IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
š (ESS/̥/쥽/ISS)
Tech. Rep. Archives
š (ES)
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Naoya Torii (Fujitsu Labs.)
Vice Chair Tsutomu Matsumoto (Yokohama National Univ.), Toshiaki Tanaka (KDDI Labs.)
Secretary Toru Nakanishi (Okayama Univ.), Junji Shikata (Yokohama National Univ.)
Assistant Tetsuya Izu (Fujitsu Labs.)

Technical Committee on Life Intelligence and Office Information Systems (LOIS) [schedule] [select]
Chair Masanobu Abe (Okayama Univ.)
Vice Chair Toshihiko Wakahara (Fukuoka Inst. of Tech.)
Secretary Noriyasu Yamamoto (Fukuoka Inst. of Tech.), Tetsuya Kinebuchi (NTT)
Assistant Hiroshi Konishi (NTT)

Conference Date Mon, Nov 14, 2011 10:00 - 17:40
Tue, Nov 15, 2011 09:00 - 16:30
Topics  
Conference Place I101, Ekimae Campus, Osaka Electro-Communication University 
Address 12-16, Hayakocho, Neyagawa, Osaka, 572-0837 Japan
Transportation Guide http://oweb11.osakac.ac.jp/institution/access.html
Contact
Person
Prof. Ryuichi Sakai
072-824-8900

Mon, Nov 14 AM  ISEC
10:00 - 11:40
(1) 10:00-10:25 Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction Yosuke Todo, Masakatu Morii (Kobe Univ.)
(2) 10:25-10:50 A Lattice Attack against (u|u+v)PKC Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.)
(3) 10:50-11:15 On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II) Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.)
(4) 11:15-11:40 An element-selective knapsack cryptosystem with encryption multipliers Yuki Okada, Akira Hayashi (KIT)
  11:40-12:40 Lunch ( 60 min. )
Mon, Nov 14 PM  LOIS -Life Log-
12:40 - 14:10
(5) 12:40-13:10 A study on necessary location information accuracy in lifelog Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo)
(6) 13:10-13:40 Evaluation method for telephone conversations retrieval using precision and recall Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ)
(7) 13:40-14:10 Proposal of Knowledge Recommender the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service --
Minako Toba (Hitachi, Ltd.)
  14:10-14:20 Break ( 10 min. )
Mon, Nov 14 PM  ISEC
14:20 - 16:00
(8) 14:20-14:45 Three dimensional Dyck Path Cipher Jun Hashimoto, Akira Hayashi (KIT)
(9) 14:45-15:10 Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
(10) 15:10-15:35 Ramp secret sharing scheme based on MBR codes Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University)
(11) 15:35-16:00 Formalization and Verification of Arithmetic Algorithms by Mizar Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.)
  16:00-16:10 Break ( 10 min. )
Mon, Nov 14 PM  LOIS -Office System-
16:10 - 17:40
(12) 16:10-16:40 Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet --
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT)
(13) 16:40-17:10 Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability --
Keisuke Saito, Masakatu Morii (Kobe Univ.)
(14) 17:10-17:40 A suudy of machine learning corresponding to the change of a turn and the of the recognition object Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.)
Tue, Nov 15 AM  ISEC
09:00 - 10:40
(15) 09:00-09:25 Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.)
(16) 09:25-09:50 Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.)
(17) 09:50-10:15 Optimized Right-to-Left Scalar Multiplication RIP Algorithms Atsuko Miyaji, Yiren Mo (JAIST)
(18) 10:15-10:40 Efficient Privacy Preserving Set Operations Atsuko Miyaji, Mohammad Rahman (JAIST)
  10:40-10:55 Break ( 15 min. )
Tue, Nov 15 AM  LOIS -System Security-
10:55 - 12:25
(19) 10:55-11:25 A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT)
(20) 11:25-11:55 Secure and Effective Password Management System Ryo Hirano, Masakatu Morii (Kobe Univ.)
(21) 11:55-12:25 Secure VoIP system for mobile devices Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.)
  12:25-13:25 Lunch ( 60 min. )
Tue, Nov 15 PM  ISEC
13:25 - 14:40
(22) 13:25-13:50 SLP separates the strong RSA assumption from the DDH assumption Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
(23) 13:50-14:15 On the Little Knowledge Interactive Proof Jun-ya Iwazaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
(24) 14:15-14:40 Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
  14:40-14:50 Break ( 10 min. )
Tue, Nov 15 PM  ISEC
14:50 - 16:30
(25) 14:50-15:15 On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8 Masaaki Shirase (FUN)
(26) 15:15-15:40 A proposal of Privacy Impact Assessment framework in Japan Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT)
(27) 15:40-16:05 Content Authentication for Range Queries in Peer-to-Peer Networks Shoichi Hirose (Univ. of Fukui)
(28) 16:05-16:30 On the Insecurity of Randomized Arithmetic Codes Based on Markov Model Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.)

Announcement for Speakers
General Talk (ISEC)Each speech will have 20 minutes for presentation and 5 minutes for discussion.
General Talk (LOIS)Each speech will have 20 minutes for presentation and 10 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-: ic-c (to ISEC secretaries) 
LOIS Technical Committee on Life Intelligence and Office Information Systems (LOIS)   [Latest Schedule]
Contact Address Noriyasu Yamamoto
Fukuoka Institute of Technology
3-30-1 Wajiro-higashi, Higashi-ku, Fukuoka-shi 811-0295
FAX +81-92-606-0758
E-: fit 


Last modified: 2011-11-09 09:52:23


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 

[On-Site Price List of Proceedings (Technical Report)] (in Japanese)
 
[Presentation and Participation FAQ] (in Japanese)
 
[Index of IEICE Technical Report]
 

[Return to ISEC Schedule Page]   /   [Return to LOIS Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Home Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan