|
Chair |
|
Akira Hayashi |
Vice Chair |
|
Shinichi Kawamura, Masakatsu Morii |
Secretary |
|
Atsushi Fujioka, Shoichi Hirose |
Assistant |
|
Shoichi Hirose |
|
Technical Committee on Office Information System (OIS) |
|
|
Chair |
|
Masakatsu Morii |
Secretary |
|
Naoki Mizutani, Norihiko Matsuura |
|
Conference Date |
Mon, Nov 8, 2004 13:30 - 16:45
Tue, Nov 9, 2004 09:00 - 16:10 |
Topics |
|
Conference Place |
Convention Center, Suita Campus, Osaka University |
Transportation Guide |
http://www.osaka-u.ac.jp/eng/campus/index.html |
Contact Person |
Prof. Toru Fujiwara |
Mon, Nov 8 PM 13:30 - 16:45 |
(1) |
13:30-13:55 |
A twist technique based on third power residue and non residue |
Yoshito Hidaka, Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(2) |
13:55-14:20 |
A Reconfigurable Dual-Field Multiplier for GF(P) and GF(2n) |
Ryo Namba, Masaru Takesue (Hosei Univ) |
(3) |
14:20-14:45 |
An Algebraic Surface Public-key Cryptosystem |
Koichiro Akiyama (TOSHIBA), Yasuhiro Goto (Hokkaido Univ. of Edu.) |
(4) |
14:45-15:10 |
A Construction of Public-Key Crptosystem Based on Algebraic Coding and Random Coding Techniques over F2m |
Masao Kasahara (Osaka Gakuin Univ.) |
|
15:10-15:30 |
Break ( 20 min. ) |
(5) |
15:30-15:55 |
A Group Signature Scheme with Membership Revocation for Large Groups |
Fumiaki Kubooka, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
(6) |
15:55-16:20 |
A Threshold Cryptosystem Based on the Paillier's Encryption |
Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo), Junji Shikata (Yokohama National univ.) |
(7) |
16:20-16:45 |
How to improve the insecurity of Canetti-Goldreich-Halevi public-key cryptosystems |
Yoshinari Kobayashi (Chuo Univ.), Shigeo Tsujii (IISEC) |
Tue, Nov 9 AM 09:00 - 12:10 |
(8) |
09:00-09:25 |
Implentation mechanisms of scalable event-ordering system without single point of attack |
Eiichi Horita, Satoshi Ono, Hidetaka Ishimoto (NTT) |
(9) |
09:25-09:50 |
Time-stamping systems ensuring long term validity based on event-ordering systems |
Hidetaka Ishimoto, Satoshi Ono, Eiichi Horita (NTT) |
(10) |
09:50-10:15 |
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols |
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
(11) |
10:15-10:40 |
Transformation-Free Proxy Cryptosystems with Limited Authorization |
Lihua Wang (Tsukuba Univ.), Zhenfu Cao (Shanghai Jiao Tong Univ.), Eiji Okamoto, Ying Miao, Takeshi Okamoto (Tsukuba Univ.) |
|
10:40-10:55 |
Break ( 15 min. ) |
(12) |
10:55-11:20 |
One-Time Key Type Authentication Scheme for P2P Service |
Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
(13) |
11:20-11:45 |
Access Control by Service Connector with Single Sign-On Function |
Youji Fukuta (The Univ. of Tokushima), Takehito Ninomiya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
(14) |
11:45-12:10 |
A study of competition and diffusion of IP phone services |
Naoki Mizutani (Nara Sangyo Univ.) |
Tue, Nov 9 PM 13:25 - 16:10 |
(15) |
13:25-13:50 |
Virtual Transmission Monitoring System for Behavior Analysis of Virus |
Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI) |
(16) |
13:50-14:15 |
On Constructing the Illegal Code Detecting System on Memory for Virus Analysis |
Sachihiro Ichikawa, Masaki Kamizono (Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Univ. of Tokushima) |
(17) |
14:15-14:40 |
Design of Damage Prediction System By Event Dependent Model for Illegal Access |
Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
|
14:40-14:55 |
Break ( 15 min. ) |
(18) |
14:55-15:20 |
A Software Vulnerability Management System for Server Farm by Using Digital Certificates |
Motomu Nishikawa, Takeshi Okuda, Suguru Yamaguchi (NAIST) |
(19) |
15:20-15:45 |
Internet Accounting System
-- The Development Using Model Driven Architecture -- |
Daisuke Horinoue, Kenji Ohmori (Hosei Univ.) |
(20) |
15:45-16:10 |
Complexity of the Chabaud-Joux Attack on SHA-0 with Different Message Schedules |
Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida (Kyoto Univ.) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Shoichi Hirose(Graduate School of Informatics,Kyoto University)
TEL075-753-5316,FAX075-753-4982
E-: ic-c (to ISEC secretaries) |
OIS |
Technical Committee on Office Information System (OIS) |
Contact Address |
Naoki Mizutani
Nara Sangyo University, Faculty of Business Administration
Tateno-kita, Sango, Ikoma-gun, Nara 636-8503
TEL0745-73-7800,FAX0745-72-0822
_m |
Last modified: 2004-11-04 09:04:20
|
Notification: Mail addresses are partially hidden against SPAM.
|