Special Issue on Network Security
Vol. 58 Nos. 3/4
Special issue
1
Introduction: The Research of the Information Security Research Center
TAKAHASHI Yukio
2
Network Security Incident Response Technology
2-1
Overview of R&D Activities on nicter
NAKAO Koji and INOUE Daisuke
2-2
An Incident Analysis Center "nicter" and its Social Commitment
ETO Masashi and TAKAGI Yaichiro
2-3
nicter Report
—Transition Analysis of Cyber Attacks Based on Long-term Observation—
NAKAZATO Junji and OHTAKA Kazuhiro
2-4
Clustering and Feature Selection Methods for Analyzing Spam Based Attacks
SONG Jungsuk
2-5
DAEDALUS: Practical Alert System Based on Large-scale Darknet Monitoring for Protecting Live Networks
SUZUKI Mio and INOUE Daisuke
2-6
Development and Evaluation of NIRVANA: Real Network Traffic Visualization System
SUZUKI Koei, ETO Masashi, and INOUE Daisuke
2-7
Achievements List
3
Traceable Network Technology
3-1
Research and Development of Traceable Network Technology
KADOBAYASHI Youki
3-2
Data Mining over Network Streams
BAN Tao and KADOBAYASHI Youki
3-3
Studies on Countermeasures for Thwarting Spoofing Attacks
—Cases of IP Address Spoofing and Web Spoofing—
MIYAMOTO Daisuke, HAZEYAMA Hiroaki, and KADOBAYASHI Youki
3-4
Towards Traceable Overlay Network over Virtualized Systems
ANDO Ruo
3-5
Cybersecurity Information Exchange Techniques: Cybersecurity Information Ontology and CYBEX
TAKAHASHI Takeshi and KADOBAYASHI Youki
3-6
Toward Realizing Privacy-Preserving IP-Traceback
NOJIMA Ryo
3-7
Reproduction and Emulation Technologies for Researches on Secure Networking
MIWA Shinsuke
3-8
Achievements List
4
Security Fundamentals Technology
4-1
Research Activity on Security Fundamentals Technology
TANAKA Hidema
4-2
Research Activities on Proxy Cryptosystems and Homomorphic Encryption Schemes
WANG Lihua
4-3
A Survey on Oblivious Transfer Protocols
Le Trieu Phong
4-4
Researches on Cryptographic Protocols
—Standardization and Global Collaborations—
MATSUO Shin'ichiro and OHKUBO Miyako
4-5
Research Activity of Quantum Security
WASEDA Atsushi
4-6
Solving a Discrete Logarithm Problem via Function Field Sieve (FFS)
SHINOHARA Naoyuki, WANG Lihua, and MATSUO Shin'ichiro
4-7
Security Evaluation of Cryptographic Technology
TANAKA Hidema
4-8
Electromagnetic Security
TANAKA Hidema
4-9
CRYPTREC Activities
KUROKAWA Takashi and KANAMORI Sachiko
List of Published Presentation Papers