IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Hiroaki Kikuchi (Meiji Univ.)
Vice Chair Yutaka Miyake (KDDI R&D Labs.), Shiho Moriai (NICT)
Secretary Takashi Nishide (Univ. of Tsukuba), Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
Assistant Takeshi Ueda (Mitsubishi Electric)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Toshiaki Tanaka (KDDI Labs.)
Vice Chair Koichi Sakurai (Kyushu Univ.), Yukiyasu Tsunoo (NEC)
Secretary Tetsuya Izu (Fujitsu Labs.), Tetsu Iwata (Nagoya Univ.)
Assistant Goichiro Hanaoka (AIST), Yu Miyake (KDDI Labs.)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Michio Nakanishi (Osaka Inst. of Tech.)
Vice Chair Noriaki Yoshikai (Nihon Univ.), Hitoshi Okada (NII)
Secretary Norimasa Sugiyama (Osaka Inst. of Tech.), Daisuke Yamakata (FrontWing)
Assistant Sumiko Miyama (Kanagawa Univ.), Takahiro Tagawa (Kyushu Univ.)

Technical Committee on Enriched MultiMedia (EMM) [schedule] [select]
Chair Isao Echizen (NII)
Vice Chair Michiharu Niimi (Kyushu Inst. of Tech.), Ryoichi Nishimura (NICT)
Secretary Masashi Unoki (JAIST), Masaki Kawamura (Yamaguchi Univ.)
Assistant Minoru Kuribayashi (Kobe Univ.), Tetsuya Kojima (Tokyo National College of Tech.)

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Thu, Jul 18, 2013 09:10 - 17:40
Fri, Jul 19, 2013 09:10 - 16:30
Topics Security 
Conference Place  
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

Thu, Jul 18 AM 
10:15 - 11:55
(1) 10:15-10:40  
(2)
ISEC
10:40-11:05 Study of CAPTCHA suitable for smartphones ISEC2013-11 SITE2013-6 ICSS2013-16 EMM2013-13 Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.)
(3)
ISEC
11:05-11:30 Proposal of the Support System at the Time of Introduction of User Applications in Android OS ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.)
(4)
ISEC
11:30-11:55 Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform ISEC2013-13 SITE2013-8 ICSS2013-18 EMM2013-15 Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
  11:55-12:55 Break ( 60 min. )
Thu, Jul 18 PM 
12:55 - 14:35
(5)
SITE
12:55-13:20 Examination of IDS Log Analysis using Discrete Wavelet Transform ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16 Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.)
(6)
SITE
13:20-13:45 Engineering Ethics Education with world cafe discussion ISEC2013-15 SITE2013-10 ICSS2013-20 EMM2013-17 Michio Nakanishi (Osaka Inst. of Tech.)
(7)
SITE
13:45-14:10 Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools ISEC2013-16 SITE2013-11 ICSS2013-21 EMM2013-18 Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.)
(8)
SITE
14:10-14:35 The Concept of "Group Privacy" in the Information Age:
-- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? --
ISEC2013-17 SITE2013-12 ICSS2013-22 EMM2013-19
Takushi Otani (Kibi International Univ.)
  14:35-14:50 Break ( 15 min. )
Thu, Jul 18 PM 
14:50 - 16:30
(9)
ISEC
14:50-15:15 Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability ISEC2013-18 SITE2013-13 ICSS2013-23 EMM2013-20 Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC)
(10)
ISEC
15:15-15:40 A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21 Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST)
(11)
ISEC
15:40-16:05 Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science)
(12)
ISEC
16:05-16:30 On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA)
Thu, Jul 18 AM 
10:15 - 11:55
(13) 10:15-10:40  
(14) 10:40-11:05  
(15) 11:05-11:30  
(16) 11:30-11:55  
  11:55-12:55 Break ( 60 min. )
Thu, Jul 18 PM 
12:55 - 14:10
(17) 12:55-13:20  
(18) 13:20-13:45  
(19) 13:45-14:10  
  14:10-14:25 Break ( 15 min. )
Thu, Jul 18 PM 
14:50 - 16:30
(20) 14:50-15:15  
(21) 15:15-15:40  
(22) 15:40-16:05  
(23) 16:05-16:30  
Thu, Jul 18 AM 
09:10 - 10:00
(24)
EMM
09:10-09:35 An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients ISEC2013-22 SITE2013-17 ICSS2013-27 EMM2013-24 Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.)
(25)
EMM
09:35-10:00 Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25 Toshio Modegi (DNP)
  10:00-10:15 Break ( 15 min. )
Thu, Jul 18 AM 
10:15 - 11:55
(26)
EMM
10:15-10:40 Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface ISEC2013-24 SITE2013-19 ICSS2013-29 EMM2013-26 Tomoko Kajiyama (Aoyama Gakuin Univ.)
(27)
EMM
10:40-11:55 [Panel Discussion]
Education for IT Engineers from the Viewpoint of Information Security ISEC2013-25 SITE2013-20 ICSS2013-30 EMM2013-27
Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi
  11:55-12:55 Break ( 60 min. )
Thu, Jul 18 PM 
12:55 - 14:35
(28)
EMM
12:55-13:20 A Hierarchical Access Control Method by the Secret Sharing Scheme ISEC2013-26 SITE2013-21 ICSS2013-31 EMM2013-28 Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.)
(29)
EMM
13:20-13:45 A Content Protection Method Using Secret Sharing and Attribute-Based Encryption ISEC2013-27 SITE2013-22 ICSS2013-32 EMM2013-29 Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.)
(30)
EMM
13:45-14:10 Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30 Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)
(31)
EMM
14:10-14:35 Study of an artificial fiber pattern in Augmented Reality system ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)
  14:35-14:50 Break ( 15 min. )
Thu, Jul 18 PM 
14:50 - 16:30
(32)
EMM
14:50-15:15 Image Restoration Using Embedding of Similar Region Information ISEC2013-30 SITE2013-25 ICSS2013-35 EMM2013-32 Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.)
(33)
EMM
15:15-15:40 On a Data-Hiding Technique Based on Complete Complementary Codes ISEC2013-31 SITE2013-26 ICSS2013-36 EMM2013-33 Ryusuke Mayuzumi (Univ. of Electro-Comm.), Tetsuya Kojima (Tokyo National College of Tech.)
(34)
EMM
15:40-16:05 Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34 Shengbei Wang, Masashi Unoki (JAIST)
(35)
EMM
16:05-16:30 An Approach to Amplitude Scaling Partial Encryption for Compressed Audio ISEC2013-33 SITE2013-28 ICSS2013-38 EMM2013-35 Twe Ta Oo, Takao Onoye (Osaka Univ.), Kilho Shin (Univ. of Hyogo)
Thu, Jul 18 PM 
16:40 - 17:40
(36)
ISEC
16:40-17:40 [Invited Talk]
Research on Information and Physical Security Technologies for Embedded Systems ISEC2013-34 SITE2013-29 ICSS2013-39 EMM2013-36
Tsutomu Matsumoto (Yokohama National Univ.)
Fri, Jul 19 AM 
09:10 - 10:00
(37)
ISEC
09:10-09:35 A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba)
(38)
ISEC
09:35-10:00 Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38 Daisuke Moriyama (NICT)
  10:00-10:15 Break ( 15 min. )
Fri, Jul 19 AM 
10:15 - 11:55
(39)
ISEC
10:15-10:40 A Knapsack Cryptosystem Using Super-Decreasing Sequence ISEC2013-37 SITE2013-32 ICSS2013-42 EMM2013-39 Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.)
(40)
ISEC
10:40-11:05 An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem ISEC2013-38 SITE2013-33 ICSS2013-43 EMM2013-40 Yasuyuki Murakami, Shinsuke Hamasho (Osaka Electro-Comm. Univ.)
(41)
ISEC
11:05-11:30 Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further --
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
(42)
ISEC
11:30-11:55 Cryptosystems for Social Organizations Managed by Receiving Administrator
-- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations --
ISEC2013-40 SITE2013-35 ICSS2013-45 EMM2013-42
Shigeo Tsujii, Hiroshi Yamaguchi, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.)
  11:55-12:55 Break ( 60 min. )
Fri, Jul 19 PM 
12:55 - 14:35
(43)
ISEC
12:55-13:20 On Identification Methods for Visible-Light Paper Artifact-Metric Systems ISEC2013-41 SITE2013-36 ICSS2013-46 EMM2013-43 Ryosuke Suzuki, Tsutomu Matsumoto (Yokohama National Univ.)
(44)
ISEC
13:20-13:45 A proposal of key binding technology using lattice masking ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44 Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.)
(45) 13:45-14:10  
(46) 14:10-14:35  
  14:35-14:50 Break ( 15 min. )
Fri, Jul 19 PM 
14:50 - 16:30
(47)
ISEC
14:50-15:15 TLS with Pre-shared Key Extended by Identity-based Encryption ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.)
(48)
ISEC
15:15-15:40 Application of Efficient Forms of Elliptic Curves to Ate-like Pairings ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
(49)
ISEC
15:40-16:05 On Side-Channel Information Using Signal Toggles in AES Circuit ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47 Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC)
(50)
ISEC
16:05-16:30 Recovering RSA Secret Keys from Observed Analog Data (I) ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48 Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo)
Fri, Jul 19 AM 
09:10 - 10:00
(51) 09:10-09:35  
(52) 09:35-10:00  
  10:00-10:15 Break ( 15 min. )
Fri, Jul 19 AM 
10:15 - 11:55
(53) 10:15-10:40  
(54) 10:40-11:05  
(55)
ICSS
11:05-11:30 Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities ISEC2013-47 SITE2013-42 ICSS2013-52 EMM2013-49 Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.)
(56)
ICSS
11:30-11:55 Network Observation and Analysis Report on nicter
-- Malware infection to embedded systems --
ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)
  11:55-12:55 Break ( 60 min. )
Fri, Jul 19 PM 
12:55 - 14:35
(57) 12:55-13:20  
(58)
ISEC
13:20-13:45 Generalization of Noises in Differential Privacy ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51 Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT)
(59)
ISEC
13:45-14:10 Attacks on Authenticated Encryption Based on E-MACs ISEC2013-50 SITE2013-45 ICSS2013-55 EMM2013-52 Hayato Kobayashi, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)
(60) 14:10-14:35  
  14:35-14:50 Break ( 15 min. )
Fri, Jul 19 PM 
14:50 - 16:05
(61) 14:50-15:15  
(62) 15:15-15:40  
(63) 15:40-16:05  

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E--mail: is-qst 
Announcement Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
EMM Technical Committee on Enriched MultiMedia (EMM)   [Latest Schedule]
Contact Address  
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2013-06-25 11:15:49


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev ICSS Conf / Next ICSS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan