Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2009-03-10 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
A BER floor suppression scheme of OFDM system with Overlap-FDE Tetsuya Kobori, Fumio Takahata (Waseda Univ) IT2008-115 ISEC2008-173 WBS2008-128 |
An overlap-FDE has a capability of eliminating a guard interval(GI) in OFDM transmission. However it is possible in mult... [more] |
IT2008-115 ISEC2008-173 WBS2008-128 pp.469-474 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) ISEC2008-57 |
[more] |
ISEC2008-57 pp.163-168 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
A Coding Theorems for Cheating-Detectable (2,2)-Threshold Schemes Hiroki Koga (Univ. Tsukuba), Mitsugu Iwamoto (Univ. Electro-Communications), Hirosuke Yamamoto (Univ. Tokyo) IT2008-66 ISEC2008-124 WBS2008-79 |
(To be available after the conference date) [more] |
IT2008-66 ISEC2008-124 WBS2008-79 pp.143-150 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2008-49 |
In recent years, pairing-based cryptographies such as ID-base cryptography and group signature have been studied.
These... [more] |
ISEC2008-49 pp.101-108 |
ISEC |
2008-05-16 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Consideration on k-Clique Problem and Graph k-Colorability Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-6 |
We examine the solutions of $k$-clique problem and graph $k$-colorability.We propose the polynomial time algorithms of $... [more] |
ISEC2008-6 pp.39-42 |
ISEC |
2008-09-12 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Factoring Algorithm Searching Squares (part 2) Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-66 |
We propose a probabilistic factoring algorithm searching squares
using a factor base consisting of odd primes. [more] |
ISEC2008-66 pp.21-24 |
ISEC |
2008-05-16 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for Collection of Attribute Statistics Keita Emura, Atsuko Miyaji (JAIST) ISEC2008-10 |
Recently,
many cryptographic schemes based on user's attributes are proposed, e.g., Attribute-Based Group Signature (A... [more] |
ISEC2008-10 pp.61-68 |
WBS, IT, ISEC |
2009-03-10 14:50 |
Hokkaido |
Hakodate Mirai Univ. |
A Grouping Method Based on Degree Distribution of Irregular LDPC Codes for Group Shuffled BP Decoding Algorithm Yoshiyuki Sato, Gou Hosoya, Shigeichi Hirasawa (Waseda Univ.) IT2008-107 ISEC2008-165 WBS2008-120 |
In this paper, we propose a effective grouping method for the Group Shuffled BP decoding algorithm using the irregular L... [more] |
IT2008-107 ISEC2008-165 WBS2008-120 pp.421-426 |
ISEC |
2008-12-17 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Knapsack Cryptosystem Resisting Wellknown Attacks Kunikatsu Kobayashi (Yamagata Univ,) ISEC2008-96 |
We propose a knapsack cryptosystem resisting well-known attacks which use LLL algorithm and Shamir's algorithm. [more] |
ISEC2008-96 pp.41-44 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Lattice Model of the General Confidentiality Policies Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.) |
An information flow policy is defined as a set of information flow rules among security-classes. Implementations of such... [more] |
ISEC2008-41 pp.45-52 |
ISEC |
2008-12-17 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Masquerade Detecting Method Based On the TF-IDF Model Geng Dai, Zhou Jian, Haruhiko Shirai, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ) ISEC2008-94 |
Masquerade is someone who impersonates another user and operates computer system with privileged access. Computer securi... [more] |
ISEC2008-94 pp.27-32 |
ISEC |
2008-05-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A method to reduce false positive of Anomaly Detection System Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri (NTT DoCoMo), Satoshi Kawasaki (Univ. of Tsukuba), Hirotake Abe (Toyohashi Univ. of Technology), Takahiro Shinagawa, Kazuhiko Kato (Univ. of Tsukuba) ISEC2008-8 |
We proposed a new anomaly detection system. In this system, software behavior that deviates from a model representing no... [more] |
ISEC2008-8 pp.49-56 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] |
ISEC2008-54 pp.139-146 |
WBS, IT, ISEC |
2009-03-10 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
A Necessary and Sufficient Condition for the Existence of a Universal Fixed-Rate Lossless Code Shigeaki Kuzuoka (Wakayama Univ.) IT2008-97 ISEC2008-155 WBS2008-110 |
In this paper, a generalized version of fixed-rate lossless source coding, that is, $\varepsilon$-source coding of gener... [more] |
IT2008-97 ISEC2008-155 WBS2008-110 pp.349-354 |
ISEC |
2008-05-16 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A New Randomness Test Based on All the Autocorrelation Values Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.) ISEC2008-4 |
Discrete Fourier transform test (dft test) included in the NIST randomness test suite, and autocorrelation test included... [more] |
ISEC2008-4 pp.23-30 |
ISEC |
2008-09-12 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on Security of KMN PKC Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-65 |
Recently present authors proposed a new class of knapsack type cryptosystem on the basis of MH
PKC(KMN PKC). In this p... [more] |
ISEC2008-65 pp.17-20 |
WBS, IT, ISEC |
2009-03-09 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
A Note on Security of Knapsack Type PKC with Random Sequence Yasuyuki Murakami (Osaka Electro-Comm Univ.) IT2008-48 ISEC2008-106 WBS2008-61 |
Present author proposed a new method for constructing knapsack PKC
by using a random sequence.
In this paper, we propo... [more] |
IT2008-48 ISEC2008-106 WBS2008-61 pp.35-40 |
WBS, IT, ISEC |
2009-03-10 13:00 |
Hokkaido |
Hakodate Mirai Univ. |
A Note on the Security of Cryptographic Hash Functions Shoichi Hirose (Univ. Fukui) IT2008-85 ISEC2008-143 WBS2008-98 |
This article discusses relationships between preimage resistance, second-preimage resistance and universal one-wayness o... [more] |
IT2008-85 ISEC2008-143 WBS2008-98 pp.267-271 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Note on the Security of KMN PKC and Presentation of Challenge Problems Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) ISEC2008-16 SITE2008-10 |
In this paper we discuss on a method for improving the security of the previously propsed KMN PKC where two pairs of cip... [more] |
ISEC2008-16 SITE2008-10 pp.1-8 |
WBS, IT, ISEC |
2009-03-10 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
A proof of universality of the source coding by most frequent match Yangao Lin, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-96 ISEC2008-154 WBS2008-109 |
In the grammar based code proposed by Kieffer and Yang, for a given data string, we first produce a context-free grammar... [more] |
IT2008-96 ISEC2008-154 WBS2008-109 pp.343-348 |
ISEC, LOIS |
2008-11-13 16:05 |
Aichi |
Nagoya Noh Theater |
A Proposal of an Efficient Forward-Secure Group Signature Scheme Using Pairing Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-80 OIS2008-56 |
Group signature scheme is one of signature schemes which keep signer’s identity information secret. To prevent a problem... [more] |
ISEC2008-80 OIS2008-56 pp.47-54 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Proposal of Intrusion Detection using Third-parties Support Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37 |
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] |
ISEC2008-37 pp.15-22 |
WBS, IT, ISEC |
2009-03-09 16:45 |
Hokkaido |
Hakodate Mirai Univ. |
a prototype of ultra wideband spatio-temporal channel sounder and its performance evaluation Hiroto Iiduka, Masaki Takahashi, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.) IT2008-76 ISEC2008-134 WBS2008-89 |
Ultra wideband (UWB) spatio-temporal propagation measurements have been carried out mostly using virtual array antennas ... [more] |
IT2008-76 ISEC2008-134 WBS2008-89 pp.205-210 |
ISEC, LOIS |
2008-11-13 13:25 |
Aichi |
Nagoya Noh Theater |
A RIA Groupware System using Google Gdata Protocol
-- A Schedule Information Sharing System -- Rui Zhuang, Yukio Rikiso (U. of Hyogo) ISEC2008-74 OIS2008-50 |
We developed a new groupware system using the web service provided by Google with the Google data APIs("GData" for short... [more] |
ISEC2008-74 OIS2008-50 pp.7-14 |
ISEC, LOIS |
2008-11-13 16:40 |
Aichi |
Nagoya Noh Theater |
[Invited Talk]
A Secure and Accessible Knowledge Management System for Home-Based Care Services for the Elderly
-- An Area Portal for Tacit Knowledge Sharing and Collaboration in Home-Based Care Services -- Akira Iwata (Nagoya Institute of Technology) ISEC2008-81 OIS2008-57 |
The demand of home-based care services for elderly are increasing rapidly in Japan in recent years since the number of e... [more] |
ISEC2008-81 OIS2008-57 pp.55-62 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 17:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree Chunhua Su, Kouichi Sakurai (Kyushu Univ.) ISEC2008-59 |
[more] |
ISEC2008-59 pp.177-182 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
A study of incident detection based on correlation analysis between network traffic time series Junya Kitagawa, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies,), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-93 ISEC2008-151 WBS2008-106 |
Damage caused by malwares such as botnets is getting more
serious, as the Internet is spreading. To detect such
incide... [more] |
IT2008-93 ISEC2008-151 WBS2008-106 pp.321-328 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104 |
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] |
IT2008-91 ISEC2008-149 WBS2008-104 pp.307-314 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Study on Detecting Information Leak Virus by Activity Monitoring Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.) |
In these days, it becomes a serious problem that personal/private information are disclosed by computer viruses which ab... [more] |
ISEC2008-60 pp.183-188 |
ISEC |
2008-05-16 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Higher Order Differnce Operation for Elliptic Curve Scalar Multiplication Using Path Table Tomoko K. Matsushima, Yoshitaka Sagara, Osamu Ashihara (Polytechnic Univ.) ISEC2008-11 |
Efficient elliptic curve arithmetic is crucial for cryptosystems based on elliptic curves. Such cryptosystems often requ... [more] |
ISEC2008-11 pp.69-76 |
WBS, IT, ISEC |
2009-03-09 16:20 |
Hokkaido |
Hakodate Mirai Univ. |
A Study on Interference Suppression using Weighting factors for MB-OFDM systems Atsushi Minakawa, Masahiro Fujii, Yu Watanabe (Utsunomiya Univ.) IT2008-75 ISEC2008-133 WBS2008-88 |
Ultira-WideBand (UWB) systems have recently gained popularity for short range high rate communications. UWB systems make... [more] |
IT2008-75 ISEC2008-133 WBS2008-88 pp.199-204 |
WBS, IT, ISEC |
2009-03-10 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
A Study on Joint Optimization of Power Allocation and Subcarrier Mapping Method for Dual-hop Non-regenerative OFDM Relay Systems Masato Saito (Nara Inst. of Sci and Tech.), Chandara Athaudage, Jamie Evans (Univ. of Melbourne) IT2008-119 ISEC2008-177 WBS2008-132 |
In this study, an achievable rate of dual-hop non-regenerative OFDM (Orthogonal Frequency Division Multiplexing) relay s... [more] |
IT2008-119 ISEC2008-177 WBS2008-132 pp.493-499 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First -- Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.) ISEC2008-27 SITE2008-21 |
[more] |
ISEC2008-27 SITE2008-21 pp.81-88 |
WBS, IT, ISEC |
2009-03-09 16:45 |
Hokkaido |
Hakodate Mirai Univ. |
A Study on the Construction of Search Systems Indices Shigeki Miyake (NTT Network Innovation Lab.) IT2008-65 ISEC2008-123 WBS2008-78 |
Recall and precision are used to evaluate the performance of full-text search systems, where recall and precision are re... [more] |
IT2008-65 ISEC2008-123 WBS2008-78 pp.137-141 |
WBS, IT, ISEC |
2009-03-10 12:05 |
Hokkaido |
Hakodate Mirai Univ. |
A Study on the Iterative Compensation of Clipping Noise for MIMO-OFDM systems. Soichi Minamigi, Hideki Ochiai (Yokohama National Univ) IT2008-121 ISEC2008-179 WBS2008-134 |
MIMO-OFDM is a promising technique for achieving higher
channel capacity and/or higher communication quality by using ... [more] |
IT2008-121 ISEC2008-179 WBS2008-134 pp.507-512 |
ISEC, LOIS |
2008-11-14 12:10 |
Aichi |
Nagoya Noh Theater |
A Study on Visualization of Personal Life Log Considering Disclosure Control Shin-ichiro Eitoku, Narimune Matsumura, Tomohiro Yamada, Shin-yo Muto, Masanobu Abe (Nippon Telegraph and Telephone Corporation) ISEC2008-88 OIS2008-64 |
In recent years, because of miniaturization of mobile terminals with various sensors, life-log services have begun to re... [more] |
ISEC2008-88 OIS2008-64 pp.97-104 |
ISEC, LOIS |
2008-11-13 14:15 |
Aichi |
Nagoya Noh Theater |
A suggestion of the offer and management system of the individual prescription and medication history Aya Matsudaira, Hiroyuki Suzuki, Takashi Obi, Kouichi Kita, Masahiro Yamaguchi, Joong Sun Lee, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) ISEC2008-76 OIS2008-52 |
Now the investigative committee on the medical information network infrastructure examines about the digital prescriptio... [more] |
ISEC2008-76 OIS2008-52 pp.23-28 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A System against Leakage though Paper Documents in Multi-Vendor Environment Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI) |
[more] |
ISEC2008-23 SITE2008-17 pp.51-58 |
WBS, IT, ISEC |
2009-03-10 17:30 |
Hokkaido |
Hakodate Mirai Univ. |
A Video Packet Detection Method in Wireless Communications Shoichiro Yamasaki (Polytechnic UIniv.), Hirokazu Tanaka (Hokkaido Univ.) IT2008-113 ISEC2008-171 WBS2008-126 |
A false detection of packet deteriorates reconstruction quality in wireless multimedia communications. This study prop... [more] |
IT2008-113 ISEC2008-171 WBS2008-126 pp.459-462 |
WBS, IT, ISEC |
2009-03-09 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
Accelerated Algorithm for Computing the Weight Distribution of Convolutional Codes, part 2 Yasuo Asakura, Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Hiroshi Sasano (Kinki Univ.) IT2008-62 ISEC2008-120 WBS2008-75 |
In this paper, we propose an generalized AFAST algorithm.
This algorithm detects minimum distance at precomputation.
... [more] |
IT2008-62 ISEC2008-120 WBS2008-75 pp.117-122 |
WBS, IT, ISEC |
2009-03-09 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
Access control model for distributed systems and its application for service proxies Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC) IT2008-44 ISEC2008-102 WBS2008-57 |
Terminals in a distributed system provide their services for other terminals. In this manuscript, we propose Scope-based... [more] |
IT2008-44 ISEC2008-102 WBS2008-57 pp.7-13 |
ISEC |
2008-12-17 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Access management method for Least Privilege implementation By the identity federation cross-organizations Takahito Motojima, Satoshi Ono (kogakuin univ) ISEC2008-91 |
As for the business infomation system, service construction is performed again between the organizations which used SaaS... [more] |
ISEC2008-91 pp.11-14 |
WBS, IT, ISEC |
2009-03-10 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
Achievable Rate of Dual-Hop Non-Regenerative OFDM Relay Systems without FFT-based Relay Process Shuhei Haraguchi, Masato Saito (Nara Inst. of Sci and Tech.), R. N. Athaudage, Jamie Evans (Univ. of Melbourne), Minoru Okada (Nara Inst. of Sci and Tech.) IT2008-118 ISEC2008-176 WBS2008-131 |
In this paper, we evaluate dual-hop non-regenerative OFDM (Orthogonal Frequency Division Multiplexing) relay systems wit... [more] |
IT2008-118 ISEC2008-176 WBS2008-131 pp.487-491 |
WBS, IT, ISEC |
2009-03-10 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Adaptive Antidictionary Data Compression Using a Set of Restricted Length of Minimal Forbidden Words Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Commu.) IT2008-99 ISEC2008-157 WBS2008-112 |
An antidictionary is the set of all minimal strings, called Minimal Forbidden Words (MFWs), which never appear in an inp... [more] |
IT2008-99 ISEC2008-157 WBS2008-112 pp.363-370 |
WBS, IT, ISEC |
2009-03-09 13:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Advances in Public-Key Cryptography (RSA, ECC, IBE) Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63 |
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] |
IT2008-50 ISEC2008-108 WBS2008-63 pp.47-48 |
WBS, IT, ISEC |
2009-03-09 15:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Algebraic topology and sensor networks Yasuaki Hiraoka (Hiroshima Univ./JTS PRESTO), Zin Arai (Hokkaido Univ./JTS PRESTO), Kazunori Hayashi (Kyoto Univ.) IT2008-52 ISEC2008-110 WBS2008-65 |
[more] |
IT2008-52 ISEC2008-110 WBS2008-65 pp.51-56 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
An AOA-based NLOS Error Mitigation Technique for Location Estimation Takahiro Aso, Teruyuki Miyajima (Ibaraki Univ) IT2008-78 ISEC2008-136 WBS2008-91 |
In the applications of ubiquitous sensor networks, it is important to estimate sensor nodes location accurately. In an N... [more] |
IT2008-78 ISEC2008-136 WBS2008-91 pp.217-221 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
An Efficient Method for Evaluating Max-Fractional Distance Based on A Primal Path-Following Interior Point Method Makoto Miwa, Tadashi Wadayama, Ichi Takumi (Nagoya Inst. of Tech.) IT2008-108 ISEC2008-166 WBS2008-121 |
The max-fractional distance of a binary linear code is deeply related to
the performance of an linear programming (LP)... [more] |
IT2008-108 ISEC2008-166 WBS2008-121 pp.427-433 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
An enhancement of VMM snapshot utility for detcting code injection Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT) |
VMM (Virtual Machine Monitor) provide a more fine grained external
observability of virutal machine compared with previ... [more] |
ISEC2008-34 SITE2008-28 pp.129-134 |
ISEC, LOIS |
2008-11-13 14:50 |
Aichi |
Nagoya Noh Theater |
An Experiment with DPA and DEMA on FPGA Equipped on SASEBO Takahiko Syouji, Akira Nozawa, Takayuki Kimura (Y.D.K. Co.,Ltd.), Tomoyasu Suzaki, Noritaka Yamashita, Yukiyasu Tsunoo (NEC Corporation) ISEC2008-77 OIS2008-53 |
(To be available after the conference date) [more] |
ISEC2008-77 OIS2008-53 pp.29-34 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
An ID-Based 2-Functional Proxy Cryptosystem Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143 |
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] |
IT2008-130 ISEC2008-188 WBS2008-143 pp.563-568 |
ISEC |
2008-05-16 09:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An implementation of an automatic analyzer for side channel attacks Keisuke Iwai, Daisaku Minamizaki, Takakazu Kurokawa (NDA) ISEC2008-2 |
Recently, environments for experiments of side-channel attacks are being developed. On the other hand, there is not enou... [more] |
ISEC2008-2 pp.9-14 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II) Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.) |
The Partial Integrity Assurance Technology (PIAT) is a signature scheme that guarantees the integrity even if an origina... [more] |
ISEC2008-21 SITE2008-15 pp.37-44 |
WBS, IT, ISEC |
2009-03-09 16:20 |
Hokkaido |
Hakodate Mirai Univ. |
Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.) IT2008-53 ISEC2008-111 WBS2008-66 |
Stream cipher is one of primitive classes in symmetric key ciphers where plaintext symbols are combined with pseudo rand... [more] |
IT2008-53 ISEC2008-111 WBS2008-66 pp.57-64 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) ISEC2008-46 |
Applications of an iterated hash function such as HMAC require that the compression function of the hash function is a p... [more] |
ISEC2008-46 pp.81-86 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Anomaly detection based on the machine learning of the human behavior on home network Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59 |
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] |
IT2008-46 ISEC2008-104 WBS2008-59 pp.23-28 |
WBS, IT, ISEC |
2009-03-10 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
Approximate ML Symbol Detection of OSTBC-OFDM over Unknown Channels Tomoya Aizawa, Teruyuki Miyajima (Ibaraki Univ.) IT2008-114 ISEC2008-172 WBS2008-127 |
[more] |
IT2008-114 ISEC2008-172 WBS2008-127 pp.463-467 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 09:55 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Architecture Optimization of a Group Signature Circuit Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC) |
Group signature scheme is one of the most active research area in recent cryptographic algorithms/applications. Typical... [more] |
ISEC2008-40 pp.37-44 |
WBS, IT, ISEC |
2009-03-10 14:15 |
Hokkaido |
Hakodate Mirai Univ. |
Audio Watermarking Based on LDPC Code for Clipping Attack and the decoding-extracting algorithm with self-synchronization(2) Isao Abe, Yusuke Kobayashi, Raul Martinez-Noriega, Kazuhiko Yamaguchi (Univ of Electro-Comm.) IT2008-106 ISEC2008-164 WBS2008-119 |
The clipping attack is a serious problem in audio watermarking.When the watermarked audio suffer a clipping attack, it d... [more] |
IT2008-106 ISEC2008-164 WBS2008-119 pp.415-420 |
WBS, IT, ISEC |
2009-03-10 13:50 |
Hokkaido |
Hakodate Mirai Univ. |
AURORA: A Cryptographic Hash Algorithm Family Tetsu Iwata (Nagoya Univ.), Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita (Sony Corp.) IT2008-87 ISEC2008-145 WBS2008-100 |
We propose a new hash function family AURORA supporting output lengths of
224, 256, 384, and 512 bits. The AURORA fami... [more] |
IT2008-87 ISEC2008-145 WBS2008-100 pp.277-286 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Basic Study on Designing Navigation Systems for the Blind Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal) ISEC2008-26 SITE2008-20 |
The final goal of our study is building an effective tool of thought for considering both users and use situations in th... [more] |
ISEC2008-26 SITE2008-20 pp.73-80 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. -- Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST) |
The importance of security measures are considerably increasing in the recent information society. The service providers... [more] |
ISEC2008-53 pp.133-138 |
WBS, IT, ISEC |
2009-03-10 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
Bit Slice Cryptanalysis of Simplified K2 Stream Cipher Takashi Ohshima, Munetoshi Iwakiri (National Defense Academy) IT2008-83 ISEC2008-141 WBS2008-96 |
K2 is a stream cipher based on 32 bits LFSR, outputs 64 bits random number sequences with 128 bits secret key at every p... [more] |
IT2008-83 ISEC2008-141 WBS2008-96 pp.253-258 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Clone Resistance of Paper Artifact-Metrics with Segmented Matching Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU) ISEC2008-39 |
It is desired to develop excellent counterfeit deterrence techniques for artifacts such as security documents, credentia... [more] |
ISEC2008-39 pp.31-36 |
WBS, IT, ISEC |
2009-03-10 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
Closed Forms of the Achievable Rate Region for Wyner's Source Coding Systems Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-100 ISEC2008-158 WBS2008-113 |
Wyner's source coding system is one of the most fundamental fixed-length source coding systems with side information ava... [more] |
IT2008-100 ISEC2008-158 WBS2008-113 pp.371-378 |
ISEC |
2008-05-16 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Coalition Resistant Ternary Subset Difference Method Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5 |
[more] |
ISEC2008-5 pp.31-38 |
WBS, IT, ISEC |
2009-03-09 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
Collaborative Decoding Based on Average LLR in a Segment Jun Hirosawa, Tomoaki Ohtsuki (Keio Univ.) IT2008-68 ISEC2008-126 WBS2008-81 |
[more] |
IT2008-68 ISEC2008-126 WBS2008-81 pp.157-161 |
WBS, IT, ISEC |
2009-03-10 14:50 |
Hokkaido |
Hakodate Mirai Univ. |
Composition of functionalities in UC framework Tadashi Araragi (NTT), Chunhua Su, Kouichi Sakurai (Kyushu Univ.) IT2008-89 ISEC2008-147 WBS2008-102 |
This paper initiates a comprehensive approach for design method for functionality in UC framework. By combining some fun... [more] |
IT2008-89 ISEC2008-147 WBS2008-102 pp.295-299 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents Haruo Kodama (NIME) ISEC2008-25 SITE2008-19 |
It is necessary to construct Digital Rights Management(DRM) systems to promote webcasting contents. There are problems o... [more] |
ISEC2008-25 SITE2008-19 pp.67-72 |
WBS, IT, ISEC |
2009-03-10 16:40 |
Hokkaido |
Hakodate Mirai Univ. |
Construction of EUF-CMA-secure Digital Signatures Based on weak Identity-Based Signatures Takahiro Oshima, Taiichi Saito (Tokyo Denki Univ.) IT2008-129 ISEC2008-187 WBS2008-142 |
In 2004, Canetti, Halevi, and Katz proposed a construction of an IND-CCA-secure Public-Key Encryption (PKE) scheme from ... [more] |
IT2008-129 ISEC2008-187 WBS2008-142 pp.557-562 |
ISEC |
2008-12-17 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Construction of the experiment environment for the CPA attack Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-99 |
SASEBO(Side-channel Attack Standard Evaluation BOard) was developed with the aim of integrating at establishment of the ... [more] |
ISEC2008-99 pp.61-66 |
WBS, IT, ISEC |
2009-03-10 16:40 |
Hokkaido |
Hakodate Mirai Univ. |
Constructions of Irregular LDPC Code for a Burst Erasure Gou Hosoya (Wased Univ.), Manabu Kobayashi (Shonan Inst. of Tech.), Shigeichi Hirasawa (Wased Univ.) IT2008-111 ISEC2008-169 WBS2008-124 |
We develope two methodology of constructing irregular low-density parity-check (LDPC) code for correcting a burst erasur... [more] |
IT2008-111 ISEC2008-169 WBS2008-124 pp.447-452 |
WBS, IT, ISEC |
2009-03-09 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
Cooperative Spectrum Sensing Techniques Using Decision Comparison for Cognitive Radio Systems Including Malicious Nodes Toru Sakaguchi, Tomoaki Ohtsuki (Keio Univ.) IT2008-73 ISEC2008-131 WBS2008-86 |
We consider cooperative spectrum sensing based on energy detection. The performance of cooperative spectrum sensing is l... [more] |
IT2008-73 ISEC2008-131 WBS2008-86 pp.185-192 |
ISEC |
2008-09-12 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Parameter Generation with Security and Efficiency -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (TOSHIBA Corp.) ISEC2008-67 |
We study on algebraic tori defined on extension field as cryptographic groups to construct public key encryption schemes... [more] |
ISEC2008-67 pp.25-32 |
ISEC |
2008-12-17 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Some Efficient Algorithms for Squaring -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) ISEC2008-97 |
To construct a efficient algebraic torus-based public key encryption scheme is one of our goals. An efficient scheme is ... [more] |
ISEC2008-97 pp.45-52 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Data Dissemination in Mobile Environment Using Collaborative Approach Mohd Rashid, Atsushi Kinjo, Tomokazu Nagata, Shiro Tamaki (Univ. of the Ryukyus) IT2008-59 ISEC2008-117 WBS2008-72 |
Data dissemination in mobile environment has attracted the research community for its various applications. The academic... [more] |
IT2008-59 ISEC2008-117 WBS2008-72 pp.99-104 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Design Policy of MPKC based on Piece in Hand Concept Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12 |
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] |
ISEC2008-18 SITE2008-12 pp.15-22 |
WBS, IT, ISEC |
2009-03-10 17:30 |
Hokkaido |
Hakodate Mirai Univ. |
Detecting anomalies by monitoring terminals in Home Network Kengo Kuniyoshi, Masakatu Morii (Kobe Univ.) IT2008-94 ISEC2008-152 WBS2008-107 |
The system like IDS and IPS based on the handcrafted signatures which represent the illegal characteristics is effective... [more] |
IT2008-94 ISEC2008-152 WBS2008-107 pp.329-334 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 09:55 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Detecting of Unknown Computer Virus Variants Based on Computer Behavior Haruka Mimori, Koki Abe (UEC) ISEC2008-35 |
We observed the behavior of computer viruses by monitoring the behavior of computers infected by the mass-mailing viruse... [more] |
ISEC2008-35 pp.1-8 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Development of publicity function of the illegitimate activity host by the IP marking Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many problems regarding the P2P file exchange environment on the Internet.
The need to reconsider t... [more] |
ISEC2008-61 pp.189-194 |
ISEC, LOIS |
2008-11-14 11:20 |
Aichi |
Nagoya Noh Theater |
Dynamic Node Relocation Algorithm for Improvement Communication Quality in Multi-hop Wireless Network Yoko Furuzumi, Yukikazu Nakamoto (Hyogo Univ.) ISEC2008-86 OIS2008-62 |
We studied how to relocate mobile devices to achieve high communications quality, one of quality of serve in a mobile wi... [more] |
ISEC2008-86 OIS2008-62 pp.83-88 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68 |
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] |
IT2008-55 ISEC2008-113 WBS2008-68 pp.71-78 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Efficiency of a Redactable Signature with Tree Construction Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.) |
A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of som... [more] |
ISEC2008-22 SITE2008-16 pp.45-50 |
WBS, IT, ISEC |
2009-03-10 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
Elliptic curves with a pre-determined embedding degree Shoujirou Hirasawa, Atsuko Miyaji (JAIST) IT2008-79 ISEC2008-137 WBS2008-92 |
A paring over an elliptic-curve E(F_{p^m}) to an extension field of F_{p^{mk}} has begun to be attractive to cryptosyste... [more] |
IT2008-79 ISEC2008-137 WBS2008-92 pp.223-229 |
ISEC, LOIS |
2008-11-14 09:30 |
Aichi |
Nagoya Noh Theater |
Elliptic curves with a pre-determined embedding degree. Shoujirou Hirasawa, Atsuko Miyaji (Japan Advanced Instisute of Science and Technology) ISEC2008-82 OIS2008-58 |
Embedding degree k is one indicator to the difference between on the elliptic curve discrete logarithm problem (ECDLP) a... [more] |
ISEC2008-82 OIS2008-58 pp.63-66 |
WBS, IT, ISEC |
2009-03-10 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
Error Exponents for Wyner's Source Coding System Tetsunao Matsuta, Shun Watanabe, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-101 ISEC2008-159 WBS2008-114 |
Wyner's source coding system is one of the most fundamental fixed-length source coding systems with side information.
T... [more] |
IT2008-101 ISEC2008-159 WBS2008-114 pp.379-385 |
WBS, IT, ISEC |
2009-03-09 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
Error-Trellis State Complexity of LDPC Convolutional Codes Based on Circulant Matrices Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) IT2008-61 ISEC2008-119 WBS2008-74 |
Let H(D) be the parity-check matrix of an LDPC convolutional code corresponding to the parity-check matrix H of a quasi-... [more] |
IT2008-61 ISEC2008-119 WBS2008-74 pp.109-116 |
ISEC |
2008-09-12 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Estimating RSA Private-Keys Generated in Security Chips Tsutomu Matsumoto, Yoshio Takahashi (YNU) ISEC2008-71 |
For a particular instance of TPM - Trusted Platform Module, we have shown that the RSA private keys generated inside the... [more] |
ISEC2008-71 pp.55-62 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Examination of the issues in designing of electronic signature documentation system Miyuki Takao, Koichiro Hayashi (IISEC) ISEC2008-38 |
Electronic signature and Digital timestamp are new technologies which provide high level integrity to digital data. But ... [more] |
ISEC2008-38 pp.23-30 |
ISEC |
2008-12-17 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fast Exponentiation Methods for Cryptosystems on Algebraic Tori Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba) ISEC2008-98 |
[more] |
ISEC2008-98 pp.53-60 |
WBS, IT, ISEC |
2009-03-10 13:25 |
Hokkaido |
Hakodate Mirai Univ. |
Formalizing Security of Hash Functions Against Length-Extension Attacks Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) IT2008-86 ISEC2008-144 WBS2008-99 |
Although the resistance of length-extension attacksas well as collision resistanceis an important factor for SHA-3,NIST'... [more] |
IT2008-86 ISEC2008-144 WBS2008-99 pp.273-276 |
WBS, IT, ISEC |
2009-03-10 14:15 |
Hokkaido |
Hakodate Mirai Univ. |
Hardware Implementations of the Cryptographic Hash Function Familiy AURORA Toru Akishita (Sony), Tadaoki Yamamoto, Hiroyuki Abe (Sony LSI Design) IT2008-88 ISEC2008-146 WBS2008-101 |
This paper presents optimization techniques and evaluation results in hardware implementations of the hash function fami... [more] |
IT2008-88 ISEC2008-146 WBS2008-101 pp.287-294 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Hash Function Using MMO Compression Function and MDP Domain Extension Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.) ISEC2008-47 |
[more] |
ISEC2008-47 pp.87-94 |
WBS, IT, ISEC |
2009-03-09 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
Hierarchical Modulation Schemes with APSK on the Road side to Vehicle Communication Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.), Koichiro Hashiura (Ibaraki Univ.) IT2008-69 ISEC2008-127 WBS2008-82 |
In this paper, it is proposed the information broadcasting system that the transmission signal embraces together the wid... [more] |
IT2008-69 ISEC2008-127 WBS2008-82 pp.163-166 |
ISEC |
2008-09-12 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
How to introduce the dynamic key to a provably Secure Block Cipher using FPGA Partial Reconfiguration Kenji Takahashi, Tetsuya Ichikawa (Mitsubishi Electric Engineering), Toru Sorimachi (Mitsubishi Electric) ISEC2008-72 |
Cipher circuits are required both to have high security and to show high performance as to circuit scale and processing ... [more] |
ISEC2008-72 pp.63-68 |
ISEC |
2008-05-16 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Hybrid Encryption Scheme in IBE with Applications to Data Storage Hirokazu Ougi (free) ISEC2008-14 |
[more] |
ISEC2008-14 pp.91-98 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 16:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) ISEC2008-58 |
[more] |
ISEC2008-58 pp.169-176 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Implementation of Block Cipher Camellia with a Configurable and Extensible Processor Kazuyoshi Matsuo, Koki Abe (UEC) ISEC2008-45 |
Camellia, a block cipher algorithm, has been implemented on a configurable and extensible processor to measure cycles an... [more] |
ISEC2008-45 pp.75-80 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.) |
When a cellular phone is lost or stolen, it may be unjustly used by a malicious user. There are many cellular phones wit... [more] |
ISEC2008-24 SITE2008-18 pp.59-66 |
WBS, IT, ISEC |
2009-03-10 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
Improvement of LFSR Initial State Reconstruction Algorithm in Fast Correlation Attack Using Dynamically Constructed Parity Check Equations Hiroaki Saitoh, Masami Mohri (Gifu Univ.), Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-84 ISEC2008-142 WBS2008-97 |
Fast correlation attack (FCA) has been known as a method of cryptanalysis for the unpredictability of Nonlinear Combiner... [more] |
IT2008-84 ISEC2008-142 WBS2008-97 pp.259-266 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems Ryoya Miyazawa, Koki Abe (UEC) ISEC2008-36 |
[more] |
ISEC2008-36 pp.9-14 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Influence of channel errors on a wireless-controlled rotary inverted pendulum Reo Kohinata, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.) IT2008-70 ISEC2008-128 WBS2008-83 |
This paper discusses the influence of channel features to the performance of a wireless-controlled system. As an example... [more] |
IT2008-70 ISEC2008-128 WBS2008-83 pp.167-172 |
WBS, IT, ISEC |
2009-03-10 14:15 |
Hokkaido |
Hakodate Mirai Univ. |
Influence of scintillation on optical wireless CSK with extended prime code sequences Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) IT2008-124 ISEC2008-182 WBS2008-137 |
In this paper, optical wireless code-shift keying systems with extended prime code sequences are considered.
The bit er... [more] |
IT2008-124 ISEC2008-182 WBS2008-137 pp.527-530 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.) |
Digital watermarks provide the capability to add extra information to various media, such as still images, movies and au... [more] |
ISEC2008-44 pp.69-74 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Information Leakage Prevention Function of host based for P2P File Exchange Environment Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many incidents to which the classified information of the individual or the organization flows out i... [more] |
ISEC2008-32 SITE2008-26 pp.115-122 |
ISEC |
2008-05-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12 |
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] |
ISEC2008-12 pp.77-84 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Invalidation of a Mailing-list Address against Spam Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2008-50 pp.109-116 |
WBS, IT, ISEC |
2009-03-10 13:50 |
Hokkaido |
Hakodate Mirai Univ. |
Investigation on an effect of Single/Double Optical Hard Limiter in the optical CDMA systems
-- Effect of quantum noises on OHL -- Chinatsu Ito (Polytechnic Univ.), Noboru Ochiai (Ibarki Pref. Academy of Industrial Tech.), Takeshi Nagao (Sansou System), Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.) IT2008-123 ISEC2008-181 WBS2008-136 |
Degradation of bit error rate by multi user interferences(MUI) was considered asa big problem for direct modulation opti... [more] |
IT2008-123 ISEC2008-181 WBS2008-136 pp.519-526 |
WBS, IT, ISEC |
2009-03-09 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
[Special Talk]
ISSSTA2008 and ICUWB2008 Conference Report Kohei Ohno (Tokyo Univ. of Science), Tetsushi Ikegami (Meiji Univ.) IT2008-74 ISEC2008-132 WBS2008-87 |
An international conference ISSSTA 2008 (10th IEEE International Symposium on Spread Spectrum Techniques and Applicatio... [more] |
IT2008-74 ISEC2008-132 WBS2008-87 pp.193-198 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Knapsack Cryptosystem on Elliptic Curves of Trace Tow Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-19 SITE2008-13 |
The LLL algorithm is strong algorithm that decrypts the additional type Knapsack cryptosystem.However, the LLL algorithm... [more] |
ISEC2008-19 SITE2008-13 pp.23-26 |
WBS, IT, ISEC |
2009-03-09 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
Markovian Coded Gaussian Filter with its application to Filterbanks Tohru Kohda, Yutaka Jitsumatsu, Tatsuma Kuwazaki, Kenjiro Fujino (Kyushu Univ.) IT2008-58 ISEC2008-116 WBS2008-71 |
In code division multiple access (CDMA) systems, spreading code is introduced as the third axis in addition to the time ... [more] |
IT2008-58 ISEC2008-116 WBS2008-71 pp.91-98 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
McEliece Digital Signature with LDPC codes
-- Practicality and Security Evaluation -- Shigenori Yamakawa (Chuo Univ.), Yang Cui, Manabu Hagiwara, Kazukuni Kobara (AIST/Chuo Univ.), Hideki Imai (Chuo Univ./AIST) IT2008-126 ISEC2008-184 WBS2008-139 |
Most of the current public-key cryptosystems (PKCs) are considered to be broken if a quantum computer
is realized in th... [more] |
IT2008-126 ISEC2008-184 WBS2008-139 pp.537-543 |
ISEC |
2008-12-17 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Measure of failure for the company infrastructure Koichiro Ozasa, Satoshi Ono (Kogakuin Univ.) ISEC2008-89 |
Today ,Dependence degree to IT infrastructure of a company rises, and I consider the reason why fail over of obstacle me... [more] |
ISEC2008-89 pp.1-5 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
Minimum span analysis for a combined graph ensemble of low-density parity-check codes Yujin Ishikawa, Yoshiyuki Sato, Gou Hosoya, Shigeichi Hirasawa (Waseda Univ.) IT2008-109 ISEC2008-167 WBS2008-122 |
The combination of the low-density parity-check (LDPC) code and the belif-propagation (BP) decoding algorithm exhibits a... [more] |
IT2008-109 ISEC2008-167 WBS2008-122 pp.435-440 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Modulation Classification Based on Amplitude and Cosine moments Shinji Ohara, Masato Kita, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2008-60 ISEC2008-118 WBS2008-73 |
Recently cognitive radios attract much attention, because it leads to flexible and high capacity wireless systems. Modul... [more] |
IT2008-60 ISEC2008-118 WBS2008-73 pp.105-108 |
WBS, IT, ISEC |
2009-03-10 15:15 |
Hokkaido |
Hakodate Mirai Univ. |
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103 |
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] |
IT2008-90 ISEC2008-148 WBS2008-103 pp.301-306 |
ISEC, LOIS |
2008-11-13 15:40 |
Aichi |
Nagoya Noh Theater |
Multivariate Public-Key Cryptosystems Constructed Based on K(I).SE(1)Scheme and Applications of MPKC on Common Key Cryptosystem Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-79 OIS2008-55 |
[more] |
ISEC2008-79 OIS2008-55 pp.41-46 |
ISEC |
2008-12-17 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Negotiate the Trust built in The Internet Takashi Hosokawa, Satoshi Ono (Kogakuin Univ.) ISEC2008-92 |
[more] |
ISEC2008-92 pp.15-18 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Network Usage Control Based on Evaluation of User Security Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58 |
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] |
IT2008-45 ISEC2008-103 WBS2008-58 pp.15-22 |
ISEC |
2008-05-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Error Control Coding Masao Kasahara (OGU) ISEC2008-13 |
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] |
ISEC2008-13 pp.85-90 |
ISEC |
2008-09-12 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Classes of Public Key Cryptosystems Constructed on the Basis of Low-Density Multivariate Polynomials
-- Along with K(I) Knapsack Scheme -- Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-63 |
Extensive studies have been made of the public key cryptosystems based on multivariate polynomials over $\mathbb{F}_{2}$... [more] |
ISEC2008-63 pp.1-7 |
ISEC |
2008-05-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Impossible Differentials of CLEFIA Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2008-3 |
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. T... [more] |
ISEC2008-3 pp.15-22 |
ISEC |
2008-09-12 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Trapdoors in Knapsack Public-Key Cryptosystem with Two Sequences as Public Key Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-64 |
Present authors proposed a new class of knasack PKC (KMN PKC) which uses two sequences as the public key.
KMN PKC uses... [more] |
ISEC2008-64 pp.9-16 |
ISEC, LOIS |
2008-11-13 13:00 |
Aichi |
Nagoya Noh Theater |
On Host-based Packet Capturing Mechanism for Network Forensics Shunsuke Inai (Nagoya Institute of Technology), Youji Fukuta (Aichi Univ. of Edu.), Shoji Mizobuchi (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Institute of Technology), Ryoji Noguchi (Toyotsu Syscom Corp.) ISEC2008-73 OIS2008-49 |
Digital forensics is application of computer crime investigation and analysis techniques in the interests of determing p... [more] |
ISEC2008-73 OIS2008-49 pp.1-6 |
WBS, IT, ISEC |
2009-03-10 16:40 |
Hokkaido |
Hakodate Mirai Univ. |
On incident forecasting using independent component alalysis Eisuke Nishino, Jun'ichi Takeuchi (Kyushu Univ./Info Tech and Nanotechnologies), Katsunari Yoshioka (Yokohama National Univ.), Daisuke Inoue, Masashi Eto, Koji Nakao (NICT) IT2008-92 ISEC2008-150 WBS2008-105 |
For network security, measures against security incidents of worm infection and DDoS attack are important.In general, pr... [more] |
IT2008-92 ISEC2008-150 WBS2008-105 pp.315-320 |
ISEC, LOIS |
2008-11-14 10:45 |
Aichi |
Nagoya Noh Theater |
On lattice bases for the Lagarias-Odlyzko attack against TSP cryptosystems Takeshi Taniguchi, Akira Hayashi (Kanazawa Institute of Technology) ISEC2008-85 OIS2008-61 |
The Lagarias-Odlyzko (LO) method is a tool for attacks against many variants of knapsack cryptosystems.Specifically it i... [more] |
ISEC2008-85 OIS2008-61 pp.79-82 |
ISEC |
2008-12-17 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography Mitsuru Hamada (Tamagawa Univ.) ISEC2008-95 |
[more] |
ISEC2008-95 pp.33-40 |
WBS, IT, ISEC |
2009-03-10 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
On the Admissible Rate Region of Slepian-Wolf Coding Problem with LDPC Code and Mismatched Decoder Kazuhiro Yamasaki, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-102 ISEC2008-160 WBS2008-115 |
Recently, the application of the {\it low density parity check} (LDPC) codes to Slepian-Wolf source coding problem is st... [more] |
IT2008-102 ISEC2008-160 WBS2008-115 pp.387-393 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
On the Computational Complexity of the Discrete Logarithm Problem over Algebraic Tori Yuji Nishigaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) IT2008-127 ISEC2008-185 WBS2008-140 |
In this paper we investigate the computational complexity of the discrete logarithm problem over algebraic tori (TDLP).
... [more] |
IT2008-127 ISEC2008-185 WBS2008-140 pp.545-550 |
ISEC |
2008-05-16 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Construction of the Set-Intersection Protocols from Blind Signatures Ryo Nojima (NICT), Youki Kadobayashi (NAIST) ISEC2008-9 |
In this paper, we propose a simple and efficient two-party set-intersection protocol. Contrary to the previous protocols... [more] |
ISEC2008-9 pp.57-60 |
ISEC, LOIS |
2008-11-13 15:15 |
Aichi |
Nagoya Noh Theater |
On the Hardness of Discrete Logarithm Problem in Algebraic Tori Hirofumi Muratani, Tomoko Yonemura, Taichi Isogai, Kenji Ohkuma, Yoshikazu Hanatani, Kenichiro Furuta, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corporation) ISEC2008-78 OIS2008-54 |
[more] |
ISEC2008-78 OIS2008-54 pp.35-40 |
WBS, IT, ISEC |
2009-03-09 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
On the Possibility of Taking off Prime Number Generation in RSA-based Access Control Jin Tamura (NICT) IT2008-47 ISEC2008-105 WBS2008-60 |
An Access Control Scheme, which was proposed by Chick et al. in CRYPTO89, has applied into many applications (Broadcast ... [more] |
IT2008-47 ISEC2008-105 WBS2008-60 pp.29-33 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 -- Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.) ISEC2008-17 SITE2008-11 |
MOCHIGOMA (Piece in Hand) system is an encryption algorithm proposed by
Tujii et al. in 2003, for enhancing the securi... [more] |
ISEC2008-17 SITE2008-11 pp.9-14 |
WBS, IT, ISEC |
2009-03-10 16:05 |
Hokkaido |
Hakodate Mirai Univ. |
On the Security of Torus-based Cryptography and Pairing Inversion Problem Hirofumi Muratani, Tomoko Yonemura, Kenji Ohkuma, Taichi Isogai, Kenichiro Furuta, Yoshikazu Hanatani, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corp.) IT2008-128 ISEC2008-186 WBS2008-141 |
[more] |
IT2008-128 ISEC2008-186 WBS2008-141 pp.551-556 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA) ISEC2008-20 SITE2008-14 |
[more] |
ISEC2008-20 SITE2008-14 pp.27-36 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 17:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems -- Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23 |
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] |
ISEC2008-29 SITE2008-23 pp.97-102 |
WBS, IT, ISEC |
2009-03-10 13:25 |
Hokkaido |
Hakodate Mirai Univ. |
Optimal Axis Compensation in Quantum Key Distribution Protocols Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-104 ISEC2008-162 WBS2008-117 |
We show the optimal axis compensations
maximizing the key generation rate
for unital channels.
We consider the case ... [more] |
IT2008-104 ISEC2008-162 WBS2008-117 pp.401-407 |
ISEC, LOIS |
2008-11-14 11:45 |
Aichi |
Nagoya Noh Theater |
Overseas Trends on and a Consideration about Privacy Protection and Utilization Technologies Takashi Hatashima, Shigeaki Tanimoto, Katsumi Takahashi (Nippon Telegraph and Telephone Corporation) ISEC2008-87 OIS2008-63 |
For realizing a secure IT society under the ubiquitous environments, it is important that implementing security counterm... [more] |
ISEC2008-87 OIS2008-63 pp.89-96 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
P2P Node Detection method based on Connection Analysis Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.) |
Recently, increasing number of information leaks by viruses in the P2P network are becoming big problem. And P2P file sh... [more] |
ISEC2008-62 pp.195-200 |
WBS, IT, ISEC |
2009-03-09 14:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Performance Evaluation of Error Correcting Codes Toru Fujiwara (Osaka Univ.) IT2008-51 ISEC2008-109 WBS2008-64 |
In this talk, performance analysis on error correcting codes used in digtal watermarking and in network coding is discus... [more] |
IT2008-51 ISEC2008-109 WBS2008-64 p.49 |
WBS, IT, ISEC |
2009-03-10 13:25 |
Hokkaido |
Hakodate Mirai Univ. |
Phase Compensation for Narrowband Power-Line Communication Channels with Cyclic Time-Varying Features Yoshie Sugiura, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.) IT2008-122 ISEC2008-180 WBS2008-135 |
Phase transfer functions of power-line channels often show sharp and
periodic variation synchronous to the (double of) ... [more] |
IT2008-122 ISEC2008-180 WBS2008-135 pp.513-518 |
ISEC |
2008-12-17 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Power Analysis against a FPGA Implementation of the AES with SubBytes in a memory table Hiroyuki Kawakita, Yusei Nishimoto, Kiyohiko Ishikawa, Hiroyuki Imaizumi (NHK) ISEC2008-100 |
[more] |
ISEC2008-100 pp.67-72 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69 |
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] |
IT2008-56 ISEC2008-114 WBS2008-69 pp.79-84 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Proposal of a Cue & Response Based User Authentication Using Unclear Image Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.) |
[more] |
ISEC2008-51 pp.117-124 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Proposal of Anonymos Routing Technique with DHT Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.) |
The immense amount of information is processed on the network by the spread of the Internet.Therefore problems such as l... [more] |
ISEC2008-43 pp.61-68 |
WBS, IT, ISEC |
2009-03-10 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
Proposal of MIMO-SDM System considering Correlation of Channels Tatsuhiko Yoshihara, Masayuki Yoshida, Fumiaki Maehara, Fumio Takahata (Waseda Univ.), Takashi Onodera (Sharp Corp.) IT2008-120 ISEC2008-178 WBS2008-133 |
A MIMO-OFDM-SDM system, which provides good transmission quality irrespective of various condition of propagation channe... [more] |
IT2008-120 ISEC2008-178 WBS2008-133 pp.501-506 |
WBS, IT, ISEC |
2009-03-09 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
Proposal of Piece Falsification Detection Method on JetJigsaw Tatsuyuki Matsushita, Kentaro Umesawa, Shinji Yamanaka (Toshiba) IT2008-43 ISEC2008-101 WBS2008-56 |
In SCIS2009, we proposed JetJigsaw, a content delivery method with content protection mechanism[SCIS2009]. We introduced... [more] |
IT2008-43 ISEC2008-101 WBS2008-56 pp.1-6 |
ISEC |
2008-05-16 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reconsideration of Algorithmic Tamper Proof Devices using PIN (part 2) Yuichi Komano (Toshiba), Kazuo Ohta (UEC), Hideyuki Miyake, Atsushi Shimbo (Toshiba) ISEC2008-7 |
Gennaro et al.~discussed the algorithmic tamper proof (ATP) devices using the personal identification number (PIN); and ... [more] |
ISEC2008-7 pp.43-48 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Reduced-Rank MMSE Signal Detection for MC/CDMA Communication Systems Akihiko Furuya, Tsuyoshi Ichikawa, Kohei Otake (Hosei Univ.) IT2008-71 ISEC2008-129 WBS2008-84 |
The MC/CDMA communication system has received much attention as one of the most promising systems for the future high-sp... [more] |
IT2008-71 ISEC2008-129 WBS2008-84 pp.173-178 |
ISEC |
2008-09-12 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reduction of Public-Key Size in a Revocable Group Signature Scheme with Constant Costs for Signing and Verifying Hiroki Fujii, Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-68 |
Group signature scheme is the digital signature scheme enhancing the privacy of the user. We proposed a revocable scheme... [more] |
ISEC2008-68 pp.33-38 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC) |
As personal information comes to be in digital and transferred on networks, its leakage is becoming more and more seriou... [more] |
ISEC2008-42 pp.53-60 |
WBS, IT, ISEC |
2009-03-09 16:20 |
Hokkaido |
Hakodate Mirai Univ. |
Relationship among Conditional Complexities of Individual Sequences Yuki Tanaka, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-64 ISEC2008-122 WBS2008-77 |
Conditional complexities of individual sequences are known as lower bounds on the compression rate attainable by some cl... [more] |
IT2008-64 ISEC2008-122 WBS2008-77 pp.129-136 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
Reliability Function, Asymptotic Distance Ratio, and The Probability of Undetected Error for Product Codes Toshihisa Nishijima (Hosei Univ.), Kin-ichiroh Tokiwa (Osaka Sangyo Univ.) IT2008-112 ISEC2008-170 WBS2008-125 |
It is well known that each bound of reliability function, asymptotic distance ratio, and the probability of undetected e... [more] |
IT2008-112 ISEC2008-170 WBS2008-125 pp.453-457 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Ring Authenticated Group Key Establishment with Member Repudiation Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo) ISEC2008-56 |
In this paper, we first extend the Deniable Ring Authentication Protocol proposed by M. Naor to include key establishmen... [more] |
ISEC2008-56 pp.155-162 |
ISEC |
2008-09-12 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Security Analysis on Electronic Money Systems including Compromise of Cryptographic Algorithms and/or Devices Masataka Suzuki, Katsuhisa Hirokawa (BOJ) ISEC2008-69 |
This paper mainly focuses on note-based types of prepaid electronic money systems. Assuming compromise of cryptographic ... [more] |
ISEC2008-69 pp.39-46 |
WBS, IT, ISEC |
2009-03-09 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2008-49 ISEC2008-107 WBS2008-62 |
Recently present authors proposed a double-sequence knapsack public key cryptosystem on the basis of MH PKC(KMN PKC). We... [more] |
IT2008-49 ISEC2008-107 WBS2008-62 pp.41-45 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Self expandable RBAC for distributed systems Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC) |
(To be available after the conference date) [more] |
ISEC2008-52 pp.125-132 |
ISEC |
2008-12-17 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Self-construction of Home Domain by Using Entry Device List Sho Ikeyama, Yoshihiro Hori, Yoshiaki Shiraishi, Akira Iwata (NIT) ISEC2008-93 |
As digitalized contents increased, contents protection has become natural. However, usability has been sacrificed compar... [more] |
ISEC2008-93 pp.19-26 |
WBS, IT, ISEC |
2009-03-09 16:45 |
Hokkaido |
Hakodate Mirai Univ. |
Sharing Multilevel Secrets among Groups Using Concatenation of Reed-Solomon Codes Hachiro Fujita (Tokyo Metropolitan Univ.), Chigusa Kawashima (Univ. of Electro-Comm.), Tomoko K. Matsushima (Polytechnic Univ.) IT2008-54 ISEC2008-112 WBS2008-67 |
[more] |
IT2008-54 ISEC2008-112 WBS2008-67 pp.65-70 |
WBS, IT, ISEC |
2009-03-09 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
Spectrum spreading sequences generated by chaotic dynamics and its correlational properties Tohru Kohda, Takao Une, Yuichiro Koura (Kyushu Univ.) IT2008-57 ISEC2008-115 WBS2008-70 |
The performance of code division multiple access (CDMA) system
largely depends on the SS codes.
Many methods of genera... [more] |
IT2008-57 ISEC2008-115 WBS2008-70 pp.85-90 |
WBS, IT, ISEC |
2009-03-10 13:00 |
Hokkaido |
Hakodate Mirai Univ. |
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code Shun Watanabe, Tsuki Saitou, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-103 ISEC2008-161 WBS2008-116 |
The privacy amplification is a technique to distill
a secret key from a random variable by a function
so that the dist... [more] |
IT2008-103 ISEC2008-161 WBS2008-116 pp.395-400 |
ISEC |
2008-05-16 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2008-15 |
There is an open problem to construct ID-based signature schemes which satisfy strongly EUF-ID-CMA, without random oracl... [more] |
ISEC2008-15 pp.99-106 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study of Database for information sharing of P2P File Exchange Environment Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi) |
Recently, there are many problems regarding the P2P file exchange environment on the Internet. The need to reconsider th... [more] |
ISEC2008-33 SITE2008-27 pp.123-128 |
ISEC, LOIS |
2008-11-13 13:50 |
Aichi |
Nagoya Noh Theater |
Study of e-P.O.Box Basic System for The Social Security Service Takashi Obi, Masuyoshi Yachida, Joong Sun Lee, Yuji Homma, Nagaaki Ohyama (Tokyo Inst. of Tech.), Takumi Kashiwagi, Hiromasa Kawamura, Eikazu Niwano (Nippon Tetegraph and telephone Corporation) ISEC2008-75 OIS2008-51 |
It is the current situation that people's social security information is separately managed by each organization and the... [more] |
ISEC2008-75 OIS2008-51 pp.15-22 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 17:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study of method for expressing context Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS) ISEC2008-30 SITE2008-24 |
In the contemporary society that overflows with information, it becomes difficult to treat the flood of information.
T... [more] |
ISEC2008-30 SITE2008-24 pp.103-108 |
WBS, IT, ISEC |
2009-03-10 14:40 |
Hokkaido |
Hakodate Mirai Univ. |
Study on Multipulse PPM using Replaced Permutation System for Broadcasting Optical Wireless Communications Toshiki Kato, Fumie Ono (Yokohama National Univ.), Hiromasa Habuchi (Ibaraki Univ.) IT2008-125 ISEC2008-183 WBS2008-138 |
In this paper, a repeated permutation multipulse pulse position modulation system for broadcasting optical wireless comm... [more] |
IT2008-125 ISEC2008-183 WBS2008-138 pp.531-535 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study on Reputation Systems for Trusty Information Network Noriaki Yoshikai (Niohn Univ.) ISEC2008-28 SITE2008-22 |
[more] |
ISEC2008-28 SITE2008-22 pp.89-96 |
WBS, IT, ISEC |
2009-03-10 16:05 |
Hokkaido |
Hakodate Mirai Univ. |
Sufficient Conditions for Convergence of the Sum-Product Decoding Tomoharu Shibuya (Sophia Univ.) IT2008-110 ISEC2008-168 WBS2008-123 |
Recently, Mooij et al. proposed sufficient conditions for convergence
of the sum-product algorithm, which was stated as... [more] |
IT2008-110 ISEC2008-168 WBS2008-123 pp.441-446 |
WBS, IT, ISEC |
2009-03-09 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
Sum-Product decoding of 3GPP Turbo Code Toru Anzai, Toshiyuki Shohon, Haruo Ogiwara (Nagaoka Univ. of Tech.) IT2008-63 ISEC2008-121 WBS2008-76 |
Turbo code has been adopted for the third-generation mobile phone standard (3GPP standard), and it will be adopted for n... [more] |
IT2008-63 ISEC2008-121 WBS2008-76 pp.123-128 |
WBS, IT, ISEC |
2009-03-10 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
The Distinguishing Attack on the Stream Cipher Consisting of the SPN Structure Rei Onga, Ryoichi Teramura, Masakatu Morii (Kobe Univ.) IT2008-82 ISEC2008-140 WBS2008-95 |
The square attack is the key recovery attack on the block cipher like AES and Camellia.
This paper proposes a distingui... [more] |
IT2008-82 ISEC2008-140 WBS2008-95 pp.245-251 |
ISEC |
2008-09-12 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The security analysis using meta-reduction under several computational assumptions in the case of ElGamal encryption Yutaka Kawai, Kazuo Ohta (UEC) ISEC2008-70 |
[more] |
ISEC2008-70 pp.47-54 |
WBS, IT, ISEC |
2009-03-10 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Theoretical Analysis of Bit Error Rate for MB-OFDM System in the Presence of Frequency Characteristics between Sub-bands Ryouhei Kaneko, Fumiaki Maehara (Waseda Univ.) IT2008-117 ISEC2008-175 WBS2008-130 |
Multiband orthogonal frequency division multiplexing (MB-OFDM) system for ultra wideband (UWB) communication spreads sub... [more] |
IT2008-117 ISEC2008-175 WBS2008-130 pp.481-485 |
WBS, IT, ISEC |
2009-03-10 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Theoretical Analysis of Error Rate for IP Packet on Coded OFDM Systems Yu Komatsu, Fumiaki Maehara (Waseda Univ.) IT2008-116 ISEC2008-174 WBS2008-129 |
OFDM is one of the promising techniques to realize IP-based broadband wireless communications systems. Since performance... [more] |
IT2008-116 ISEC2008-174 WBS2008-129 pp.475-479 |
ISEC, LOIS |
2008-11-14 09:55 |
Aichi |
Nagoya Noh Theater |
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences Masahiro Sukegawa, Atsuko Miyaji (Japan Advanced Institute of Science and Technology) ISEC2008-83 OIS2008-59 |
In this paper, we focus on a shuffle-exchange structure of PRGA.
We investigate how the structure mixes the permutatio... [more] |
ISEC2008-83 OIS2008-59 pp.67-72 |
WBS, IT, ISEC |
2009-03-10 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (1) Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-80 ISEC2008-138 WBS2008-93 |
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$,... [more] |
IT2008-80 ISEC2008-138 WBS2008-93 pp.231-237 |
WBS, IT, ISEC |
2009-03-10 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (2) Mitsuki Ajiro, Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-81 ISEC2008-139 WBS2008-94 |
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the transitions of two permutations, S and S′,
with... [more] |
IT2008-81 ISEC2008-139 WBS2008-94 pp.239-244 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
TOA UWB Position Estimation with 2 receivers and one known reflector Jan Kietlinski-Zaleski, Takaya Yamazato, Masaaki Katayama (Nagoya Univ.) IT2008-77 ISEC2008-135 WBS2008-90 |
Ultra-Wideband is an attractive technology for short range positioning, especially indoors. However, for normal Time of ... [more] |
IT2008-77 ISEC2008-135 WBS2008-90 pp.211-216 |
WBS, IT, ISEC |
2009-03-10 17:55 |
Hokkaido |
Hakodate Mirai Univ. |
Traffic Data Visualization of a Campus-wide Network Shun Matsumoto, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Pref. Univ.) IT2008-95 ISEC2008-153 WBS2008-108 |
Due to increasing number of attacks over the network, it becomes essential for network administrators to properly to kee... [more] |
IT2008-95 ISEC2008-153 WBS2008-108 pp.335-342 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Traitor Tracing from ID based Broadcast Encryption Ryuichi Sakai (OECU) ISEC2008-48 |
ID based broadcast encryption scheme based on the key setting of Mitsunari-Ssakai-Kasahara
traitor tracing has several... [more] |
ISEC2008-48 pp.95-100 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Travel Time Forecasting based on Wavelet Method Yusuke Kakihara, Jun'ichi Takeuchi (Kyushu Univ), Takashi Fujita, Eijen Yao (NEC Corp.), Hiromasa Oka (Mitsubishi Electric Information Network Corp.) IT2008-67 ISEC2008-125 WBS2008-80 |
A wavelet-based approach for travel time prediction is introduced.It is based on a multiple resolution decomposition
of... [more] |
IT2008-67 ISEC2008-125 WBS2008-80 pp.151-156 |
ISEC, LOIS |
2008-11-14 10:20 |
Aichi |
Nagoya Noh Theater |
Uniquely decipherable Rabin cryptosystem with modulus p^kq Kensuke Takamura, Akira Hayashi (Kanazawa Institute of Technology) ISEC2008-84 OIS2008-60 |
T. Takagi proposed and analyzed variants of the RSA cryptosystem, in which the modulus is $p^k q$. He also suggested a v... [more] |
ISEC2008-84 OIS2008-60 pp.73-78 |
WBS, IT, ISEC |
2009-03-10 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Universal Lossless Source Coding Based on Sequential Grammar Transforms Masaki Jono, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2008-98 ISEC2008-156 WBS2008-111 |
The grammar-based code proposed by Kieffer and Yang is a large class of universal codes.
Usually, the grammar-based cod... [more] |
IT2008-98 ISEC2008-156 WBS2008-111 pp.355-362 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Variable Probabilistic Packet Mareking with TTL for IP Traceback Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more] |
ISEC2008-31 SITE2008-25 pp.109-114 |
ISEC |
2008-05-16 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Verification of a side-channel attack to an AES circuit on SASEBO Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-1 |
Recently, the research on the side-channel attack is actively done, and SASEBO board that conformed to the INSTAC32 was ... [more] |
ISEC2008-1 pp.1-8 |
WBS, IT, ISEC |
2009-03-10 13:50 |
Hokkaido |
Hakodate Mirai Univ. |
Video Watermarking Using Ramp Secret Sharing Scheme Shingo Saito, Kazuhiko Yamaguchi (Univ. of Electro-Comm) IT2008-105 ISEC2008-163 WBS2008-118 |
[more] |
IT2008-105 ISEC2008-163 WBS2008-118 pp.409-414 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Watermarking Method with a Quasi-One-Way Function Kazuo Ohzeki, Engyoku Gi (SIT) ISEC2008-55 |
This paper describes the one-way function for use in an image watermarking to improve authentication ability. The one-wa... [more] |
ISEC2008-55 pp.147-154 |
ISEC |
2008-12-17 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Web Server Software Struture for Scalability Haruki Mori, Satoshi Ono (Kogakuin Univ.) ISEC2008-90 |
[more] |
ISEC2008-90 pp.7-9 |
WBS, IT, ISEC |
2009-03-09 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
Weighted Cooperative Sensing for Shadowing Enviroments in Cognitive Radio Kento Nakamura, Tomoaki Ohtsuki (Keio Univ.) IT2008-72 ISEC2008-130 WBS2008-85 |
In Cognitive radio that is expected for the effective use of frequency, the spectrum sensing method that judges presence... [more] |
IT2008-72 ISEC2008-130 WBS2008-85 pp.179-184 |