ȺCüÍêÊ\ÒCÍw��\Òð\µÜ·D
1019úiÎj
1A1FU³f[^(1) | À·Fö Nñ iTelecom-ISAC Japan / KDDIj
}EFAÎô̽ß̤pf[^Zbg `MWS 2010 Datasets`
ü�Nc [OiNTTR~
jP[VY®ïÐjCï EiêÊÐc@l JPCERTR[fBl[VZ^[jCHR ºiNTTîñ��ÊvbgtH[¤jCOÖ MîiîñÊM¤@\j
vY}bvÉæé»ðp��½}EFAÌ®üðÍ
üàq êi®ïÐbNjCVä Ii®ïÐbNjC¼Ø ²Gi®ïÐbNj
¡zXgÌÊMo»ÉæéärðÍ
�LìËVidCÊMåwåw@jC��rp��idCÊMåwåw@j
CCC Dataset 2010Éæé}EFAzz³IPAhX]¿ÉÖ·éêl@
ü{¡NÍiC^[lbg}`tB[h®ïÐj
1A2FU³f[^(2) | À·F�Nc [O iNTTR~
jP[VYj
å��2ÂÌϪÔÉæéÊÌÔÏ»Æ}EFAÎôÉÖ·éêl@
üiö õ[i®ïÐC^[lbgCjVAeBujCéØ ui®ïÐC^[lbgCjVAeBujCÁ¡ ëFi®ïÐC^[lbgCjVAeBujCâV¡ qi®ïÐC^[lbgCjVAeBuj
}EFAÌ]Oðpµ½næÌ{bg®ªÍ
üàä liC^[lbg}`tB[hj
TCo[N[Z^[®ñi*j
ü\ q((à)ú{f[^ÊM¦ïTelecom-ISAC Japan)
MWS 2010 Datasets }EFAÌðài*j
üï E(êÊÐc@l JPCERTR[fBl[VZ^[)CüHR º(NTTîñ��ÊvbgtH[¤)
i*j \ÌÝÉÈèÜ·D\eWÉfÚ·é_���LeͲ�L��ܹñD
Ъ
q`uÊ\vðß®ÁÄ
®ª ³Þ (ªR����üpÙ Ù·j
��è
1B1F¤Ê®Ã | À·F¼Y ²¾ iåwj
Domino-RSLû®ðp��½Simplified-DESÃñHÌì�NæÑDPAÏ«]¿
âäFi��½Ùåwåw@Hw¤ÈjC��ii��½Ùåwåw@Hw¤ÈjC²ì^Ki��½Ùåwåw@Hw¤ÈjC��è[i��½Ùåwåw@Hw¤@\jC¡ìBi��½ÙåwHwj
·ªîñðpµ½RC4 PRGAàóÔ³ASYÌñÄ
`eêäik¤æ[ÈwZpåw@åwjC{n[qik¤æ[ÈwZpåw@åwj
DECIM v2ÉηéSide Channel AttackÌ]¿
��ê äi_Ëåwåw@Hw¤ÈjCXä ¹i_Ëåwåw@Hw¤Èj
¤Ê®FØÃÉ�N¯éÄûÉÂ��Ä
üA��êiäåwj
nbV
ÖLuffaÌFPGAÀ]¿
üк qGiYÆZp¤jC²¡ ØiYÆZp¤j
nbV
ÖLuffaÌn[hEFAÀyÑ]¿
üOã Cái®ïÐú��»ì VXeJ¤jCnÓ åi®ïÐú��»ì VXeJ¤jC
iëi®ïÐú��»ì VXeJ¤jCº ßqi®ïÐú��»ì VXeJ¤j
LÖâÔðp��½v^èlé��ªU@
äãdMi¤Qåwåw@Hw¤ÈdqîñHwêUjCbãi¤Qåwåw@Hw¤ÈdqîñHwêUj
On the Evaluation of Spread Spectrum Fingerprinting
üMinoru KuribayashiiKobe Universityj
dq��©µÉKµ½LDPCÉÖ·é��
Jì W¾YiÈåwjC�L wiYÆZp¤jC⺠�NsiÈåwj
��©µæÆßÝîñÌÝðp��½dq��©µASYÌðÍ��
ìâqåiÈåwjCâº�NsiÈåwj
fBh~û®É�N¯éÔOJbgtB^UÖÌÎô
üRc ²si¤åw@åw ¡Èw¤ÈjCu �LêiV[v®ïÐ fBXvCVXe¤jCzO ��i��îñw¤ / ¤åw@åw ¡Èw¤Èj
1C2FÝvE]¿ | À·Fc z ixmʤj
îñÇÀÉæés³ANZX}~øÊÉÖ·éêl@
üOº çiîñZL
eBåw@åwjCc pFiîñZL
eBåw@åwj
[|Wgðp��½[UªJX^}CYÂ\Èf[^Ûìû@ÌñÄ
ü�LêiiàjãBæ[ÈwZp¤jC¼è²NißEåwjCõPiãBåwjCNäKêiãBåwåw@VXeîñÈw¤@j
ZL
eB]¿ðl��µ½ÊMoHIðû®Ì��
ü]¡ ��¡iiàjãBæ[ÈwZp¤jC�L êiiàjãBæ[ÈwZp¤jCx DziãBåwåw@VXeîñÈw¤@jCNä KêiãBåwåw@VXeîñÈw¤@j
VXeÌ`®ØÉ�N¯éVXedlÆ|V[̪��ÉÖ·éñÄ
üÎ ³öiOH¤jCÔä êYiOH¤jCki��îñw¤jCc êViú��\tgEFAj
ZTlbg[NÉ�N¯éø¦IÈ®¤Lû®
ɤ Nçi®ïÐxmʤjCü ³Fi®ïÐxmʤjC¹ ¼Æi®ïÐxmʤj
CXZTlbg[NÉ�N¯éO[v®zvgRÌ��
OgYåiLs��åwjCo³aiLs��åwj
nbV
A½ÉæéPÈFØ@ÆZT[lbg[NÖÌp
üo³aiLs��åwj
lÌÊMðpµ½dqgA[W^OÖÌîñüÍF]¿À�}
À{j]iêåwåw@îñw¤ÈjCR{ iêåwn��ÈwZpåw@jC¡ì^��ixõÛá®ïÐjCÁ¡Nji®ïÐJCU[eNmW[jC¼_³iêåwn��ÈwZpåw@j
ZTlbg[NÉ�N¯é¡Ìg|WÉKpÂ\È®Çû®ÌÀ
áÛpriÈåwjC`èiYiÈåwjCâº�NsiÈåwj
Atmega1281ðp��½ZTm[hÉηéAESÀÌ��»
¹CÀiÈåwjC`è iYiÈåwjCâº�NsiÈåwj
}`tF[YCXZTlbg[NÉ�N¯éø¦I©ÂZL
AÈ®¤Lû®
ÑcBNik¤æ[ÈwZpåw@åjC{n[qik¤æ[ÈwZpåw@åjCÊa��ik¤æ[ÈwZpåw@åj
Secure Data Aggregation in Wireless Sensor Networks
Atsuko MiyajiiSchool of Information Science, Japan Advanced Institute of Science and TechnologyjCüKazumasa OmoteiSchool of Information Science, Japan Advanced Institute of Science and Technologyj
pzXgÌnIo»ÉæéXp[ÎôÌ��
üüâ ^êidCÊMåwåw@îñVXew¤ÈjC��r p��idCÊMåwåw@îñVXew¤Èj
íXÌÏ·ÉÏ«ðL·éæÀf[ÌoÉÖ·él@
º S��isH|@Ûåwåw@H|Èw¤ÈjCît GKisH|@Ûåwåw@H|Èw¤Èj
dq[wb_ÌÁ\îñðp��½WI^UÌm
~cVãÄicä`måw«îñwjCã�LYMicä`måwåw@ôEfBA¤ÈjC
J³cicä`måwåw@ôEfBA¤ÈjCc\jicä`måw«îñwj
VXeR[OÌL[[hõÉæé««Avm
üé�L²«iKDDI¤jC|XhSiKDDI¤jCOîDiKDDI¤j
ÃIðÍÆ®IðÍðgÝí¹½}EFAðÎÛƵ½ÄpIoCiR[hðÍè@
üòc å@iÆ��s@lYÆZp¤jCX ²iÆ��s@lYÆZp¤jCñØúgik¤æ[ÈwZpåw@åw îñÈw¤Èj
¼z}Vj^ðp��½}EFAÀs}~@\
ªº\SidCÊMåwjCåRbOidCÊMåwj
WindowsOSãÅÌs³Èt@CANZXÌmE³ø»É�N¯é�~á¸è@
©áÁjicä`måw«îñwjCÀ¡ÞiîñÊM¤@\îñÊMZL
eB¤Z^[jC
J³cicä`måwôEfBA¤ÈjCc\jicä`måw«îñwj
1020úi
j
g��ÉæéAhXÉË��µÈ��u[N|CgZpÌñÄ
üR S¾iú{dMdbjCÂØ êjiú{dMdbjCìÃJ T½iú{dMdbjC⺠½iú{dMdbjCÉ¡ õ�}iú{dMdbj
}EFAÎô[UT|[gVXeðp��½CCC DATASet 2010ÌðÍ
üìûM²iijú��»ìjC]cMKiijú��»ìjCìû�LViiijú��»ìjCc^qiijú��»ìjC}ØqFiKDDIijjC¯àVTñiijZL
AuCjCq¡«jiiÆjîñÊM¤@\jCäãåîiiÆjîñÊM¤@\jCöNñiiÆjîñÊM¤@\j
¼zvZ@j^Éæé}EFAÌÄ
å Eli��½ÙåwjCÑ öêi��½Ùåwj
®IðÍðpµ½ïÇ»JavaScriptR[hðÍVXeÌÀÆ]¿
ü_ëIi®ïÐZL
AuCjC¼cë¾i®ïÐZL
AuCjC¯àVTñi®ïÐZL
AuCj
©®Àso^ÉîÃ}EFA̪ÞÉÖ·é��Æ]¿
¼âN½iêåwjCðäTiêåwjCR{ iêåwjC|XhSi®ïÐKDDI¤jC¼_³iêåwj
G~
[VÉîÃVFR[hmè@ÌüP
¡äFDi¡l��åwjCgª��i¡l��åwjClûii¡l��åwjC¼{�~i¡l��åwj
®IðÍÉ�N¯éÌ®ìÔÉÖ·é��
üÂØ êjiNTTîñ��ÊvbgtH[¤jCìÃJ T½iNTTîñ��ÊvbgtH[¤jC⺠½iNTTîñ��ÊvbgtH[¤jCÉ¡ õ�}iNTTîñ��ÊvbgtH[¤j
Mechanized reasoningðp��½ANZXOÌÆðÍÌ©®»
üÀ¡ÞiîñÊM¤@\jCåÑYîiîñÊM¤@\jCOÖMîiîñÊM¤@\jCÂczêik¤æ[ÈwZpåw@åwj
@\ÆîñZL
eB `àµVmª@\ðìêÎ`
Ñ hêY (îñZL
eBåw@åw w·E³ö)
2B1FyAO | À·Fɤ Nç ixmʤj
GPUãÅÌÅTyAOÌ��À
Á¡zîiãBåwjCAU�LiäàsåwjCØiãBåwj
Java CardãÉ�N¯éyAOÃÌÀ
üì�L SliãBåw w{jC��Ñ S¾YiNTTîñ��ÊvbgtH[¤jC�L ³iNTTR~
jP[VYjCØ iãBåw w{j
AndroidgÑdbÉ�N¯éyAOÃÌÀ
äRuiãBåwjC�L{WìiKDDI¤jCapiKDDI¤jCcrºiKDDI¤jCØiãBåwj
ßÝ1Ìñ�LÁÙyAOthÈüãÌGLV@ªKpÅ«éªQ
oc NçiªRåwåw@©RÈw¤ÈjC|à ãÄêiªRåwåw@©RÈw¤ÈjC¼ä êuiªRåwåw@©RÈw¤ÈjCìã ÛViªRåwåw@©RÈw¤ÈjCXì ÇFiªRåwåw@©RÈw¤Èj
2B2F_(1) | À·FØ iãBåwj
AESÌSubBytesÉ�N¯éF(2^4)^2ðp��½ø¦IÈt³vZ
ºã ñiªRåwjCªp ¾iªRåwjCìã ÛViªRåwjCXì ÇFiªRåwj
CVPÉ�N¯ésize reductionÆswappingÌLø«ÉÂ��Ä
ü·Àiú��»ìVXeJ¤jC²¡®Xiú��»ìVXeJ¤jCgìëViú��»ìVXeJ¤j
ÊíÈ~ÈüãÌÎÌyAO
ü�N ¾iö��Í�}¾Ä��åwj
ñÎÌyAOÉp��égåÌãL_ÌeÀWÌmÆg[X
|à ãÄêiªRåwåw@jCÁ¡ pmiªRåwåw@jCìã ÛViªRåwåw@jCXì ÇFiªRåwåw@jC¼ qqiEÆ\ÍJåwZj
2B3F_(2) | À·Flû i i¡l��åwj
Barreto-NaehrigÈüãÌgåÌãL_Éηémðp��½��UÎvZÌø¦»ÉÖ·éêl@
üÁ¡ pmiªRåwåw@jC|à ãÄêiªRåwåw@jCìã ÛViªRåwåw@jCXì ÇFiªRåwåw@jC¼ qqiEÆ\ÍJåwZj
TinyTateCuªgp·éÈ~ÈüÉ�N¯éâüÍt«��UÎâèÌðÇñ
üð©RüiªRåwjCɤNçi®ïÐxmʤjC³Fi®ïÐxmʤjCÀcëÆi®ïÐxmʤjCìãÛViªRåwjCXìÇFiªRåwj
W3 ÌLÀÌãÌÈ~ÈüÉ�N¯é Cheon ASYÌÔ©Ïàè(II)
üɤ Nçi®ïÐxmʤjC ³Fi®ïÐxmʤjCÀc ëÆi®ïÐxmʤj
fÌGF(p)ãÌ��UÎâèÉηéÌâ¿@ÌärÀ�}
âêYiãBåwjCØiãBåwj
yÊØÂ\3p[eBé½ÖvZÌÄl
üçc _iiú{dMdb() îñ��ÊvbgtH[¤jCà_c _Ciú{dMdb() îñ��ÊvbgtH[¤jCÜ\ åiú{dMdb() îñ��ÊvbgtH[¤jC�L ¤iú{dMdb() îñ��ÊvbgtH[¤j
3p[eBé½ÖvZãÌ_u·vgR
üà_c_Ciú{dMdb() îñ��ÊvbgtH[¤jCÜ\åiú{dMdb() îñ��ÊvbgtH[¤jCçc_iiú{dMdb() îñ��ÊvbgtH[¤jC�L¤iú{dMdb() îñ��ÊvbgtH[¤j
ZL
A}b`Oðp��½gDÔNXªÍ
üçc _iiú{dMdb() îñ��ÊvbgtH[¤jCc ëVi()NTThR æiZp¤jCRû Ni()NTThR æiZp¤jCÜ\ åiú{dMdb() îñ��ÊvbgtH[¤jCà_c _Ciú{dMdb() îñ��ÊvbgtH[¤j
dq[vgRÉηé³Ø«Ìèؾ
üÍÓ `Mi¤mHÆåw îñÈwjC^ì iNTTR~
jP[VÈwîb¤jCNc p��iNTTR~
jP[VÈwîb¤jCËc �}ÍiNTTR~
jP[VÈwîb¤j
2C1FÀ | À·Fc \j icä`måwj
LIMðp��½«\]¿@\LIMPMONÌÝv
R{ «¡iªRåwåw@ ©RÈw¤ÈjCRà GiªRåwåw@ ©RÈw¤Èj
¼zvZ@j^ÉæéOÌü�LñÆr¸h~VXeÌñÄÆ]¿
²¡ «çiªRåw åw@©RÈw¤ÈjCRà GiªRåw åw@©RÈw¤Èj
����ðl��µ½[ÉîÃZL
eBÀÌ®I¸è@ÌñÄ
üåvÛ²vixmʤj
vCoVðl��µ½iؾVXeÌÀ
ü�� ñiîñÊM¤@\jC¤ ��ØiîñÊM¤@\jCRº ¾OiHcåwj
ÐQÎôpNEhRs
[eBO«\zÉ�N¯éîñZL
eB��
üc\jicä`måw«îñwjCºäicä`måw«îñwj
QiIªÍÉæéWeb\ñVXeÌZL
eBvªÍè@ÉÂ��Ä
üì GiîñZL
eBåw@åwj
ZL
eBCRXgCÆ�}ÖÌe¿ðl��µ½ÎôIèè@Ì��
²XØjin¿åwåw@Hw¤ÈjC¼º[nin¿åwåw@Hw¤ÈjCÁ¡Oêin¿åwHwjCºgÍ�LÂCin¿åwåw@Hw¤Èj
ÛWÉæéFØ»iÉîÃ��½ZL
eBÎôûjì��ÌñÄ
ü~X JZX MWF IVIin¿åw Hw¤ÈjCºgÍ�L ÂCin¿åw Hw¤Èj
®«Ø¾ðgpµ½ ÀÏ��VXe
üß¡L¾i®ïÐ_ËfW^E{j
¡FØû®É�N¯é½¼FØ»Ì��
M· ªji¤Qåwåw@Hw¤ÈjCbã i¤Qåwåw@Hw¤Èj
An Authentication Protocol with Anonymity against Service Providers and the Central Manager
Toru NakamuraiKyushu UniversityjCShunsuke InenagaiKyushu UniversityjCKensuke BabaiKyushu UniversityjCDaisuke IkedaiKyushu UniversityjCHiroto YasuuraiKyushu Universityj
vLVðp��½½¼FØVXeÌ[Uo^@\yÑÇÕ@\ÌÀ
îì ^çiªRåwåw@©RÈw¤ÈjC¼ ��iªRåwåw@©RÈw¤ÈjCätI M��iªRåwåw@©RÈw¤Èj
IDx[XÃ̽¼ÊMÖÌp
c��Vi¼Ã®HÆåwjCâV¡²êi¼Ã®HÆåwjC¼ö[ui¼Ã®HÆåwj
2D1FvgR | À·F{ê S¡ iC^[lbgCjVAeBuj
RFCɵ½IDx[XÃÌTLSKpÆOpenSSL, Apache HTTP ServerÖÌÀ
jñçi}gåwjCàªWi}gåwjCª{hii}gåwj
gDÔAgðl��µ½½¼IEEE802.1XFØvgRÌÀ
²¡ DõiªRåwåw@©RÈw¤ÈjCA}X_\miªRåwåw@©RÈw¤ÈjC¼ ��iªRåwåw@©RÈw¤ÈjCätI M��iªRåwåw@©RÈw¤Èj
vCoVÛìîñEVXeÉ�N¯éÔîñÌé½ÉÂ��Ä
ü½c üÞqiCåwjCer _¾iCåwj
åKÍf[^x[Xðµ¤vgRÅÌíEÌh~@
\SÆiLs��åwåw@îñÈw¤ÈjCãyäzqiLs��åwåw@îñÈw¤ÈjCáÑ^êiLs��åwåw@îñÈw¤Èj
ÝîÎ�}É�N¯éJ@ãÌÛèyÑZL
eBv̪Í
ü¡º ¾qiNTTîñ��ÊvbgtH[¤jC½c ^êiNTTîñ��ÊvbgtH[¤j
³EõÌîñZL
eBÓ¯üã̽ß̳çÉÖ·éêl@
ü¯ì iiîñZL
eBåw@åwjC�Lc vViîñZL
eBåw@åwj
IT Keys:IT XNy¸Ì½ßÌîñZL
eBZpÒEÇÒç��
üÖviÞÇæ[ÈwZpåw@åwjC¼YmjiÞÇæ[ÈwZpåw@åwjCåÑYîiÞÇæ[ÈwZpåw@åwjC¡ìaiÞÇæ[ÈwZpåw@åwjCÌãa³iÞÇæ[ÈwZpåw@åwjCRûpiÞÇæ[ÈwZpåw@åwjC»�LG��iÞÇæ[ÈwZpåw@åwjCìPviåãåwjCì²iåãåwjCªº^áiÞÇHÆêåwZCåãåwjClÓiåãåwjCªõjisåwjCã�LN¾YisåwjCå½iisåwjCÂczêik¤æ[ÈwZpåw@åwjC{n[qik¤æ[ÈwZpåw@åwjCÊa��ik¤æ[ÈwZpåw@åwj
Report on the First ACM Summer School on Information Security and Protection
Jingyu HuaiKyushu UniversityjCKouichi SakuraiiKyushu Universityj
��
E¼\EÌÓE߸ðh®KIFÂè@
üÎ_ ziZRijIS¤jC¼i ¹_iZRijIS¤jCì viZRijJZ^[j
îñZL
eBXNÌFmÆs®Ìf»
ü¡c MFiú{dMdb®ïÐj
lbgEZL
eBÉ�N¯éusÀvÌÛär
üÖJ¼çimåwÐïwjC�L³Ç¾iåwåw@îñwÂjC��}�L·_iåwåw@îñwÂjCº��imåwÐïwjC�L¤iNTTîñ��ÊvbgtH[¤jCÔ`��FiNTTîñ��ÊvbgtH[¤jCR{¾YiNTTîñ��ÊvbgtH[¤jCçt¼qiNTTîñ��ÊvbgtH[¤j
C^[lbgpÉ�N¯ésÀÉÖ·éÛär\CGM^lbgVbsOÉÖ·é®\
üR{¾Yiú{dMdb®ïÐ NTTîñ��ÊvbgtH[¤jCçt¼qiú{dMdb®ïÐ NTTîñ��ÊvbgtH[¤jCÔ`��Fiú{dMdb®ïÐ NTTîñ��ÊvbgtH[¤jC�L¤iú{dMdb®ïÐ NTTîñ��ÊvbgtH[¤jCÖJ¼çimåw ÐïwjCº��imåw ÐïwjC��}�L·_iåwåw@ îñwÂjC�L³Ç¾ iåwåw@ îñwÂj
UMLðp��½i^XNªÍè@ÆóÔJÚXNfÖÌp
üÁ¡Oêin¿åwHwjC²XØjin¿åwåw@Hw¤ÈjC¼º[nin¿åwåw@Hw¤ÈjCºgÍ�LÂCin¿åwåw@Hw¤Èj
wZÉ�N¯é³tEÛìÒÌvCoVÌ�L��ûÉַ鲸
ü¡�L NGiâè����åw \tgEFAîñwjCºR Dqiâè����åw \tgEFAîñwj
îñZL
eBÉÖ·éÀS�LÉ�N¯é¿âÌÚ��̽ßÌWeb²¸
¼ªåiâè����åwåw@jC¡�LNGiâè����åwåw@jCºRDqiâè����åwåw@j
Uèß¼\ÖÌ»ÀIÈÎôÉÂ��ÄÌ��
R{ iêåwn��ÈwZpåw@jCÁ¡ xviêåwn��ÈwZpåw@jC¼_ ³iêåwn��ÈwZpåw@j
}EFA®IðÍICT[rXÌÆã«i»ÌQj
}Ô MOi¡l��åwjCDä Bi¡l��åwjCgª ��i¡l��åwjC¼{ �~i¡l��åwj
t@CANZXOðp��½[Ìm
üi EiîñZL
eBåw@åwj
Evaluating SMS as a Medium for Botnet Command and Control
Jingyu HuaiKyushu UniversityjCKouichi SakuraiiKyushu Universityj
Report on the 7th Conference on Detection of Intrusions and Malware & Vulnerabilities Assessment (DIMVA 2010)
Jingyu HuaiKyushu UniversityjCKouichi SakuraiiKyushu Universityj
Fuzzy Commitment SchemeɤʹºfðKpµ½��Ì®����è@
É¡ �}piîcåwHwp@jCåØ NjiîcåwHwp@jC��¼ ®viîcåwHwp@j
Å����Ggs[ðp��½øÊîñÌîñÊ]¿ÉÖ·éêl@
Ôö ¼Fiîcåwî²HwjCâcì �LÇiîcåwî²HwjCåØ Njiîcåwî²HwjC��¼ ®viîcåwî²Hwj
ñÚG^��äFØðp��½[gFØVXeÌñÄÆ]¿
ü¾c zîiijKDDI¤jCnÓ �LiijKDDI¤jCÉ¡ Nêikåw åw@îñÈw¤ÈjCc rºiijKDDI¤jCÂØ F��ikåw åw@îñÈw¤Èj
}`^b`XN[ðpµ½FØû®ÌñÄ
àVº²uiâè����åwåw@ \tgEFAîñw¤ÈjC��c��Piâè����åwåw@ \tgEFAîñw¤ÈjCìnãùGiâè����åwåw@ \tgEFAîñw¤ÈjCÁ¡Miiâè����åwåw@ \tgEFAîñw¤ÈjCxbhB. rX^iâè����åwåw@ \tgEFAîñw¤ÈjCcLYiâè����åwåw@ \tgEFAîñw¤Èj
Cryptographic Cloud Storage with Fine-grained and Flexible Access Control
üFangming ZhaoiToshiba Corporate Research & Development Center / Kyushu UniversityjCTakashi NishideiDept. of Computer Science and Communication Engineering, Kyushu UniversityjCKouichi SakuraiiDept. of Computer Science and Communication Engineering, Kyushu Universityj
NEhÉ�N¯éf[^é½EÇÕZpÆ»Ìp
üÐR À\ixmʤ ZL
ARs
[eBO¤jC ^ixmʤ ZL
ARs
[eBO¤jC��N ��Fixmʤ ZL
ARs
[eBO¤jCÃc Gixmʤ \tgEFA\
[V¤j
ZL
eBEAEGAENEhFTOÆf
ü²¡üsiåwjCàäÖi@åwjCJ{ξiçtHÆåwj
öIICJ[hðpµ½ãÃ@Ö©çÌÛ¯imFû@Ì��
ü��öjiHåEåw@Hw¤ÈjC{ÔSiHåEÐïîñ��ÊîÕ¤Z^[jCåRiºiHåEîñHw¤j
FeliCaÌpððp��½ÂlFØ
¼º q²idCÊMåw åw@jC��r p��idCÊMåw åw@j
OpenIDÉ�N¯é®«îñÌo^ÆpÉÖ·éñÄ
ü`èiYiÈåwjCOcç¿iÈåwjCâº�NsiÈåwj
OpenIDÉ�N¯éIDp�}ÌñÄ
Oc ç¿iÈåwjC`è iYiÈåwjC⺠�NsiÈåwj
[vbgtH[ZpÉ�N¯éFØè@
ünÓ �Li®ïÐKDDI¤jCì Loi®ïÐKDDI¤jCc rºi®ïÐKDDI¤j
õGWðpµ½««TCgURLÌß�~TõÉæéubNXgÌg��
üHRºiNTTîñ��ÊvbgtH[¤jCªØBiNTTîñ��ÊvbgtH[¤jCÉ¡õ�}iNTTîñ��ÊvbgtH[¤j
Îb^Webnj[|bgÉ�N¯éUðÍû®ÌüP
üªØ BiNTTîñ��ÊvbgtH[¤jCJ{ ¼liNTTîñ��ÊvbgtH[¤jCj�� jiNTTîñ��ÊvbgtH[¤jCÉ¡ õ�}iNTTîñ��ÊvbgtH[¤j
ü�LñTCg©®mVXeDICEÌJÆ]¿
c BÆid@åwjCcº CãiZCR[Gv\®ïÐjCbã r��ipi\jbNdH®ïÐjC²XØ Çêid@åwj
DNSÆWebuEU𦲳¹½WebANZX��äû®RequestPolicyFrameworkÌñÄ
Aº jid@åwjCûüØãľid@åwjCc BÆid@åwjC��{c Dîimdb\tg®ïÐjC²XØ Çêid@åwj
uEUÌAhIðpµ½AhEFAÌUé��ðÍ
J³��icä`måwjCÍìñicä`måwCCREST/JSTj
Ùímè@ðp��½HTMLàÌXNvgCWFNVm
üÎc¤iú{ACEr[EG®ïÐjCgà_²mqiú{ACEr[EG®ïÐjCY{¼Fiú{ACEr[EG®ïÐj
WebTCgÖÌ}EFA�LõUÉÖ·éÀÔ²¸
üJ{¼liú{dMdb®ïÐjCªØBiú{dMdb®ïÐjCj��jiú{dMdb®ïÐjCÉ¡õ�}iú{dMdb®ïÐj
1021úiØj
MÅ«éIDÆêIÉs³ê½IDðµ½ãÇÕÂ\«ðL·éyAOÉîîm��vgR
áen IiòåwjCÑ öüiòåwjCÎ P¾i¼Ã®HÆåwjCyä miîñZL
eBåw@åwj
IDx[XÃðpµ½Webx[Xt@CóMVXeÌÀS«ÉÖ·él@
ìº i¼Ã®HÆåwjCÎ P¾i¼Ã®HÆåwjCyä miîñZL
eBåw@åwjCÑ öüiòåwjCc m¡i¤m³çåwjCâc ²i¼Ã®HÆåwj
JÌ齫ðÂOJ@\t«^C[XÃÌêÊIÈ\��@
¼c ²GiåwjC¼Y ²¾iåwj
¡[U[ÅpÂ\ÈàÏqêõÂ\Ã
ügcí��iNTTîñ��ÊvbgtH[¤jCiä²iNTTîñ��ÊvbgtH[¤jC��ÑS¾YiNTTîñ��ÊvbgtH[¤j
3B2FÃEdq¼(2) | À·F�N ¾ iö��Í�}¾Ä��åwj
Improving Efficiency in Automated Trust Negotiation with Conjunctive Policies
Tangtisanon PikulkaewiGraduate School of Engineering, Tokai UniversityjCKikuchi HiroakiiGraduate School of Engineering, Tokai Universityj
Improvement of CVP-based Lattice Cryptosystem
üMasayuki YoshinoiHitachi, Ltd., Systems Development LaboratoryjCNoboru KunihiroiThe University of TokyojCHisayoshi SatoiHitachi, Ltd., Systems Development LaboratoryjCKen NaganumaiHitachi, Ltd., Systems Development Laboratoryj
AL
[^ðp��½¸øÂ\O[v¼û®ÌöJ®TCYÌá¸
r¾ åMiªRåwåw@©RÈw¤ÈjC¼ ��iªRåwåw@©RÈw¤ÈjCätI M��iªRåwåw@©RÈw¤Èj
Efficient Proofs of Attributes in Anonymous Credential Systems Using a Pairing-Based Accumulator
Amang SudarsonoiGraduate School of Natural Science and Technology, Okayama UniversityjCToru NakanishiiGraduate School of Natural Science and Technology, Okayama UniversityjCNobuo FunabikiiGraduate School of Natural Science and Technology, Okayama Universityj
A New Privacy Enhancing Method for Personalized Search
Yunsang OhiTokyo Institute of TechnologyjCHyoungshick KimiUniversity of CambridgejCTakashi ObiiTokyo Institute of Technologyj
[U ÀÉ��½vCoV[Ûìf[^}CjOû®
üÉ¡ FêixmʤjCc è��bixmʤjC��N ��FixmʤjCÃc Gixmʤj
X}[gObhÉ�N¯éùvÆÌvCoV[ðÛì·éîññû®
·àV IMi¼Ã®HÆåwjCÎ P¾i¼Ã®HÆåwjCÑ öüiòåwjCc m¡i¤m³çåwj
Differential Privacy ÌIðÍ
üÜ\ åiNTTîñ��ÊvbgtH[¤jCçc _iiNTTîñ��ÊvbgtH[¤jC�L ¤iNTTîñ��ÊvbgtH[¤j
Pl-½l«F®«èÉηéÄ\z@ÌvCoV[ÌèÊ»
üÜ\ åiNTTîñ��ÊvbgtH[¤jCçc _iiNTTîñ��ÊvbgtH[¤jC�L ¤iNTTîñ��ÊvbgtH[¤j
Extended Fingerprinting Attack on Tor with Time Characteristics and Defense Mechanism
Yi ShiiInstitute of Industrial Science, The University of TokyojCüKanta MatsuuraiInstitute of Industrial Science, The University of Tokyoj
¼zWX^ÊMðp��½LæP2Plbg[NϪf[^@\Ì»
üÀ¡ÞiîñÊM¤@\jCåÑYîiîñÊM¤@\jCÂczêik¤æ[ÈwZpåw@åwj
ÊMÌäç��É
Úµ½}`vC[ICQ[É�N¯éBot vC[mè@ÌñÄ
X á©TiÞÇæ[ÈwZpåw@åwjCªc açiÞÇæ[ÈwZpåw@åwjC\R ��ÍiÞÇæ[ÈwZpåw@åwjCåÑ YîiÞÇæ[ÈwZpåw@åwj
ChordÉ�N¯éSybil Nodemè@ÌñÄÆ]¿
¤ úÏiÞÇæ[ÈwZpåw@åw îñÈw¤ÈjCªc açiÞÇæ[ÈwZpåw@åw îñÈw¤ÈjCGregory BlanciÞÇæ[ÈwZpåw@åw îñÈw¤ÈjCc iÞÇæ[ÈwZpåw@åw îñÈw¤ÈjCRû piÞÇæ[ÈwZpåw@åw îñÈw¤Èj
DNSÆÌAgÉæé®It@CAEH[VXeÌñÄ
üRä ��ÇiªRåwjCà EiªRåwjCªR ¹FiªRåwjCÍì \¾iªRåwjCº fTi��îñw¤j
{bglbgÇÕ«]¿V~
[^Éæén[_[PCÇÕÂ\«Ì]¿
¼_Fºid@åwjCbãr��ipi\jbNdH®ïÐjC²XØÇêid@åwj
ZL
eBÓ¯üã̽ßÌlbg[NÊMo»Q[ÌÝvÆÀ
ªpNicä`måw«îñwjCã�LYMicä`måwåw@ôEfBA¤ÈjC
J³cicä`måwåw@ôEfBA¤ÈjCc\jicä`måw«îñwj
foCXîñûWÉæépÒÌÇÕVXeÌì
ã�LYMicä`måwåw@ôEfBA¤ÈjC
J³cicä`måwåw@ôEfBA¤ÈjCc\jicä`måw«îñwjCºäicä`måw«îñwj
Flash cookieÌpÀÔÉַ鲸
g�Lå¹icä`måw«îñwjCsìîicä`måw«îñwjCã�LYMicä`måwåw@ôEfBA¤ÈjCd¼MFicä`måwåw@ôEfBA¤ÈjCc\jicä`måw«îñwj
m¦IpPbg}[LOÉ�N¯éÅK}[LOm¦Ìè
üªc ëVi}gåwåw@jCઠWi}gåwjCì �~¡iú{IBMjCª{ hii}gåwj
An Access Control Model using Feature Structures
üKunihiko FujitaiNTT Communication Science Laboratories, NTT CorporationjCYasuyuki TsukadaiNTT Communication Science Laboratories, NTT Corporationj
ANZX ÀÌRt¯ÉæéXg[WÉ�N¯éANZX��äû®ÌñÄ
üì O��iZR®ïÐIS¤j
t@CT[oQÉæé��ANZX��ä
üNë Niijú��»ìjCNä KêiãBåwåw@j
IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy 2010 ïcQÁñ
ü¼o²uiãBåwjCAmril SyalimiãBåwjCNäKêiãBåwj
lbg[NZL
eBÆEÉ�N¯éYÆÆwpÌMbvÉÖ·éêl@
üઠWi}gåwj
íªÌ{lmFÉÖ·é@Ì»óÆÛè
ü{ìJviîñi@\jC¼{�~iîñi@\jC{ì«miVåwj
gDÌITZL
eBÎôifÉæéZL
eBá̪Í
üY¹idCÊMåwCú{dCCîñi@\jCzKFidCÊMåwjC¾cqidCÊMåwj
Defending Academic Networks: The Organizational Implications
üKenji RIKITAKEiAcademic Center for Computing and Media Studies (ACCMS), Kyoto Universityj
ITXNÎôÉÖ·éÐïIÓ`��xVXeSocial-MRCÌvgJÆKp
Øê��id@åwjCåÍ�LDid@åwjCRcYåid@åwjC²XØÇêid@åwjCîhmid@åwjCcpFid@åwjC��ÑNYi��îñw¤j
3F1FD3M | À·FOî D iKDDI¤j
hCîñÉ
Úµ½««WebTCgÌ®Xü²¸ÆÖA«ªÍ
ËYiãBåwåw@VXeîñÈw{jCx DziãBåwåw@VXeîñÈw{jCNä KêiãBåwåw@VXeîñÈw{j
mðÚwµ½s³_CNg̪Í
üc zixmʤjCÃì ixmʤjCp F��ixmʤjC¹ åixmʤj
pXV[PXÉîÃDrive-by-Download U̪Þ
K�LaçiCåwåw@jCÀ¡åiåwåw@jC¡�L«uiú��»ìjCer_¾iCåwjCc^qiú��»ìjCæâ WPiåwåw@j
Àst@CÉÜÜêé��ñÌwKÉîÃ}EFAoû@
Ë amiîcåw î²Hw¤È îñHwêUjCX BÆiNTTT[rXCeO[VîÕ¤jCçt åIiîcåw î²Hw îñHwÈjCºc WOiîcåw î²Hw¤È îñHwêUjCã¡ ��iîcåw î²Hw¤È îñHwêUj
3F2FUÊMf[^ | À·FéØ u iC^[lbgCjVAeBuj
ÊMOðîɵ½}EFAzzIy[VÌoÆ»ÌÝ
XvaºiÞÇæ[ÈwZpåw@åwjC_{^liÞÇæ[ÈwZpåw@åwjC_cTçiÞÇæ[ÈwZpåw@åwjCGregory BlanciÞÇæ[ÈwZpåw@åwjCåÑYîiÞÇæ[ÈwZpåw@åwj
lbg[NãÌ��É
Úµ½}EGAÌzuÉÖ·éêl@
üp F��i®ïÐ xmʤjCc zi®ïÐ xmʤjC¹ åi®ïÐ xmʤj
Uf[^(CCCDataset2010)ðpµ½{bglbgÌC&CT[oÁèè@ÌÄ]¿
º �NGid@åwjC¼_ Fºid@åwjCc BÆid@åwjCO�L ³i®ïÐNTTPCR~
jP[VYjC²XØ Çêid@åwj
CCC DATAset É�N¯éAg·é}EFAÌÏJ
åÞ«ViCåwåw@jCer_¾iCåwåw@jCc^qiú��»ì Hitachi Incident Response Team (HIRT)jCNur Rohman RosyidiNbg¤JoHÈåwj
JÃê | 3FzCG | | |
JÃúÔ | 1019úiÎj | 14:00-17:00 | fXg[VE|X^[W¦ |
| 1020úi
j | 10:00-16:05 | fXg[VE|X^[W¦ |
| | 16:05-17:05 | fXg[VZbV�NæÑfXg[VE|X^[W¦ |
DPS-01Fudqt@CÌ��o³ÌÁèÉp��édq��©µf[^»@vifj
YÆZp¤@îñZL
eB¤Z^[
DPS-02FuNEhRs
[eBOÉ�N¯éZL
eB̤vi|X^[j
d@åwåw@ îñ«w¤È îñ«wêU
DPS-03FuA^CfL^Éε½�L{«ÛØZpvifj
xmʤ
DPS-04FufBh~û®É�N¯éÔOJbgtB^UÖÌÎôvifj
¤åw@åwCV[v®ïÐC��îñ¤
DPS-05FudÝt«Kw^Ï»_oû®Ì«\]¿|A[gÉηédÝt¯ÌLø«Ì��|vi|X^[j
ªRåwåw@©RÈw¤ÈCú{dC
DPS-06FuBlink: P2Plbg[NϪE»VXevifj
îñÊM¤@\îñÊMZL
eB¤Z^[
DPS-07FuPSML:ÂÊAhXsÉæéXp[h~@\ðõ¦½[OXgVXevifj
ãBåwåw@VXeîñÈw{CãBæ[ÈwZp¤
DPS-08FuUú®mè@Ì��»E¸�~»Zp̤Jvi|X^[j
ãBåwåw@VXeîñÈw¤@CãBæ[ÈwZp¤
DPS-09FuWeb x[X}EFAðÍVXeÌÐîvifj
®ïÐbNCåwåw@Hw¤È