Journal: IEICE Transactions

Volume 94-D, Issue 11

2067 -- 2068Yutaka Miyake. Foreword
2069 -- 2076Chia-Yin Lee, Zhi-Hui Wang, Lein Harn, Chin-Chen Chang. Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
2077 -- 2086Heung-Youl Youm. Overview of Traceback Mechanisms and Their Applicability
2087 -- 2094Masakatu Morii, Yosuke Todo. Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP
2095 -- 2110SeongHan Shin, Kazukuni Kobara, Hideki Imai. Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
2111 -- 2118Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka. Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
2119 -- 2128Ping Du, Akihiro Nakao. Rethinking Business Model in Cloud Computing: Concept and Example
2129 -- 2138Yuan-Cheng Lai, Ying-Dar Lin, Fan-Cheng Wu, Tze-Yau William Huang, Frank C. Lin. Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks
2139 -- 2149Nur Rohman Rosyid, Masayuki Ohrui, Hiroaki Kikuchi, Pitikhate Sooraksa, Masato Terada. Analysis on the Sequential Behavior of Malware Attacks
2150 -- 2158Junji Nakazato, Jungsuk Song, Masashi Eto, Daisuke Inoue, Koji Nakao. A Novel Malware Clustering Method Using Frequency of Function Call Traces in Parallel Threads
2159 -- 2166Gregory Blanc, Youki Kadobayashi. A Step towards Static Script Malware Abstraction: Rewriting Obfuscated Script with Maude
2167 -- 2170Eun-Jun Yoon, Kee-Young Yoo. Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
2171 -- 2172Fagen Li, Jiang Deng, Tsuyoshi Takagi. An Improved Authenticated Encryption Scheme
2173 -- 2183Yuanwu Lei, Yong Dou, Jie Zhou. FPGA-Specific Custom VLIW Architecture for Arbitrary Precision Floating-Point Arithmetic
2184 -- 2190Cheng-Min Lin, Shyi-Shiou Wu, Tse-Yi Chen. Modeling and Analysis for Universal Plug and Play Using PIPE2
2191 -- 2200Gyeongyeon Kang, Yoshiaki Taniguchi, Go Hasegawa, Hirotaka Nakano. Parameter Tuning of the Protocol Interference Model Using SINR for Time Slot Assignment in Wireless Mesh Networks
2201 -- 2211Yuta Nakashima, Ryosuke Kaneto, Noboru Babaguchi. Indoor Positioning System Using Digital Audio Watermarking
2212 -- 2218Chuanjun Ren, Xiaomin Jia, Hongbing Huang, Shiyao Jin. Analyzing Emergence in Complex Adaptive System: A Sign-Based Model of Stigmergy
2219 -- 2226Won-Gyo Jung, Sang-Sung Park, Dong-Sik Jang. Patent Registration Prediction Methodology Using Multivariate Statistics
2227 -- 2233Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuka. A Supervised Classification Approach for Measuring Relational Similarity between Word Pairs
2234 -- 2243Liang Sun, Shinichi Yoshida, Yanchun Liang. A Support Vector and K-Means Based Hybrid Intelligent Data Clustering Algorithm
2244 -- 2249Takanori Ayano. C)-Smooth Regression Functions
2250 -- 2258Masami Akamine, Jitendra Ajmera. Decision Tree-Based Acoustic Models for Speech Recognition with Improved Smoothness
2259 -- 2270Seung-Wan Jung, Young Jin Nam, Dae-Wha Seo. Amortized Linux Ext3 File System with Fast Writing after Editing for WinXP-Based Multimedia Application
2271 -- 2279Bin Shyan Jong, Chi-Kang Kao, Juin-Ling Tseng, Tsong Wuu Lin. Compression of Dynamic 3D Meshes and Progressive Displaying
2280 -- 2283Haoru Su, Sunshin An. Multi-Dimensional Channel Management Mechanism to Avoid Reader Collision in Dense RFID Networks
2284 -- 2287Shize Guo, Zhe-Ming Lu, Zhe Chen, Hao Luo. Strength-Strength and Strength-Degree Correlation Measures for Directed Weighted Complex Network Analysis
2288 -- 2292Jeong-Hoon Lee, Yoon-Joon Lee. Concept Drift Detection for Evolving Stream Data