IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Security (ISEC)
Chair: Toshiaki Tanaka (KDDI Labs.) Vice Chair: Koichi Sakurai (Kyushu Univ.), Yukiyasu Tsunoo (NEC)
Secretary: Tetsuya Izu (Fujitsu Labs.), Tetsu Iwata (Nagoya Univ.)
Assistant: Goichiro Hanaoka (AIST), Yu Miyake (KDDI Labs.)

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Michio Nakanishi (Osaka Inst. of Tech.) Vice Chair: Noriaki Yoshikai (Nihon Univ.), Hitoshi Okada (NII)
Secretary: Norimasa Sugiyama (Osaka Inst. of Tech.), Daisuke Yamakata (FrontWing)
Assistant: Sumiko Miyama (Kanagawa Univ.), Takahiro Tagawa (Kyushu Univ.)

===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Hiroaki Kikuchi (Meiji Univ.) Vice Chair: Yutaka Miyake (KDDI R&D Labs.), Shiho Moriai (NICT)
Secretary: Takashi Nishide (Univ. of Tsukuba), Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
Assistant: Takeshi Ueda (Mitsubishi Electric)

===============================================
Technical Committee on Enriched MultiMedia (EMM)
Chair: Isao Echizen (NII)
Vice Chair: Michiharu Niimi (Kyushu Inst. of Tech.), Ryoichi Nishimura (NICT)
Secretary: Masashi Unoki (JAIST), Masaki Kawamura (Yamaguchi Univ.)
Assistant: Minoru Kuribayashi (Kobe Univ.), Tetsuya Kojima (Tokyo National College of Tech.)

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)


DATE:
Thu, Jul 18, 2013 09:10 - 17:40
Fri, Jul 19, 2013 09:10 - 16:30

PLACE:


TOPICS:
Security

----------------------------------------
Thu, Jul 18 AM (10:15 - 11:55)
----------------------------------------

(1) 10:15 - 10:40


(2)/ISEC 10:40 - 11:05
Study of CAPTCHA suitable for smartphones
Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.)

(3)/ISEC 11:05 - 11:30
Proposal of the Support System at the Time of Introduction of User Applications in Android OS
Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.)

(4)/ISEC 11:30 - 11:55
Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform
Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)

----- Break ( 60 min. ) -----

----------------------------------------
Thu, Jul 18 PM (12:55 - 14:35)
----------------------------------------

(5)/SITE 12:55 - 13:20
Examination of IDS Log Analysis using Discrete Wavelet Transform
Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.)

(6)/SITE 13:20 - 13:45
Engineering Ethics Education with world cafe discussion
Michio Nakanishi (Osaka Inst. of Tech.)

(7)/SITE 13:45 - 14:10
Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.)

(8)/SITE 14:10 - 14:35
The Concept of "Group Privacy" in the Information Age:
-- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? --
Takushi Otani (Kibi International Univ.)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 18 PM (14:50 - 16:30)
----------------------------------------

(9)/ISEC 14:50 - 15:15
Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability
Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC)

(10)/ISEC 15:15 - 15:40
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256
Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST)

(11)/ISEC 15:40 - 16:05
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science)

(12)/ISEC 16:05 - 16:30
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA)

----------------------------------------
Thu, Jul 18 AM (10:15 - 11:55)
----------------------------------------

(13) 10:15 - 10:40


(14) 10:40 - 11:05


(15) 11:05 - 11:30


(16) 11:30 - 11:55


----- Break ( 60 min. ) -----

----------------------------------------
Thu, Jul 18 PM (12:55 - 14:10)
----------------------------------------

(17) 12:55 - 13:20


(18) 13:20 - 13:45


(19) 13:45 - 14:10


----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 18 PM (14:50 - 16:30)
----------------------------------------

(20) 14:50 - 15:15


(21) 15:15 - 15:40


(22) 15:40 - 16:05


(23) 16:05 - 16:30


----------------------------------------
Thu, Jul 18 AM (09:10 - 10:00)
----------------------------------------

(24)/EMM 09:10 - 09:35
An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients
Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.)

(25)/EMM 09:35 - 10:00
Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices
Toshio Modegi (DNP)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 18 AM (10:15 - 11:55)
----------------------------------------

(26)/EMM 10:15 - 10:40
Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface
Tomoko Kajiyama (Aoyama Gakuin Univ.)

(27)/EMM 10:40 - 11:55
[Panel Discussion]
Education for IT Engineers from the Viewpoint of Information Security
Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi

----- Break ( 60 min. ) -----

----------------------------------------
Thu, Jul 18 PM (12:55 - 14:35)
----------------------------------------

(28)/EMM 12:55 - 13:20
A Hierarchical Access Control Method by the Secret Sharing Scheme
Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.)

(29)/EMM 13:20 - 13:45
A Content Protection Method Using Secret Sharing and Attribute-Based Encryption
Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.)

(30)/EMM 13:45 - 14:10
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method
Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)

(31)/EMM 14:10 - 14:35
Study of an artificial fiber pattern in Augmented Reality system
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 18 PM (14:50 - 16:30)
----------------------------------------

(32)/EMM 14:50 - 15:15
Image Restoration Using Embedding of Similar Region Information
Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.)

(33)/EMM 15:15 - 15:40
On a Data-Hiding Technique Based on Complete Complementary Codes
Ryusuke Mayuzumi (Univ. of Electro-Comm.), Tetsuya Kojima (Tokyo National College of Tech.)

(34)/EMM 15:40 - 16:05
Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection
Shengbei Wang, Masashi Unoki (JAIST)

(35)/EMM 16:05 - 16:30
An Approach to Amplitude Scaling Partial Encryption for Compressed Audio
Twe Ta Oo, Takao Onoye (Osaka Univ.), Kilho Shin (Univ. of Hyogo)

----------------------------------------
Thu, Jul 18 PM (16:40 - 17:40)
----------------------------------------

(36)/ISEC 16:40 - 17:40
[Invited Talk]
Research on Information and Physical Security Technologies for Embedded Systems
Tsutomu Matsumoto (Yokohama National Univ.)

----------------------------------------
Fri, Jul 19 AM (09:10 - 10:00)
----------------------------------------

(37)/ISEC 09:10 - 09:35
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba)

(38)/ISEC 09:35 - 10:00
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
Daisuke Moriyama (NICT)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 19 AM (10:15 - 11:55)
----------------------------------------

(39)/ISEC 10:15 - 10:40
A Knapsack Cryptosystem Using Super-Decreasing Sequence
Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.)

(40)/ISEC 10:40 - 11:05
An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem
Yasuyuki Murakami, Shinsuke Hamasho (Osaka Electro-Comm. Univ.)

(41)/ISEC 11:05 - 11:30
Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)

(42)/ISEC 11:30 - 11:55
Cryptosystems for Social Organizations Managed by Receiving Administrator
-- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations --
Shigeo Tsujii, Hiroshi Yamaguchi, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.)

----- Break ( 60 min. ) -----

----------------------------------------
Fri, Jul 19 PM (12:55 - 14:35)
----------------------------------------

(43)/ISEC 12:55 - 13:20
On Identification Methods for Visible-Light Paper Artifact-Metric Systems
Ryosuke Suzuki, Tsutomu Matsumoto (Yokohama National Univ.)

(44)/ISEC 13:20 - 13:45
A proposal of key binding technology using lattice masking
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.)

(45) 13:45 - 14:10


(46) 14:10 - 14:35


----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 19 PM (14:50 - 16:30)
----------------------------------------

(47)/ISEC 14:50 - 15:15
TLS with Pre-shared Key Extended by Identity-based Encryption
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.)

(48)/ISEC 15:15 - 15:40
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)

(49)/ISEC 15:40 - 16:05
On Side-Channel Information Using Signal Toggles in AES Circuit
Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC)

(50)/ISEC 16:05 - 16:30
Recovering RSA Secret Keys from Observed Analog Data (I)
Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo)

----------------------------------------
Fri, Jul 19 AM (09:10 - 10:00)
----------------------------------------

(51) 09:10 - 09:35


(52) 09:35 - 10:00


----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 19 AM (10:15 - 11:55)
----------------------------------------

(53) 10:15 - 10:40


(54) 10:40 - 11:05


(55)/ICSS 11:05 - 11:30
Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities
Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.)

(56)/ICSS 11:30 - 11:55
Network Observation and Analysis Report on nicter
-- Malware infection to embedded systems --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)

----- Break ( 60 min. ) -----

----------------------------------------
Fri, Jul 19 PM (12:55 - 14:35)
----------------------------------------

(57) 12:55 - 13:20


(58)/ISEC 13:20 - 13:45
Generalization of Noises in Differential Privacy
Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT)

(59)/ISEC 13:45 - 14:10
Attacks on Authenticated Encryption Based on E-MACs
Hayato Kobayashi, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)

(60) 14:10 - 14:35


----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 19 PM (14:50 - 16:05)
----------------------------------------

(61) 14:50 - 15:15


(62) 15:15 - 15:40


(63) 15:40 - 16:05


# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 13, 2013: Kikai-Shinko-Kaikan Bldg. [Mon, Jul 15]

# SECRETARY:
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===
# FUTURE SCHEDULE:

Tue, Oct 29, 2013: Nihon Univ.(surugadai) [Sat, Aug 17], Topics: Personal Information & Privacy, etc.

=== Technical Committee on Information and Communication System Security (ICSS) ===

# SECRETARY:
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-mail: is-qst

# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html

=== Technical Committee on Enriched MultiMedia (EMM) ===
# FUTURE SCHEDULE:

Thu, Sep 12, 2013 - Fri, Sep 13, 2013: [Fri, Jul 5]

=== Special Interest Group on Computer Security (IPSJ-CSEC) ===

=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===


Last modified: 2013-06-25 11:15:49


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan