Thu, Jul 1 AM 10:30 - 11:45 |
(1) SITE |
10:30-10:55 |
Correlation Problems between Security Protection and Intellectual Property Protection of Information |
Haruo Kodama (Open Univ. of Japan/SOKENDAI) |
(2) SITE |
10:55-11:20 |
A Study on Log Analysis Based on Tendency of IDS Alert Events |
Tsuyoshi Toda, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(3) SITE |
11:20-11:45 |
Limit of "Control Theory" of Privacy
-- Presentation of Identity and Context Dependency of Privacy -- |
Takushi Otani (Kibi International Univ.) |
Thu, Jul 1 PM 13:25 - 15:30 |
(4) ISEC |
13:25-13:50 |
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher |
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
(5) ISEC |
13:50-14:15 |
Protection Mode Against Cache Attack (HYRAL) |
Kouzou Hirata (LIS) |
(6) ISEC |
14:15-14:40 |
An Optimization of AES Decryption Using the Bitslice Technique |
Fumihiko Sano (Toshiba Solutions Corporation) |
(7) ISEC |
14:40-15:05 |
An Artifact-Metric System which Extracts Values Unique to Individual Paper |
Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.) |
(8) ISEC |
15:05-15:30 |
Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol |
Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.) |
Thu, Jul 1 AM 10:30 - 12:10 |
(9) |
10:30-10:55 |
|
(10) |
10:55-11:20 |
|
(11) |
11:20-11:45 |
|
(12) |
11:45-12:10 |
|
Thu, Jul 1 PM 13:25 - 15:30 |
(13) ICSS |
13:25-13:50 |
Evaluating Destination Hosts of Malware Based on Search Engine Results |
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) |
(14) ICSS |
13:50-14:15 |
Image Authentication with Access Control Based on Reversible Data Hiding |
Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) |
(15) ICSS |
14:15-14:40 |
Building Ontology of Cybersecurity Operational Information |
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) |
(16) ICSS |
14:40-15:05 |
Access policy management architecture for virtual server consolidation systems |
Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC) |
(17) ICSS |
15:05-15:30 |
On the use and misuse of E-mail sender authentication mechanisms |
Tatsuya Mori (NTT) |
Thu, Jul 1 PM 15:45 - 17:00 |
(18) |
15:45-17:00 |
|
Fri, Jul 2 AM 09:00 - 10:15 |
(19) ISEC |
09:00-09:25 |
Proposal on MPKC Signature Scheme with Check Equations |
Shigeo Tsujii, Masahito Gotaishi (Chuo University) |
(20) ISEC |
09:25-09:50 |
Improvement of Rainbow MPKC Signature system |
Masahito Gotaishi (Chuo Univ.) |
(21) ISEC |
09:50-10:15 |
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions |
Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) |
Fri, Jul 2 AM 10:30 - 12:10 |
(22) ISEC |
10:30-10:55 |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 -- |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) |
(23) ISEC |
10:55-11:20 |
Implementation of Key Generation Center for Identity-based Encryption |
Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) |
(24) ISEC |
11:20-11:45 |
A note for secure information sharing systems |
Gembu Morohashi, Akira Nagai (NTT Corp.) |
(25) ISEC |
11:45-12:10 |
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption |
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) |
Fri, Jul 2 PM 13:25 - 15:05 |
(26) ISEC |
13:25-13:50 |
Attribute-based encryption with arbitrary number of authorities |
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) |
(27) ISEC |
13:50-14:15 |
An Efficient Broadcast Encryption with Personalized Messages |
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) |
(28) ISEC |
14:15-14:40 |
Efficient Augmented PAK Protocols |
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) |
(29) ISEC |
14:40-15:05 |
On the Relationship between Recognizing Languages and Computing Functions |
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya (Tohoku Univ.) |
Fri, Jul 2 PM 15:20 - 17:00 |
(30) ISEC |
15:20-15:45 |
On the examination on speeding Cheon's algorithm |
Masaya Yasuda, Tetsuya Izu, Masahiko Takenaka (Fujitsu Lab.) |
(31) ISEC |
15:45-16:10 |
On the proportion of the curves constructed by Brezing-Weng in the pairing-friendly curves |
Takanori Yasuda (Kyushu Univ.), Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (Fujitsu Labo.) |
(32) ISEC |
16:10-16:35 |
DLP with Auxiliary Input and the Security of Cryptographic Protocols |
Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,) |
(33) ISEC |
16:35-17:00 |
Cost Estimates of CNTW Attack against EMV Signatures |
Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
Fri, Jul 2 AM 09:00 - 10:15 |
(34) |
09:00-09:25 |
|
(35) |
09:25-09:50 |
|
(36) |
09:50-10:15 |
|
Fri, Jul 2 AM 10:30 - 12:10 |
(37) |
10:30-10:55 |
|
(38) |
10:55-11:20 |
|
(39) |
11:20-11:45 |
|
(40) |
11:45-12:10 |
|
Fri, Jul 2 PM 13:25 - 15:05 |
(41) |
13:25-13:50 |
|
(42) |
13:50-14:15 |
|
(43) |
14:15-14:40 |
|
(44) |
14:40-15:05 |
|
Fri, Jul 2 PM 15:20 - 17:25 |
(45) |
15:20-15:45 |
|
(46) |
15:45-16:10 |
|
(47) |
16:10-16:35 |
|
(48) |
16:35-17:00 |
|
(49) |
17:00-17:25 |
|