765 | -- | 0 | Kouichi Sakurai. Foreword |
766 | -- | 776 | Heung-Youl Youm. Extensible Authentication Protocol Overview and Its Applications |
777 | -- | 786 | Hsiao-Chien Tsai, Nai-Wei Lo, Tzong-Chen Wu. A Threshold-Adaptive Reputation System on Mobile Ad Hoc Networks |
787 | -- | 798 | Koji Nakao, Daisuke Inoue, Masashi Eto, Katsunari Yoshioka. Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring |
799 | -- | 809 | Yong Tang, Jiaqing Luo, Bin Xiao, Guiyi Wei. Concept, Characteristics and Defending Mechanism of Worms |
810 | -- | 817 | Youngho Park, Kyung Hyune Rhee. An Authenticated On-Demand Routing Protocol with Key Exchange for Secure MANET |
818 | -- | 825 | Tae Dempsey, Gokhan Sahin, Yu T. Morton. Intelligent Sensing and Classification in DSR-Based Ad Hoc Networks |
826 | -- | 835 | Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori. Development of Single Sign-On System with Hardware Token and Key Management Server |
836 | -- | 850 | Sachiko Yoshihama, Takaaki Tateishi, Naoshi Tabuchi, Tsutomu Matsumoto. Information-Flow-Based Access Control for Web Browsers |
851 | -- | 858 | Su-Wan Park, Sang Uk Shin. An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding |
859 | -- | 875 | Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai. A Trade-off Traitor Tracing Scheme |
876 | -- | 887 | Shuhui Hou, Tetsutaro Uehara, Takashi Satoh, Yoshitaka Morimura, Michihiko Minoh. Fingerprinting Codes for Internet-Based Live Pay-TV System Using Balanced Incomplete Block Designs |
888 | -- | 896 | Rui Zhang 0002, Hideki Imai. Combining Public Key Encryption with Keyword Search and Public Key Encryption |
897 | -- | 908 | Kouichi Itoh, Dai Yamamoto, Jun Yajima, Wakaha Ogata. Collision-Based Power Attack for RSA with Small Public Exponent |
909 | -- | 917 | Masaaki Shirase, Yukinori Miyazaki, Tsuyoshi Takagi, Dong-Guk Han, Dooho Choi. Efficient Implementation of Pairing-Based Cryptography on a Sensor Node |
918 | -- | 928 | Seog Chung Seo, Dong-Guk Han, Seokhie Hong. TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes |
929 | -- | 936 | Ping Du, Shunji Abe, Yusheng Ji, Seisho Sato, Makio Ishiguro. A Traffic Decomposition and Prediction Method for Detecting and Tracing Network-Wide Anomalies |
937 | -- | 944 | Jun Bi. A Trust Ranking Method to Prevent IM Spam |
945 | -- | 954 | Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao. Automated Malware Analysis System and Its Sandbox for Revealing Malware s Internal and External Activities |
955 | -- | 966 | Katsunari Yoshioka, Daisuke Inoue, Masashi Eto, Yuji Hoshizawa, Hiroki Nogawa, Koji Nakao. Malware Sandbox Analysis for Secure Observation of Vulnerability Exploitation |
967 | -- | 970 | Yang Cui, Goichiro Hanaoka, Hideki Imai. CCA-Secure Public Key Encryption without Group-Dependent Hash Functions |
971 | -- | 0 | Yukiyoshi Kameyama. Foreword |
972 | -- | 984 | Tasuku Nishihara, Takeshi Matsumoto, Masahiro Fujita. Word-Level Equivalence Checking in Bit-Level Accuracy by Synthesizing Designs onto Identical Datapath |
985 | -- | 994 | Bijan Alizadeh, Masahiro Fujita. A Unified Framework for Equivalence Verification of Datapath Oriented Applications |
995 | -- | 1002 | Yoshinori Tanabe, Toshifusa Sekizawa, Yoshifumi Yuasa, Koichi Takahashi. Pre- and Post-Conditions Expressed in Variants of the Modal µ-Calculus |
1003 | -- | 1011 | Toshifusa Sekizawa, Tatsuhiro Tsuchiya, Koichi Takahashi, Tohru Kikuno. Probabilistic Model Checking of the One-Dimensional Ising Model |
1012 | -- | 1021 | Masaki Nakamura, Takahiro Seino. Generating Test Cases for Invariant Properties from Proof Scores in the OTS/CafeOBJ Method |
1022 | -- | 1032 | Kenji Hashimoto, Kimihide Sakano, Fumikazu Takasuka, Yasunori Ishihara, Toru Fujiwara. Verification of the Security against Inference Attacks on XML Databases |
1033 | -- | 1036 | Yoshiaki Takata, Hiroyuki Seki. Comparison of the Expressive Power of Language-Based Access Control Models |
1037 | -- | 1048 | Behrooz Safarinejadian, Mohammad B. Menhaj, Mehdi Karrari. A Distributed Variational Bayesian Algorithm for Density Estimation in Sensor Networks |
1049 | -- | 1061 | Thinh Ngoc Tran, Surin Kittitornkun, Shigenori Tomiyama. PAMELA: Pattern Matching Engine with Limited-Time Update for NIDS/NIPS |
1062 | -- | 1078 | M. M. Hafizur Rahman, Yasushi Inoguchi, Yukinori Sato, Susumu Horiguchi. TTN: A High Performance Hierarchical Interconnection Network for Massively Parallel Computers |
1079 | -- | 1092 | Umaporn Supasitthimethee, Toshiyuki Shimizu, Masatoshi Yoshikawa, Kriengkrai Porkaew. XSemantic: An Extension of LCA Based XML Semantic Search |
1093 | -- | 1102 | Yoichi Yamada, Ken-ichi Hirotani, Kenji Satou, Ken-ichiro Muramoto. An Identification Method of Data-Specific GO Terms from a Microarray Data Set |
1103 | -- | 1124 | Yi Wang, Liang Dong, Taotao Liang, Xinyu Yang, Deyun Zhang. Cluster Based Location-Aided Routing Protocol for Large Scale Mobile Ad Hoc Networks |
1125 | -- | 1136 | Tomoko Izumi, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. A Biologically Inspired Self-Adaptation of Replica Density Control |
1137 | -- | 1145 | Dongwen Ying, Masashi Unoki, Xugang Lu, Jianwu Dang. Speech Enhancement Based on Noise Eigenspace Projection |
1146 | -- | 1158 | Umapada Pal, Kaushik Roy, Fumitaka Kimura. A Lexicon-Driven Handwritten City-Name Recognition Scheme for Indian Postal Automation |
1159 | -- | 1167 | Ali M. Fotouhi, Abolghasem Raie. An Efficient Local Stereo Matching Algorithm for Dense Disparity Map Estimation Based on More Effective Use of Intensity Information and Matching Constraints |
1168 | -- | 1176 | Hiroto Nagayoshi, Yoshitaka Hiramatsu, Hiroshi Sako, Mitsutoshi Himaga, Satoshi Kato. Detection of Fundus Lesions Using Classifier Selection |
1177 | -- | 1180 | Choonhwa Lee, Sunghoon Ko, Eunsam Kim, Wonjun Lee. Enriching OSGi Service Composition with Web Services |
1181 | -- | 1185 | Chul-Woong Yang, Ki Yong Lee, Myoung-Ho Kim, Yoon-Joon Lee. Dynamic Forest: An Efficient Index Structure for NAND Flash Memory |
1186 | -- | 1189 | Yong Zhang, Shensheng Zhang, Songqiao Han. A Fuzzy Control-Based Service Configuration Approach for Ubiquitous Computing Applications |
1190 | -- | 1193 | Do Hyun Kim, Kyoung-Ho Choi, Kyeong Tae Kim, Ki-Joune Li. A Feasibility Study on Crash Avoidance at Four-Way Stop-Sign-Controlled Intersections Using Wireless Sensor Networks |
1194 | -- | 1196 | Helena Rifà -Pous, Jordi Herrera-JoancomartÃ. Cryptographic Energy Costs Are Assumable in Ad Hoc Networks |
1197 | -- | 1199 | Teng Lin, Jianhua Feng, Dunshan Yu. Application-Dependent Interconnect Testing of Xilinx FPGAs Based on Line Branches Partitioning |
1200 | -- | 1203 | Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong-Hoon Lee. Searchable Encryption with ::::Keyword-Recoverability:::: |
1204 | -- | 1208 | Masashi Sugiyama. On Computational Issues of Semi-Supervised Local Fisher Discriminant Analysis |
1209 | -- | 1212 | Yihang Bo, Siwei Luo, Qi Zou. Salient Edge Detection in Natural Images |
1213 | -- | 1217 | Jeunghyun Byun, So-Young Park, Seung Wook Lee, Hae-Chang Rim. Three-Phase Text Error Correction Model for Korean SMS Messages |
1218 | -- | 1221 | Aamir Saeed Malik, Tae-Sun Choi. Differentiating Honeycombed Images from Normal HRCT Lung Images |