===============================================
Technical Committee on Information Security (ISEC)
Chair: Mitsuru Matsui (Mitsubishi Electric)
Vice Chair: Kazuo Ota (Univ. of Electro-Comm.), Kazuo Takaragi (Hitachi)
Secretary: Shiho Moriai (Sony), Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
Assistant: Noboru Kunihiro (Univ. of Electro-Comm.)
===============================================
Technical Committee on Office Information System (OIS)
Chair: Hisashi Ibaraki (NTT) Vice Chair: Yukio Rikiso (Univ. of Hyogo)
Secretary: Masami Mohri (Gifu Univ.), Katsuyoshi Tanabe (NTT)
Assistant: Hiroki Furuzumi (Univ. of Hyogo)
DATE:
Wed, Nov 21, 2007 13:30 - 17:30
Thu, Nov 22, 2007 09:30 - 16:35
PLACE:
Kobe University the Takigawa Memorial Hall(1-1 Rokkodai-cho, Nada-ku, Kobe 657-8501 Japan. http://www.kobe-u.ac.jp/en/access/rokko/campus.htm. Prof. Masakatu Morii. 078-803-6088)
TOPICS:
----------------------------------------
Wed, Nov 21 PM (13:30 - 16:00)
----------------------------------------
(1) 13:30 - 13:55
A New Construction of Knapsack Cryptosystem
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.)
(2) 13:55 - 14:20
Small Secret Key Attack on Takagi's Variant of RSA (Part1)
Noboru Kunihiro (Univ. of Electro-Comm.), Kouichi Itoh (Fujitsu Labs), Kaoru Kurosawa (Ibaraki Univ.)
(3) 14:20 - 14:45
Clone resistance in artifact-metric systems
Yuko Tamura, Masashi Une (BOJ)
(4) 14:45 - 15:10
Anonymous Fingerprinting for Predelivery of Contents
Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
(5) 15:10 - 15:35
Function Estimation of Malware Code by Measuring Similarity
Kouki Yasumoto, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT)
(6) 15:35 - 16:00
Extract Network Access Information from BOT Code Using Static Analysis
Hayato Okada, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT)
----------------------------------------
Wed, Nov 21 PM (16:15 - 17:30)
----------------------------------------
(7) 16:15 - 16:40
Business Process based Access Control Method for Java EE Environment
Tomoya Okaue, Satoshi Ono (Kogakuin Univ.)
(8) 16:40 - 17:05
A study on implementation of mobile-phone with speaker verification function
Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ)
(9) 17:05 - 17:30
Template Protection using Biometric Encryption for CELP Speaker Verification
Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.)
----------------------------------------
Thu, Nov 22 AM (09:30 - 12:00)
----------------------------------------
(10) 09:30 - 09:55
Applications of Conjugate Codes to Wiretap Channels
Mitsuru Hamada (Tamagawa Univ./JST)
(11) 09:55 - 10:20
A Consideration on Clique Problem and Adjacency Matrix
Kunikatsu Kobayashi (Yamagata Univ.)
(12) 10:20 - 10:45
Knapsack Cryptosystem on Elliptic Curves of Trace Two
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.)
(13) 10:45 - 11:10
Comparative study of Rabin encryption and RSA encryption
Kensuke Takamura, Akira Hayashi (KIT)
(14) 11:10 - 11:35
Cryptanalysis experiment of OTU2000 using the Lagarias-Odlyzko method
Naoto Yamaguchi, Akira Hayashi (KIT)
(15) 11:35 - 12:00
Reduction Optimal Polynomials over GF(3) with Four Terms
Toshiya Nakajima (Fujitsu Ltd.), Tetsuya Izu (Fujitsu Laboratories Ltd.), Tsuyoshi Takagi (FUN)
----------------------------------------
Thu, Nov 22 PM (13:00 - 14:40)
----------------------------------------
(16) 13:00 - 13:25
.
Hidekazu Nakawatase, , (NTT), Hideaki Hata (Osaka Univ.)
(17) 13:25 - 13:50
Workplace surveillance by use of a remote video monitoring system
Kazuyuki Iso, Katsuya Yamashita, Kyoko Sudo, Kumi Jinzenji, Akira Kojima, Hitoshi Nakazawa (NTT)
(18) 13:50 - 14:15
Line spacing and Legibility in a Local Government Web Site
Yoshiyuki Kazato, Yasuhiko Higaki, Hiroaki Ikeda (Chiba Univ.)
(19) 14:15 - 14:40
Available Bandwidth Measurement Technology using Probing Packet
Motomitsu Adachi, Ryo Kubota, Toshinori Nishimura, Naohisa Komatsu (Waseda Univ.)
----------------------------------------
Thu, Nov 22 PM (14:55 - 16:35)
----------------------------------------
(20) 14:55 - 15:20
A random number generation method with a variable degree of safety and its application to Secret Sharing Scheme
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications)
(21) 15:20 - 15:45
A Key Recovery Attack on WEP with Less Packets
Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(22) 15:45 - 16:10
A Key Recovery Attack with Equivalent Keys of Stream Cipher
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(23) 16:10 - 16:35
New Weak Keys on RC4
Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Wed, Dec 19, 2007: Kikai-Shinko-Kaikan Bldg. [Fri, Oct 19]
Thu, Feb 28, 2008 - Fri, Feb 29, 2008: [Mon, Dec 10]
# SECRETARY:
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-mail: ic-c (to ISEC secretaries)
=== Technical Committee on Office Information System (OIS) ===
# SECRETARY:
Masami Mohri
Information and Multimedia Center
Gifu University
1-1 Yanagito Gifu-shi, Gifu 501-1193
TEL +81-58-293-2050, FAX +81-58-293-2044
mhgi-u
Last modified: 2007-11-07 16:46:46
|
Notification: Mail addresses are partially hidden against SPAM.
|