IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Security (ISEC)
Chair: Akira Hayashi Vice Chair: Shinichi Kawamura, Masakatsu Morii
Secretary: Atsushi Fujioka, Shoichi Hirose
Assistant: Shoichi Hirose

===============================================
Technical Committee on Office Information System (OIS)
Chair: Masakatsu Morii
Secretary: Naoki Mizutani, Norihiko Matsuura

DATE:
Mon, Nov 8, 2004 13:30 - 16:45
Tue, Nov 9, 2004 09:00 - 16:10

PLACE:
Convention Center, Suita Campus, Osaka University(http://www.osaka-u.ac.jp/eng/campus/index.html. Prof. Toru Fujiwara)

TOPICS:


----------------------------------------
Mon, Nov 8 PM (13:30 - 16:45)
----------------------------------------

(1) 13:30 - 13:55
A twist technique based on third power residue and non residue
Yoshito Hidaka, Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

(2) 13:55 - 14:20
A Reconfigurable Dual-Field Multiplier for GF(P) and GF(2n)
Ryo Namba, Masaru Takesue (Hosei Univ)

(3) 14:20 - 14:45
An Algebraic Surface Public-key Cryptosystem
Koichiro Akiyama (TOSHIBA), Yasuhiro Goto (Hokkaido Univ. of Edu.)

(4) 14:45 - 15:10
A Construction of Public-Key Crptosystem Based on Algebraic Coding and Random Coding Techniques over F2m
Masao Kasahara (Osaka Gakuin Univ.)

----- Break ( 20 min. ) -----

(5) 15:30 - 15:55
A Group Signature Scheme with Membership Revocation for Large Groups
Fumiaki Kubooka, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)

(6) 15:55 - 16:20
A Threshold Cryptosystem Based on the Paillier's Encryption
Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo), Junji Shikata (Yokohama National univ.)

(7) 16:20 - 16:45
How to improve the insecurity of Canetti-Goldreich-Halevi public-key cryptosystems
Yoshinari Kobayashi (Chuo Univ.), Shigeo Tsujii (IISEC)

----------------------------------------
Tue, Nov 9 AM (09:00 - 12:10)
----------------------------------------

(8) 09:00 - 09:25
Implentation mechanisms of scalable event-ordering system without single point of attack
Eiichi Horita, Satoshi Ono, Hidetaka Ishimoto (NTT)

(9) 09:25 - 09:50
Time-stamping systems ensuring long term validity based on event-ordering systems
Hidetaka Ishimoto, Satoshi Ono, Eiichi Horita (NTT)

(10) 09:50 - 10:15
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)

(11) 10:15 - 10:40
Transformation-Free Proxy Cryptosystems with Limited Authorization
Lihua Wang (Tsukuba Univ.), Zhenfu Cao (Shanghai Jiao Tong Univ.), Eiji Okamoto, Ying Miao, Takeshi Okamoto (Tsukuba Univ.)

----- Break ( 15 min. ) -----

(12) 10:55 - 11:20
One-Time Key Type Authentication Scheme for P2P Service
Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)

(13) 11:20 - 11:45
Access Control by Service Connector with Single Sign-On Function
Youji Fukuta (The Univ. of Tokushima), Takehito Ninomiya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)

(14) 11:45 - 12:10
A study of competition and diffusion of IP phone services
Naoki Mizutani (Nara Sangyo Univ.)

----------------------------------------
Tue, Nov 9 PM (13:25 - 16:10)
----------------------------------------

(15) 13:25 - 13:50
Virtual Transmission Monitoring System for Behavior Analysis of Virus
Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI)

(16) 13:50 - 14:15
On Constructing the Illegal Code Detecting System on Memory for Virus Analysis
Sachihiro Ichikawa, Masaki Kamizono (Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Univ. of Tokushima)

(17) 14:15 - 14:40
Design of Damage Prediction System By Event Dependent Model for Illegal Access
Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)

----- Break ( 15 min. ) -----

(18) 14:55 - 15:20
A Software Vulnerability Management System for Server Farm by Using Digital Certificates
Motomu Nishikawa, Takeshi Okuda, Suguru Yamaguchi (NAIST)

(19) 15:20 - 15:45
Internet Accounting System
-- The Development Using Model Driven Architecture --
Daisuke Horinoue, Kenji Ohmori (Hosei Univ.)

(20) 15:45 - 16:10
Complexity of the Chabaud-Joux Attack on SHA-0 with Different Message Schedules
Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida (Kyoto Univ.)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Dec 17, 2004: Kikai-Shinko-Kaikan Bldg. [Wed, Oct 20]

# SECRETARY:
Shoichi Hirose(Graduate School of Informatics,Kyoto University)
TEL075-753-5316,FAX075-753-4982
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Office Information System (OIS) ===

# SECRETARY:
Naoki Mizutani
Nara Sangyo University, Faculty of Business Administration
Tateno-kita, Sango, Ikoma-gun, Nara 636-8503
TEL0745-73-7800,FAX0745-72-0822
_m


Last modified: 2004-11-04 09:04:20


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan