Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2015-03-03 16:15 |
Okinawa |
Meio Univiersity |
Link Structural Analysis of Drive-by-Download Attacks Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70 |
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] |
ICSS2014-70 pp.43-48 |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-86 |
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is require... [more] |
ICSS2014-86 pp.139-144 |
ICSS |
2015-03-04 13:40 |
Okinawa |
Meio Univiersity |
Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91 |
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] |
ICSS2014-91 pp.169-174 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92 |
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] |
ICSS2014-92 pp.175-179 |
ICSS |
2015-03-04 14:30 |
Okinawa |
Meio Univiersity |
Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] |
ICSS2014-93 pp.181-186 |
ICSS, IA |
2014-06-06 14:50 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
List Representation Using Succinct Data Structure for Packet Filtering Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-12 ICSS2014-12 |
In packet filtering, increase of filtering rules causes the following two problems; complication of grasping all rules a... [more] |
IA2014-12 ICSS2014-12 pp.61-65 |
ICSS, IA |
2014-06-06 15:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-13 ICSS2014-13 |
In the case of sending and receiving files which need secret via the Internet, files get encrypted. Encrypting files req... [more] |
IA2014-13 ICSS2014-13 pp.67-72 |
ICSS, IPSJ-SPT |
2014-03-27 14:20 |
Okinawa |
Meio Univiersity |
General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65 |
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] |
ICSS2013-65 pp.19-24 |
ICSS, IPSJ-SPT |
2014-03-27 14:55 |
Okinawa |
Meio Univiersity |
SSL Client Authentication with TPM
-- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate -- Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-66 |
TPM-embedded terminals can be used as authentication tokens by issuing certificates to signature keys generated by TPM. ... [more] |
ICSS2013-66 pp.25-30 |
ICSS, IPSJ-SPT |
2014-03-28 14:45 |
Okinawa |
Meio Univiersity |
Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) ICSS2013-85 |
It is not always true that enough information can be got by just using website analysis services, because some malicious... [more] |
ICSS2013-85 pp.161-166 |
LOIS |
2014-03-08 15:30 |
Okinawa |
|
Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77 |
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] |
LOIS2013-77 pp.137-141 |
LOIS |
2014-03-08 16:20 |
Okinawa |
|
Linkable System Using Encrypted Personal Identification Information for Clinical Research Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79 |
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] |
LOIS2013-79 pp.149-154 |
ISEC, LOIS |
2013-11-29 10:55 |
Miyagi |
Tohoku Univ. |
on evaluation for estimating link loss rates by using network coding Youji Fukuta (Aichi Univ. of Education), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.) ISEC2013-66 LOIS2013-32 |
Monitoring or inference of internal network characteristics, such as transmission topology, link losses and delay, from ... [more] |
ISEC2013-66 LOIS2013-32 pp.45-50 |
ICSS |
2013-03-25 11:10 |
Kanagawa |
Yokohama National University |
Design and Implementation of Application Framework for Pairing-based Cryptography Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-59 |
Applications of pairing-based cryptography are searchable encryption, secure function evaluation and so on. To implement... [more] |
ICSS2012-59 pp.13-18 |
ICSS |
2013-03-25 11:35 |
Kanagawa |
Yokohama National University |
Partially Doubly-Encrypted ID-based Encryption and its Security Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60 |
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] |
ICSS2012-60 pp.19-24 |
LOIS |
2013-03-07 14:10 |
Okinawa |
|
A Secure Personal Information Management Method Using Linkable Anonymizing and Hybrid Cipher for Information Sharing Systems in Home Medical Care and Nursing Taichi Tatsuda, Wataru Mizoguchi, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-80 |
There is a demand for collaborative approach to provide efficient services with various profession in the home medical c... [more] |
LOIS2012-80 pp.65-70 |
LOIS |
2013-03-07 14:30 |
Okinawa |
|
Medical Consumer Controllable Information Disclosing Method by Secret Sharing for Personal Health Record Wataru Mizoguchi, Taichi Tatsuda, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-81 |
There is a need for self-management of medical and health information by medical consumers themselves using PHR(Personal... [more] |
LOIS2012-81 pp.71-76 |
ICSS |
2012-11-22 10:45 |
Hiroshima |
Miyajima Mori-no-Yado |
On Distribution of Certificate Revocation List Using Random Network Coding for VANET Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) ICSS2012-45 |
Intelligent transport system (ITS) is for resolving traffic accidents and congestion by using information and communicat... [more] |
ICSS2012-45 pp.1-6 |
ICSS |
2012-11-22 15:10 |
Hiroshima |
Miyajima Mori-no-Yado |
A Framework for Issuing AIK Certificate for Two-Factor Authentication by TPM and Its Support System Akihito Shinoda (NITECH), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH), Ryoji Noguchi (Toyotsu Syscom) ICSS2012-52 |
An information system that handles confidential information should be used multi-factor authentication. TPM-embedded ter... [more] |
ICSS2012-52 pp.43-48 |
ICSS |
2012-11-22 16:00 |
Hiroshima |
Miyajima Mori-no-Yado |
On the Sense of Security for Registering Privacy Information to Return Refugee Supporting System Kaori Okumura, Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-54 |
In Japan, public transportation is sometimes temporary suspended because of a typhoon and a torrential downpour. Hence, ... [more] |
ICSS2012-54 pp.55-60 |