IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2011)

Search Results: Keywords 'from:2011-11-14 to:2011-11-14'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 28  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, LOIS 2011-11-14
10:00
Osaka Osaka Electro-Communication University Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction
Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-34 LOIS2011-28
In 2009, Peikert proposed a public-key cryptosystem that is secure against the chosen ciphertext attack. In this cryptos... [more] ISEC2011-34 LOIS2011-28
pp.1-6
ISEC, LOIS 2011-11-14
10:25
Osaka Osaka Electro-Communication University A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-35 LOIS2011-29
In 2010, Kasahara et al. proposed a knapsack cryptosystem secure against a low-density attack.
The cryptosystem were a... [more]
ISEC2011-35 LOIS2011-29
pp.7-12
ISEC, LOIS 2011-11-14
10:50
Osaka Osaka Electro-Communication University On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II)
Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.) ISEC2011-36 LOIS2011-30
 [more] ISEC2011-36 LOIS2011-30
pp.13-17
ISEC, LOIS 2011-11-14
11:15
Osaka Osaka Electro-Communication University An element-selective knapsack cryptosystem with encryption multipliers
Yuki Okada, Akira Hayashi (KIT) ISEC2011-37 LOIS2011-31
The Merkle-Hellman knapsack cryptosystem is known to be vulnerable to the low density attack by Lagarias-Odlyzko. In thi... [more] ISEC2011-37 LOIS2011-31
pp.19-23
ISEC, LOIS 2011-11-14
12:40
Osaka Osaka Electro-Communication University A study on necessary location information accuracy in lifelog
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) ISEC2011-38 LOIS2011-32
Lifelog is a set of captured continuous data records of daily lives. Among those data, location information is one of th... [more] ISEC2011-38 LOIS2011-32
pp.25-32
ISEC, LOIS 2011-11-14
13:10
Osaka Osaka Electro-Communication University Evaluation method for telephone conversations retrieval using precision and recall
Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ) ISEC2011-39 LOIS2011-33
Telephone conversation retrieval systems are required for mail order, help desk and similar telecommunications services.... [more] ISEC2011-39 LOIS2011-33
pp.33-38
ISEC, LOIS 2011-11-14
13:40
Osaka Osaka Electro-Communication University Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation -- Application for Building Energy Management Service --
Minako Toba (Hitachi, Ltd.) ISEC2011-40 LOIS2011-34
knowledge-recommender system, called “Knowledge Recommender,” for business-knowledge sharing is proposed. This system li... [more] ISEC2011-40 LOIS2011-34
pp.39-46
ISEC, LOIS 2011-11-14
14:20
Osaka Osaka Electro-Communication University Three dimensional Dyck Path Cipher
Jun Hashimoto, Akira Hayashi (KIT) ISEC2011-41 LOIS2011-35
The knapsack cryptosystem invented by Merkle and Hellman is known to be insecure against the low density attack of Lagar... [more] ISEC2011-41 LOIS2011-35
pp.47-54
ISEC, LOIS 2011-11-14
14:45
Osaka Osaka Electro-Communication University Hidden Pair of Bijection Signature system (2) -- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-42 LOIS2011-36
The actual parameters as well as the possibility of attack are discussed on the new MPKC signature system "Hidden Pair o... [more] ISEC2011-42 LOIS2011-36
pp.55-60
ISEC, LOIS 2011-11-14
15:10
Osaka Osaka Electro-Communication University Ramp secret sharing scheme based on MBR codes
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University) ISEC2011-43 LOIS2011-37
Some Ramp secret sharing system based on minimum bandwidth regenerating code(MBR code) for repairable distributed storag... [more] ISEC2011-43 LOIS2011-37
pp.61-68
ISEC, LOIS 2011-11-14
15:35
Osaka Osaka Electro-Communication University Formalization and Verification of Arithmetic Algorithms by Mizar
Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.) ISEC2011-44 LOIS2011-38
In this report, we formalize some number theoretical algorithms,
Euclidean Algorithm and Extended Euclidean Algorithm
... [more]
ISEC2011-44 LOIS2011-38
pp.69-74
ISEC, LOIS 2011-11-14
16:10
Osaka Osaka Electro-Communication University Designing a Filter for Internet Flow Control under Macro Dynamics -- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet --
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT) ISEC2011-45 LOIS2011-39
The stability is one of the major aspects of the Internet flow dynamics, which greatly influence the network performance... [more] ISEC2011-45 LOIS2011-39
pp.75-78
ISEC, LOIS 2011-11-14
16:40
Osaka Osaka Electro-Communication University Efficient Decoding of QR Code using Error Correcting Capability -- Decoding Method using Erasure Error Correction and the Ability --
Keisuke Saito, Masakatu Morii (Kobe Univ.) ISEC2011-46 LOIS2011-40
The QR code is widely used since it is useful for the mobile phone with CCD camera. It is printed on surface of media fo... [more] ISEC2011-46 LOIS2011-40
pp.79-84
ISEC, LOIS 2011-11-14
17:10
Osaka Osaka Electro-Communication University A suudy of machine learning corresponding to the change of a turn and the of the recognition object
Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.) ISEC2011-47 LOIS2011-41
Recently, with the spread of network cameras, video surveillance cameras has been used as a tool to improve customer ser... [more] ISEC2011-47 LOIS2011-41
pp.85-92
ISEC, LOIS 2011-11-15
09:00
Osaka Osaka Electro-Communication University Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-48 LOIS2011-42
WEP is a security protocol in a wireless LAN network, and its vulnerability has been pointed out.Many key recovering att... [more] ISEC2011-48 LOIS2011-42
pp.93-100
ISEC, LOIS 2011-11-15
09:25
Osaka Osaka Electro-Communication University Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) ISEC2011-49 LOIS2011-43
In this paper, we propose a new fault analysis attack technique using Clockwise Collision. Generally, for the combinatio... [more] ISEC2011-49 LOIS2011-43
pp.101-108
ISEC, LOIS 2011-11-15
09:50
Osaka Osaka Electro-Communication University Optimized Right-to-Left Scalar Multiplication RIP Algorithms
Atsuko Miyaji, Yiren Mo (JAIST) ISEC2011-50 LOIS2011-44
 [more] ISEC2011-50 LOIS2011-44
pp.109-114
ISEC, LOIS 2011-11-15
10:15
Osaka Osaka Electro-Communication University Efficient Privacy Preserving Set Operations
Atsuko Miyaji, Mohammad Rahman (JAIST) ISEC2011-51 LOIS2011-45
 [more] ISEC2011-51 LOIS2011-45
pp.115-122
ISEC, LOIS 2011-11-15
10:55
Osaka Osaka Electro-Communication University A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] ISEC2011-52 LOIS2011-46
pp.123-128
ISEC, LOIS 2011-11-15
11:25
Osaka Osaka Electro-Communication University Secure and Effective Password Management System
Ryo Hirano, Masakatu Morii (Kobe Univ.) ISEC2011-53 LOIS2011-47
Secure authentication schemes are being widely investigated
in order to avoid many risks on the internet. It is
necess... [more]
ISEC2011-53 LOIS2011-47
pp.129-134
 Results 1 - 20 of 28  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan