Mon, Nov 14 PM 13:00 - 17:00 |
(1) |
13:00-13:25 |
A Study on Coordination Assistance of the Clothes Using Picture Search |
Shunsuke Sakazaki, Toshihiko Wakahara (Fkuoka Institute of Technology) |
(2) |
13:25-13:50 |
Investigation of retrieval method reflecting user's feeling |
Kaoru Sugita, Masao Yokota (FIT), Akihiro Miyakawa (Nanao City, Ishikawa Pref.), Giuseppe De Marco, Leonard Barolli (FIT), Yoshitaka Shibata (Iwate Prefectural Univ.) |
(3) |
13:50-14:15 |
Some Expansions of Universal Digital Talking Book Authoring System "HIMAWARI" |
Reiko Shinohara, Takanori Takeuchi, Yukio Rikiso (U. of Hyogo) |
(4) |
14:15-14:40 |
A Study on the Configuration of the Community System |
Toshihiko Wakahara, Yuuya Hiwatashi (FIT), Hirofumi Iori, Jiriki Tei, Munehisa Shibata (Kyusyu Keiso) |
(5) |
14:40-15:05 |
Development of Multimedia Use in Distant Education of Alice Springs School of Air |
Shiro Uesugi (Matsuyama Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(6) |
15:20-15:45 |
A Proposal of Three Term Public-Key Cryptosystem, KM(3)-PKC
-- Along with Challenge Problems on KM(3)-PKC of Very Small Key-Size -- |
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami (Osaka Electro-Comm. Univ.) |
(7) |
15:45-16:10 |
A Digital Signature Suitable for XTR |
Masaaki Shirase, Yasushi Hibino (JAIST) |
(8) |
16:10-16:35 |
Study of System Application for MUGI Hardware |
Takashi Matsumoto, Toru Owada, Shigeki Taira (Hitachi), Yoshifumi Kawamura (Renesas) |
(9) |
16:35-17:00 |
A study of the reconstruction of display image on a PC's monitor by unintiontional electromagnetic emanation
-- Emanated electromagnetic signal measurement method and reconstructed display image using measured signal emanation -- |
Hidenori Sekiguchi, Hidema Tanaka, Shinji Seto, Akihiro Yamamura (NICT) |
Tue, Nov 15 AM 09:15 - 12:00 |
(10) |
09:15-09:40 |
A Study on Wartermark for Texture Images on 3D Virtual Space |
Shunsuke Araki (Kyushu Institute of Tech.) |
(11) |
09:40-10:05 |
Dynamic Access Control Method for Ad-Hoc Information Sharing |
Yoichiro Morita, Masayuki Nakae, Ryuichi Ogawa (NEC) |
(12) |
10:05-10:30 |
An Information Leakage Risk Evaluation Method Based n ecurity Configuration |
Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa, Itaru Hosomi (NEC) |
(13) |
10:30-10:55 |
Examination and implementation of network security against distributed denial of service attacks
-- Design and introduction of DTI hub -- |
Kentarou Nagayama, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ.) |
|
10:55-11:10 |
Break ( 15 min. ) |
(14) |
11:10-11:35 |
On Construction of Periodic Sequence on Algebraic Curve over Finite Field |
Takayasu Kaida (Kinki Univ.) |
(15) |
11:35-12:00 |
Some Results of Brute Force Attack for a Random Seed and Security Evaluation of Pseudo Random Number Generator using Logistic-Mapping |
Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Kyoki Imamura (Kyushu Inst. of Tech.) |
Tue, Nov 15 PM 13:15 - 16:00 |
(16) |
13:15-13:40 |
Improved Collision Attack on MD5 |
Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.) |
(17) |
13:40-14:05 |
Efficient Algorithm for Computing Linear Probability of constant addition (2) |
Kazunori Sumikawa (TUS), Hirotaka Ittogi (Canon), Toshinobu Kaneko (TUS) |
(18) |
14:05-14:30 |
On Reference Positions and Bits in Differential Power Analysis Attack against DES |
Yousuke Kakuishi, Akihiko Sasaki, Koki Abe (UEC) |
|
14:30-14:45 |
Break ( 15 min. ) |
(19) |
14:45-15:10 |
A Universally Composable Commitment Protocol based on KEA1 and Revocable DDH Assumptions |
Yosuke Iwasaki, Seiko Arita (IISEC) |
(20) |
15:10-15:35 |
Asymmetric 3-party Password Authenticated Kay Exchange |
Toru Iino, Shin'ichiro Matsuo (NTT DATA), Hiroto Matsuoka, Wakaha Ogata (Tokyo Inst. of Tech.) |
(21) |
15:35-16:00 |
A Encryption Scheme with Recording Decryption Evidence |
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA) |