IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2007)

Search Results: Keywords 'from:2007-11-21 to:2007-11-21'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, LOIS 2007-11-21
13:30
Hyogo Kobe University A New Construction of Knapsack Cryptosystem
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) ISEC2007-89 OIS2007-61
In this paper we propose a new method for constructing the public-key
cryptosytems on the basis of the classical Merkl... [more]
ISEC2007-89 OIS2007-61
pp.1-6
ISEC, LOIS 2007-11-21
13:55
Hyogo Kobe University Small Secret Key Attack on Takagi's Variant of RSA (Part1)
Noboru Kunihiro (Univ. of Electro-Comm.), Kouichi Itoh (Fujitsu Labs), Kaoru Kurosawa (Ibaraki Univ.) ISEC2007-90 OIS2007-62
 [more] ISEC2007-90 OIS2007-62
pp.7-14
ISEC, LOIS 2007-11-21
14:20
Hyogo Kobe University Clone resistance in artifact-metric systems
Yuko Tamura, Masashi Une (BOJ) ISEC2007-91 OIS2007-63
Artifact-metrics is a technique to authenticate an artifact by using its physical feature that even the manufacturer can... [more] ISEC2007-91 OIS2007-63
pp.15-22
ISEC, LOIS 2007-11-21
14:45
Hyogo Kobe University Anonymous Fingerprinting for Predelivery of Contents
Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2007-92 OIS2007-64
Security requirements for predelivery of digital contents such as movies whose release date is predeterminedare analyzed... [more] ISEC2007-92 OIS2007-64
pp.23-30
ISEC, LOIS 2007-11-21
15:10
Hyogo Kobe University Function Estimation of Malware Code by Measuring Similarity
Kouki Yasumoto, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) ISEC2007-93 OIS2007-65
Generally almost all of malwares are classified by the variants of known malwares and packed ones that are identified wi... [more] ISEC2007-93 OIS2007-65
pp.31-36
ISEC, LOIS 2007-11-21
15:35
Hyogo Kobe University Extract Network Access Information from BOT Code Using Static Analysis
Hayato Okada, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) ISEC2007-94 OIS2007-66
Recently malwares called BOT spread like wildfire across the Internet. BOTs access a outside server like IRC server and ... [more] ISEC2007-94 OIS2007-66
pp.37-41
ISEC, LOIS 2007-11-21
16:15
Hyogo Kobe University Business Process based Access Control Method for Java EE Environment
Tomoya Okaue, Satoshi Ono (Kogakuin Univ.) ISEC2007-95 OIS2007-67
Owing to promoting the web service of Enterprise information system and requirements of compliance, web service for the ... [more] ISEC2007-95 OIS2007-67
pp.43-50
ISEC, LOIS 2007-11-21
16:40
Hyogo Kobe University A study on implementation of mobile-phone with speaker verification function
Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ) ISEC2007-96 OIS2007-68
In this paper we propose a speaker verification method based on CELP (Code Excited Linear Prediction) speech coding sche... [more] ISEC2007-96 OIS2007-68
pp.51-56
ISEC, LOIS 2007-11-21
17:05
Hyogo Kobe University Template Protection using Biometric Encryption for CELP Speaker Verification
Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-97 OIS2007-69
As the application of biometric authentication technique has been advanced, countermeasures against threat, that the tem... [more] ISEC2007-97 OIS2007-69
pp.57-62
ISEC, LOIS 2007-11-22
09:30
Hyogo Kobe University Applications of Conjugate Codes to Wiretap Channels
Mitsuru Hamada (Tamagawa Univ./JST) ISEC2007-98 OIS2007-70
 [more] ISEC2007-98 OIS2007-70
pp.1-8
ISEC, LOIS 2007-11-22
09:55
Hyogo Kobe University A Consideration on Clique Problem and Adjacency Matrix
Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-99 OIS2007-71
We examine a solution of k-clique problem. By using adjacency matrix of graph G, we can decide whether k-clique of graph... [more] ISEC2007-99 OIS2007-71
pp.9-13
ISEC, LOIS 2007-11-22
10:20
Hyogo Kobe University Knapsack Cryptosystem on Elliptic Curves of Trace Two
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-100 OIS2007-72
The LLL algorithm is strong algorithm that decrypts the additional type Knapsack cryptosystem. However, the LLL algorith... [more] ISEC2007-100 OIS2007-72
pp.15-18
ISEC, LOIS 2007-11-22
10:45
Hyogo Kobe University Comparative study of Rabin encryption and RSA encryption
Kensuke Takamura, Akira Hayashi (KIT) ISEC2007-101 OIS2007-73
The Rabin cryptosystem is a public key system that is proven to be as intractable as integer factoring. One of its featu... [more] ISEC2007-101 OIS2007-73
pp.19-21
ISEC, LOIS 2007-11-22
11:10
Hyogo Kobe University Cryptanalysis experiment of OTU2000 using the Lagarias-Odlyzko method
Naoto Yamaguchi, Akira Hayashi (KIT) ISEC2007-102 OIS2007-74
Okamoto-Tanaka-Uchiyama proposed a public key cryptosystem in 2000, which we call OTU2000 in this paper. OTU2000 is a kn... [more] ISEC2007-102 OIS2007-74
pp.23-26
ISEC, LOIS 2007-11-22
11:35
Hyogo Kobe University Reduction Optimal Polynomials over GF(3) with Four Terms
Toshiya Nakajima (Fujitsu Ltd.), Tetsuya Izu (Fujitsu Laboratories Ltd.), Tsuyoshi Takagi (FUN) ISEC2007-103 OIS2007-75
In [10] we proposed to use the "Reduction Optimal Trinomials (ROTs)"
which make reduction in GF(3^m) multiplication eff... [more]
ISEC2007-103 OIS2007-75
pp.27-32
ISEC, LOIS 2007-11-22
13:00
Hyogo Kobe University .
Hidekazu Nakawatase, , (NTT), Hideaki Hata (Osaka Univ.) ISEC2007-104 OIS2007-76
 [more] ISEC2007-104 OIS2007-76
pp.33-36
ISEC, LOIS 2007-11-22
13:25
Hyogo Kobe University Workplace surveillance by use of a remote video monitoring system
Kazuyuki Iso, Katsuya Yamashita, Kyoko Sudo, Kumi Jinzenji, Akira Kojima, Hitoshi Nakazawa (NTT) ISEC2007-105 OIS2007-77
We have been developing an intelligent monitoring technology "NiMSA(NTT Intelligent Monitoring for Semantic Analysis)" t... [more] ISEC2007-105 OIS2007-77
pp.37-42
ISEC, LOIS 2007-11-22
13:50
Hyogo Kobe University Line spacing and Legibility in a Local Government Web Site
Yoshiyuki Kazato, Yasuhiko Higaki, Hiroaki Ikeda (Chiba Univ.) ISEC2007-106 OIS2007-78
One of the most effective methods for keeping up with web accessibility is to separate the cascading style sheets from t... [more] ISEC2007-106 OIS2007-78
pp.43-48
ISEC, LOIS 2007-11-22
14:15
Hyogo Kobe University Available Bandwidth Measurement Technology using Probing Packet
Motomitsu Adachi, Ryo Kubota, Toshinori Nishimura, Naohisa Komatsu (Waseda Univ.) ISEC2007-107 OIS2007-79
In this paper, the technology to estimate an available bandwidth of the network from the coming and going delay line by ... [more] ISEC2007-107 OIS2007-79
pp.49-54
ISEC, LOIS 2007-11-22
14:55
Hyogo Kobe University A random number generation method with a variable degree of safety and its application to Secret Sharing Scheme
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications) ISEC2007-108 OIS2007-80
In our previous study, a method for generating a random number sequence, which we call a mixture random number sequence,... [more] ISEC2007-108 OIS2007-80
pp.55-60
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan