Special Issue on Network Security
      Vol. 58 Nos. 3/4
Special issue
1 Introduction: The Research of the Information Security Research Center TAKAHASHI Yukio
2 Network Security Incident Response Technology
  2-1 Overview of R&D Activities on nicter
NAKAO Koji and INOUE Daisuke
  2-2 An Incident Analysis Center "nicter" and its Social Commitment
ETO Masashi and TAKAGI Yaichiro
  2-3 nicter Report
—Transition Analysis of Cyber Attacks Based on Long-term Observation—

NAKAZATO Junji and OHTAKA Kazuhiro
  2-4 Clustering and Feature Selection Methods for Analyzing Spam Based Attacks
SONG Jungsuk
  2-5 DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks
SUZUKI Mio and INOUE Daisuke
  2-6 Development and Evaluation of NIRVANA: Real Network Traffic Visualization System
SUZUKI Koei, ETO Masashi, and INOUE Daisuke
  2-7 Achievements List
3 Traceable Network Technology
  3-1 Research and Development of Traceable Network Technology
KADOBAYASHI Youki
  3-2
Data Mining over Network Streams
BAN Tao and KADOBAYASHI Youki
  3-3 Studies on Countermeasures for Thwarting Spoofing Attacks
—Cases of IP Address Spoofing and Web Spoofing—

MIYAMOTO Daisuke, HAZEYAMA Hiroaki, and KADOBAYASHI Youki
  3-4 Towards Traceable Overlay Network over Virtualized Systems
ANDO Ruo
  3-5 Cybersecurity Information Exchange Techniques: Cybersecurity Information Ontology and CYBEX
TAKAHASHI Takeshi and KADOBAYASHI Youki
  3-6 Toward Realizing Privacy-Preserving IP-Traceback
NOJIMA Ryo
  3-7 Reproduction and Emulation Technologies for Researches on Secure Networking
MIWA Shinsuke
  3-8 Achievements List
4 Security Fundamentals Technology
  4-1 Research Activity on Security Fundamentals Technology
TANAKA Hidema
  4-2 Research Activities on Proxy Cryptosystems and Homomorphic Encryption Schemes
WANG Lihua
  4-3 A Survey on Oblivious Transfer Protocols
Le Trieu Phong
  4-4 Researches on Cryptographic Protocols
—Standardization and Global Collaborations—

MATSUO Shin'ichiro and OHKUBO Miyako
  4-5 Research Activity of Quantum Security
WASEDA Atsushi
  4-6 Solving a Discrete Logarithm Problem via Function Field Sieve (FFS)
SHINOHARA Naoyuki, WANG Lihua, and MATSUO Shin'ichiro
  4-7 Security Evaluation of Cryptographic Technology
TANAKA Hidema
  4-8 Electromagnetic Security
TANAKA Hidema
  4-9 CRYPTREC Activities
KUROKAWA Takashi and KANAMORI Sachiko
List of Published Presentation Papers