Vol. E91-D, No. 5 May 2008

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Foreword

FOREWORD PDF
Koji NAKAO 1225-1225

Letters

Security Analysis of Yeh-Tsai Security Mechanism PDF
Dae Hyun YUM, Jong Hoon SHIN, Pil Joong LEE 1477-1480
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications PDF
Taek-Young YOUN, Young-Ho PARK, Taekyoung KWON, Soonhak KWON, Jongin LIM 1481-1484
Reliable Key Distribution Scheme for Lossy Channels PDF
Ryuzou NISHI, Yoshiaki HORI, Kouichi SAKURAI 1485-1488
Generalized Combinatoric Accumulator PDF
Dae Hyun YUM, Jae Woo SEO, Pil Joong LEE 1489-1491
Kernel TV-Based Quotient Image Employing Gabor Analysis and Its Application to Face Recognition PDF
GaoYun AN, JiYing WU, QiuQi RUAN 1573-1576
Approximating the Best Linear Unbiased Estimator of Non-Gaussian Signals with Gaussian Noise PDF
Masashi SUGIYAMA, Motoaki KAWANABE, Gilles BLANCHARD, Klaus-Robert MULLER 1577-1580
Noise Robust Motion Refinement for Motion Compensated Noise Reduction PDF
Jong-Sun KIM, Lee-Sup KIM 1581-1583
Automatic Acronym Dictionary Construction Based on Acronym Generation Types PDF
Yeo-Chan YOON, So-Young PARK, Young-In SONG, Hae-Chang RIM, Dae-Woong RHEE 1584-1587

Papers

UDP Large-Payload Capability Detection for DNSSEC PDF
Kenji RIKITAKE, Koji NAKAO, Shinji SHIMOJO, Hiroki NOGAWA 1261-1273
IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks PDF
Ping DU, Shunji ABE 1274-1281
A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System PDF
Jungsuk SONG, Kenji OHIRA, Hiroki TAKAKURA, Yasuo OKABE, Yongjin KWON 1282-1291
Adaptive Bloom Filter: A Space-Efficient Counting Algorithm for Unpredictable Network Traffic PDF
Yoshihide MATSUMOTO, Hiroaki HAZEYAMA, Youki KADOBAYASHI 1292-1299
Toward a Scalable Visualization System for Network Traffic Monitoring PDF
Erwan LE MALECOT, Masayoshi KOHARA, Yoshiaki HORI, Kouichi SAKURAI 1300-1310
A Proposal of TLS Implementation for Cross Certification Model PDF
Tadashi KAJI, Takahiro FUJISHIRO, Satoru TEZUKA 1311-1318
OpenIKEv2: Design and Implementation of an IKEv2 Solution PDF
Alejandro Perez MENDEZ, Pedro J. Fernandez RUIZ, Rafael Marin LOPEZ, Gregorio Martinez PEREZ, Antonio F. Gomez SKARMETA, Kenichi TANIUCHI 1319-1329
Efficient Implementation of the Pairing on Mobilephones Using BREW PDF
Motoi YOSHITOMI, Tsuyoshi TAKAGI, Shinsaku KIYOMOTO, Toshiaki TANAKA 1330-1337
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote PDF
Seog Chung SEO, Dong-Guk HAN, Hyung Chan KIM, Seokhie HONG 1338-1347
Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information PDF
Mitsuo OKADA, Hiroaki KIKUCHI, Yasuo OKABE 1348-1358
Practical, Real-Time, and Robust Watermarking on the Spatial Domain for High-Definition Video Contents PDF
Kyung-Su KIM, Hae-Yeoun LEE, Dong-Hyuck IM, Heung-Kyu LEE 1359-1368
Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication PDF
Davar PISHVA 1369-1379
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems PDF
Masashi UNE, Akira OTSUKA, Hideki IMAI 1380-1389
Copyright Protection for Modifiable Digital Content Based on Distributed Environment PDF
Heejae PARK, Jong KIM 1390-1397
A Secure Content Delivery System Based on a Partially Reconfigurable FPGA PDF
Yohei HORI, Hiroyuki YOKOYAMA, Hirofumi SAKANE, Kenji TODA 1398-1407
A Low Cost Key Agreement Protocol Based on Binary Tree for EPCglobal Class 1 Generation 2 RFID Protocol PDF
Albert JENG, Li-Chung CHANG, Sheng-Hui CHEN 1408-1415
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry PDF
Hisashi MOHRI, Ritsuko MATSUMOTO, Yuichi KAJI 1416-1423
RSA-Based Password-Authenticated Key Exchange, Revisited PDF
SeongHan SHIN, Kazukuni KOBARA, Hideki IMAI 1424-1438
Evaluation of Information Leakage via Electromagnetic Emanation and Effectiveness of Tempest PDF
Hidema TANAKA 1439-1446
Security Violation Detection for RBAC Based Interoperation in Distributed Environment PDF
Xinyu WANG, Jianling SUN, Xiaohu YANG, Chao HUANG, Di WU 1447-1456
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way PDF
Yang CUI, Kazukuni KOBARA, Kanta MATSUURA, Hideki IMAI 1457-1465
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions PDF
Takahiro MATSUDA, Nuttapong ATTRAPADUNG, Goichiro HANAOKA, Kanta MATSUURA, Hideki IMAI 1466-1476
A Specification Translation from Behavioral Specifications to Rewrite Specifications PDF
Masaki NAKAMURA, Weiqiang KONG, Kazuhiro OGATA, Kokichi FUTATSUGI 1492-1503
Design of Content-Based Publish/Subscribe Systems over Structured Overlay Networks PDF
Shou-Chih LO, Yi-Ting CHIU 1504-1511
Robust Watermarking of 3D Polygonal Meshes PDF
Han Sae SONG, Nam Ik CHO 1512-1521
Ears of the Robot: Direction of Arrival Estimation Based on Pattern Recognition Using Robot-Mounted Microphones PDF
Naoya MOCHIKI, Tetsuji OGAWA, Tetsunori KOBAYASHI 1522-1530
Task Recognition and Person Identification in Cyclic Dance Sequences with Multi Factor Tensor Analysis PDF
Manoj PERERA, Takaaki SHIRATORI, Shunsuke KUDOH, Atsushi NAKAZAWA, Katsushi IKEUCHI 1531-1542
Automatic Facial Skin Segmentation Based on EM Algorithm under Varying Illumination PDF
Mousa SHAMSI, Reza Aghaiezadeh ZOROOFI, Caro LUCAS, Mohammad Sadeghi HASANABADI, Mohammad Reza ALSHARIF 1543-1551
On the Use of Structures for Spoken Language Understanding: A Two-Step Approach PDF
Minwoo JEONG, Gary Geunbae LEE 1552-1561
A Sieving ANN for Emotion-Based Movie Clip Classification PDF
Saowaluk C. WATANAPA, Bundit THIPAKORN, Nipon CHAROENKITKARN 1562-1572

Invited Papers

Safe and Secure Services Based on NGN PDF
Tomoo FUKAZAWA, Takemi NISASE, Masahisa KAWASHIMA, Takeo HARIU, Yoshihito OSHIMA 1226-1233
Hybrid Intrusion Forecasting Framework for Early Warning System PDF
Sehun KIM, Seong-jun SHIN, Hyunwoo KIM, Ki Hoon KWON, Younggoo HAN 1234-1241
Integrity Management Infrastructure for Trusted Computing PDF
Seiji MUNETOH, Megumi NAKAMURA, Sachiko YOSHIHAMA, Michiharu KUDO 1242-1251
Efficient Fingercode Classification PDF
Hong-Wei SUN, Kwok-Yan LAM, Dieter GOLLMANN, Siu-Leung CHUNG, Jian-Bin LI, Jia-Guang SUN 1252-1260