Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2007-11-21 13:30 |
Hyogo |
Kobe University |
A New Construction of Knapsack Cryptosystem Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) ISEC2007-89 OIS2007-61 |
In this paper we propose a new method for constructing the public-key
cryptosytems on the basis of the classical Merkl... [more] |
ISEC2007-89 OIS2007-61 pp.1-6 |
ISEC, LOIS |
2007-11-21 13:55 |
Hyogo |
Kobe University |
Small Secret Key Attack on Takagi's Variant of RSA (Part1) Noboru Kunihiro (Univ. of Electro-Comm.), Kouichi Itoh (Fujitsu Labs), Kaoru Kurosawa (Ibaraki Univ.) ISEC2007-90 OIS2007-62 |
[more] |
ISEC2007-90 OIS2007-62 pp.7-14 |
ISEC, LOIS |
2007-11-21 14:20 |
Hyogo |
Kobe University |
Clone resistance in artifact-metric systems Yuko Tamura, Masashi Une (BOJ) ISEC2007-91 OIS2007-63 |
Artifact-metrics is a technique to authenticate an artifact by using its physical feature that even the manufacturer can... [more] |
ISEC2007-91 OIS2007-63 pp.15-22 |
ISEC, LOIS |
2007-11-21 14:45 |
Hyogo |
Kobe University |
Anonymous Fingerprinting for Predelivery of Contents Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2007-92 OIS2007-64 |
Security requirements for predelivery of digital contents such as movies whose release date is predeterminedare analyzed... [more] |
ISEC2007-92 OIS2007-64 pp.23-30 |
ISEC, LOIS |
2007-11-21 15:10 |
Hyogo |
Kobe University |
Function Estimation of Malware Code by Measuring Similarity Kouki Yasumoto, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) ISEC2007-93 OIS2007-65 |
Generally almost all of malwares are classified by the variants of known malwares and packed ones that are identified wi... [more] |
ISEC2007-93 OIS2007-65 pp.31-36 |
ISEC, LOIS |
2007-11-21 15:35 |
Hyogo |
Kobe University |
Extract Network Access Information from BOT Code Using Static Analysis Hayato Okada, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) ISEC2007-94 OIS2007-66 |
Recently malwares called BOT spread like wildfire across the Internet. BOTs access a outside server like IRC server and ... [more] |
ISEC2007-94 OIS2007-66 pp.37-41 |
ISEC, LOIS |
2007-11-21 16:15 |
Hyogo |
Kobe University |
Business Process based Access Control Method for Java EE Environment Tomoya Okaue, Satoshi Ono (Kogakuin Univ.) ISEC2007-95 OIS2007-67 |
Owing to promoting the web service of Enterprise information system and requirements of compliance, web service for the ... [more] |
ISEC2007-95 OIS2007-67 pp.43-50 |
ISEC, LOIS |
2007-11-21 16:40 |
Hyogo |
Kobe University |
A study on implementation of mobile-phone with speaker verification function Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ) ISEC2007-96 OIS2007-68 |
In this paper we propose a speaker verification method based on CELP (Code Excited Linear Prediction) speech coding sche... [more] |
ISEC2007-96 OIS2007-68 pp.51-56 |
ISEC, LOIS |
2007-11-21 17:05 |
Hyogo |
Kobe University |
Template Protection using Biometric Encryption for CELP Speaker Verification Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-97 OIS2007-69 |
As the application of biometric authentication technique has been advanced, countermeasures against threat, that the tem... [more] |
ISEC2007-97 OIS2007-69 pp.57-62 |
ISEC, LOIS |
2007-11-22 09:30 |
Hyogo |
Kobe University |
Applications of Conjugate Codes to Wiretap Channels Mitsuru Hamada (Tamagawa Univ./JST) ISEC2007-98 OIS2007-70 |
[more] |
ISEC2007-98 OIS2007-70 pp.1-8 |
ISEC, LOIS |
2007-11-22 09:55 |
Hyogo |
Kobe University |
A Consideration on Clique Problem and Adjacency Matrix Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-99 OIS2007-71 |
We examine a solution of k-clique problem. By using adjacency matrix of graph G, we can decide whether k-clique of graph... [more] |
ISEC2007-99 OIS2007-71 pp.9-13 |
ISEC, LOIS |
2007-11-22 10:20 |
Hyogo |
Kobe University |
Knapsack Cryptosystem on Elliptic Curves of Trace Two Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2007-100 OIS2007-72 |
The LLL algorithm is strong algorithm that decrypts the additional type Knapsack cryptosystem. However, the LLL algorith... [more] |
ISEC2007-100 OIS2007-72 pp.15-18 |
ISEC, LOIS |
2007-11-22 10:45 |
Hyogo |
Kobe University |
Comparative study of Rabin encryption and RSA encryption Kensuke Takamura, Akira Hayashi (KIT) ISEC2007-101 OIS2007-73 |
The Rabin cryptosystem is a public key system that is proven to be as intractable as integer factoring. One of its featu... [more] |
ISEC2007-101 OIS2007-73 pp.19-21 |
ISEC, LOIS |
2007-11-22 11:10 |
Hyogo |
Kobe University |
Cryptanalysis experiment of OTU2000 using the Lagarias-Odlyzko method Naoto Yamaguchi, Akira Hayashi (KIT) ISEC2007-102 OIS2007-74 |
Okamoto-Tanaka-Uchiyama proposed a public key cryptosystem in 2000, which we call OTU2000 in this paper. OTU2000 is a kn... [more] |
ISEC2007-102 OIS2007-74 pp.23-26 |
ISEC, LOIS |
2007-11-22 11:35 |
Hyogo |
Kobe University |
Reduction Optimal Polynomials over GF(3) with Four Terms Toshiya Nakajima (Fujitsu Ltd.), Tetsuya Izu (Fujitsu Laboratories Ltd.), Tsuyoshi Takagi (FUN) ISEC2007-103 OIS2007-75 |
In [10] we proposed to use the "Reduction Optimal Trinomials (ROTs)"
which make reduction in GF(3^m) multiplication eff... [more] |
ISEC2007-103 OIS2007-75 pp.27-32 |
ISEC, LOIS |
2007-11-22 13:00 |
Hyogo |
Kobe University |
. Hidekazu Nakawatase, , (NTT), Hideaki Hata (Osaka Univ.) ISEC2007-104 OIS2007-76 |
[more] |
ISEC2007-104 OIS2007-76 pp.33-36 |
ISEC, LOIS |
2007-11-22 13:25 |
Hyogo |
Kobe University |
Workplace surveillance by use of a remote video monitoring system Kazuyuki Iso, Katsuya Yamashita, Kyoko Sudo, Kumi Jinzenji, Akira Kojima, Hitoshi Nakazawa (NTT) ISEC2007-105 OIS2007-77 |
We have been developing an intelligent monitoring technology "NiMSA(NTT Intelligent Monitoring for Semantic Analysis)" t... [more] |
ISEC2007-105 OIS2007-77 pp.37-42 |
ISEC, LOIS |
2007-11-22 13:50 |
Hyogo |
Kobe University |
Line spacing and Legibility in a Local Government Web Site Yoshiyuki Kazato, Yasuhiko Higaki, Hiroaki Ikeda (Chiba Univ.) ISEC2007-106 OIS2007-78 |
One of the most effective methods for keeping up with web accessibility is to separate the cascading style sheets from t... [more] |
ISEC2007-106 OIS2007-78 pp.43-48 |
ISEC, LOIS |
2007-11-22 14:15 |
Hyogo |
Kobe University |
Available Bandwidth Measurement Technology using Probing Packet Motomitsu Adachi, Ryo Kubota, Toshinori Nishimura, Naohisa Komatsu (Waseda Univ.) ISEC2007-107 OIS2007-79 |
In this paper, the technology to estimate an available bandwidth of the network from the coming and going delay line by ... [more] |
ISEC2007-107 OIS2007-79 pp.49-54 |
ISEC, LOIS |
2007-11-22 14:55 |
Hyogo |
Kobe University |
A random number generation method with a variable degree of safety and its application to Secret Sharing Scheme Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications) ISEC2007-108 OIS2007-80 |
In our previous study, a method for generating a random number sequence, which we call a mixture random number sequence,... [more] |
ISEC2007-108 OIS2007-80 pp.55-60 |