Thu, Jul 2 AM Session A-1: ISEC 10:15 - 11:55 |
(1) ISEC |
10:15-10:40 |
Attribute-Based Two-Tier Signatures |
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) |
(2) ISEC |
10:40-11:05 |
On the Security of SAPAKE |
SeongHan Shin, Kazukuni Kobara (AIST) |
(3) ISEC |
11:05-11:30 |
Chosen Initial Vector Attack against Pseudorandom Number Generator QP-DYN |
Kenichi Arai, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) |
(4) ISEC |
11:30-11:55 |
Information Security in National Identification Number called My Number in Japan |
Takeshi Niiyama, Toshiro Kita (Doshisha Univ.) |
Thu, Jul 2 AM Session B-1: CSEC 10:15 - 11:55 |
(5) |
10:15-10:40 |
|
(6) |
10:40-11:05 |
|
(7) |
11:05-11:30 |
|
(8) |
11:30-11:55 |
|
Thu, Jul 2 PM Session A-2: ISEC 13:25 - 14:40 |
(9) ISEC |
13:25-13:50 |
Proposals of K(AI), K(AII) and K(AIII)Schemes for augmenting code-based PKC, product-sum type PKC and multivariate PKC |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(10) ISEC |
13:50-14:15 |
Security Analysis of AONT-based Regenerating Codes |
Hidenori Kuwakado (Kansai Univ.), Masazumi Kurihara (Univ. of Electro-Communications) |
(11) ISEC |
14:15-14:40 |
Experimental Analysis of Path ORAM in Practical Implementation |
Karin Sumongkayothin, Atsuko Miyaji, Chunhua Su (JAIST), Steve Gordon (SIIT) |
Thu, Jul 2 PM Session B-2: SITE 13:25 - 15:05 |
(12) SITE |
13:25-13:50 |
On the Comprehensive Consent in the utilization of personal information |
Takushi Otani (Kibi International Univ.) |
(13) SITE |
13:50-14:15 |
Study on Application of Measure Behavior Intention Model for Information Security into Security Action Cyc |
Noriaki Yoshikai (Nihon Univ.) |
(14) SITE |
14:15-14:40 |
Survey:automated moral judgment |
Yuko Murakami (Tohoku U) |
(15) SITE |
14:40-15:05 |
Development of an educational material using an injurious scenario regarding the moral rights and its trial |
Takako Nabeshima, Youzou Miyadera, Atsuo Hazeyama, Yoshimi Tanaka (Tokyo Gakugei Univ.) |
Thu, Jul 2 PM Session A-3: EMM 15:20 - 16:35 |
(16) EMM |
15:20-15:45 |
Secure and Robust Image Identification Based on Fuzzy Commitment Scheme for JPEG Image |
Kenta Iida, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro Univ.) |
(17) EMM |
15:45-16:10 |
Making RAW Video and Novel Video Watermarking System |
Natsuki Kokui, Hyunho Kang, Keiichi Iwamura (TUS) |
(18) EMM |
16:10-16:35 |
Study of the color articial fiber pattern for Augmented Reality(AR) |
Wakana Tomita (TUS), Kitahiro Kanada (OPU), Keiichi Iwamura (TUS) |
Thu, Jul 2 PM Session B-3: SPT 15:45 - 16:35 |
(19) |
15:45-16:10 |
A Proposal of Wolf Websites on Tor Anonymity System
Nakata Kenjiro (Institute of Industrial Science, the University of Tokyo), Matsuura Kanta (Institute of Industrial Science, the University of Tokyo) |
(20) |
16:10-16:35 |
|
Fri, Jul 3 AM Session A-4: ISEC+ICSS 10:40 - 11:55 |
(21) ISEC |
10:40-11:05 |
Report on Workshop on Cybersecurity in a Post-Quantum World |
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.) |
(22) ISEC |
11:05-11:30 |
Proposal of Accelerating XL algorithm by Assigning Constants to Variables |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(23) ICSS |
11:30-11:55 |
On Anxiety Factors in Indirect Use for Cloud Type Medical Systems |
Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) |
Fri, Jul 3 AM Session B-4: CSEC 10:15 - 11:30 |
(24) |
10:15-10:40 |
delta ISMS model - Improving ISMS using accident database
HORIKAWA HIROSHI, OHTANI HISAMICHI, TAKAHASHI YUJI, KATO TAKEHISA, MAGATA FUMIHIKO, TESHIGAWARA YOSHIMI, SASAKI RYOICHI, NISHIGAKI MASAKATSU |
(25) |
10:40-11:05 |
|
(26) |
11:05-11:30 |
|