with Fast Writing after Editing for WinXP-Based Multimedia Application
Seung-Wan JUNG  Young Jin NAM  Dae-Wha SEO  
Summary | Full Text:PDF (3.5MB) >>Buy this Article

pp.2271-2279  PAPER-Computer Graphics
Compression of Dynamic 3D Meshes and Progressive Displaying
Bin-Shyan JONG  Chi-Kang KAO  Juin-Ling TSENG  Tsong-Wuu LIN  
Summary | Full Text:PDF (2.5MB) >>Buy this Article

pp.2280-2283  LETTER-Information Network
Multi-Dimensional Channel Management Mechanism to Avoid Reader Collision in Dense RFID Networks
Haoru SU  Sunshin AN  
Summary | Full Text:PDF (368.7KB) >>Buy this Article

pp.2284-2287  LETTER-Artificial Intelligence, Data Mining
Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis
Shi-Ze GUO  Zhe-Ming LU  Zhe CHEN  Hao LUO  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.2288-2292  LETTER-Artificial Intelligence, Data Mining
Concept Drift Detection for Evolving Stream Data
Jeonghoon LEE  Yoon-Joon LEE  
Summary | Full Text:PDF (325.4KB) >>Buy this Article

Previous | 
go to Page Top