IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Mitsuru Matsui
Vice Chair Kazuo Ota, Kazuo Takaragi
Secretary Shiho Moriai, Yoshiaki Shiraishi
Assistant Noboru Kunihiro

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Hirotsugu Kinoshita
Vice Chair Toshinari Tsuruhara, Hiroyuki Inaba
Secretary Masaru Ogawa, Eizen Kimura
Assistant Tetsuya Morizumi

Conference Date Thu, Jul 19, 2007 09:55 - 17:50
Fri, Jul 20, 2007 09:55 - 17:25
Topics  
Conference Place Future University-Hakodate 
Address 116-2 Kamedanakano-cho Hakodate Hokkaido, 041-8655 Japan
Transportation Guide http://www.fun.ac.jp/~takagi/workshop.html
Contact
Person
Prof. Tsuyoshi Takagi
0138-34-6224

Thu, Jul 19 AM  Room A
10:20 - 12:00
(1) 10:20-10:45 The study for the position authentication and the security of location information Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC)
(2) 10:45-11:10 A preference transmission method with information security database systems on the Internet Yasuyoshi Okada, Naoshi Sato (I.I.S.)
(3) 11:10-11:35 On the Security and Complexity of Shared Attribute Certification Systems Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.)
(4) 11:35-12:00 User Authentication Method Based On Statistical Analysis of Keystrokes Yoshihiro Kataoka, Takao Miyamoto, Shigeki Aoki, Masao Izumi, Kunio Fukunaga (Osaka Pref Univ)
Thu, Jul 19 AM  Room B
09:55 - 12:00
(5) 09:55-10:20 A random number generation method with a variable degree of safety and its analysis Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications)
(6) 10:20-10:45 Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC)
(7) 10:45-11:10 Consideration on effectiveness of CC V3.1 Function Specific Assurance ST Masue Shiba, Naokazu Sasaki, Takahisa Ishida, Hiroshi Iguchi, Tsuyoshi Shimada (Toshiba Solusions Corp.)
(8) 11:10-11:35 Japan-U.S. comparisons of information security survey Kentarou Yamaguchi, Katsuya Uchida (IISEC)
(9) 11:35-12:00 Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand Seiichiro Yatake, Katsuya Uchida (IISEC)
Thu, Jul 19 PM  Room A
13:00 - 15:30
(10) 13:00-13:25 Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels" Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS)
(11) 13:25-13:50 Monetary Value of Security Damages Based on the Subjective Evaluation by Internet Users Naoko Sakurai, Tokio Otsuka, Hitoshi Mitomo (Waseda Univ.)
(12) 13:50-14:15 Technological and Social Studies for Emergency Message Services Shunichi Yonemura (NTT), Kazuo Kamata (Utsunomiya Univ.), Masakatsu Aoki (NTT), Akinori Yonekura (Utsunomiya Univ.)
(13) 14:15-14:40 Study on Information Transparency and Trust from the view point of Web innovation Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.)
(14) 14:40-15:05 A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow. Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT)
(15) 15:05-15:30 Beginning of Broadcast over the Internet in Japan Masataka Ohta (TIT)
  15:30-15:45 Break ( 15 min. )
Thu, Jul 19 PM  Room B
13:25 - 15:30
(16) 13:25-13:50 A Mutual Authentication System for Web Server Access by Using Cellar Phone Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.)
(17) 13:50-14:15 A Method to Limit Appriciation of Content Takehisa Kato (Toshiba Solutions Corp.)
(18) 14:15-14:40 A method of excluding disapproval connection on authentication network Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT)
(19) 14:40-15:05 An authentication network system using virtual authenticatior module Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT)
(20) 15:05-15:30 Human communication security to adapt to ever-expanding media environment Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC)
  15:30-15:45 Break ( 15 min. )
Thu, Jul 19 PM  Room A
15:45 - 17:50
(21) 15:45-16:10 Privacy-Preserving Assocaition Rules Mining Scheme Revisited Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.)
(22) 16:10-16:35 Group Key Based Revocation Schemes with Shorter Message Header Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu)
(23) 16:35-17:00 On Anonymous Password-Authenticated Key Exchange SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.)
(24) 17:00-17:25 A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ)
(25) 17:25-17:50 On the Standardization of Information Security
-- Report on the Moscow Meeting in May, 2007 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA)
Thu, Jul 19 PM  Room B
15:45 - 17:50
(26) 15:45-16:10 A composition method of network-independent dynamic authentication VLAN Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT)
(27) 16:10-16:35 Evaluation of a library against injection attacks Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC)
(28) 16:35-17:00 A Proposal of User Authentication using Convergence Reflex and Eyeball Shape Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.)
(29) 17:00-17:25 A study on information content of biometrics Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.)
(30) 17:25-17:50 Advantage of User Authentication Using Unclear Images
-- Automatic Generation of Decoy Images --
Takumi Yamamoto (Shizuoka Univ.), Atsushi Harada (Mitsubishi Electric), Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
Fri, Jul 20 AM  Room A
09:55 - 12:00
(31) 09:55-10:20 A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device Janghoon Song, Koki Abe (UEC)
(32) 10:20-10:45 Analysis on the Key-Scheduling Algorithm of MICKEY Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(33) 10:45-11:10 A Study on the Tews-Weinmann-Pyshkin Attack against WEP Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(34) 11:10-11:35 On Construction of Block Cipher with Variable Security Parameter Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.)
(35) 11:35-12:00 Hardware Implementations of the 128-bit Blockcipher CLEFIA Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.)
Fri, Jul 20 AM  Room B
09:55 - 12:00
(36) 09:55-10:20 Proposal for the quantitative method of searching characteristics of node Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi)
(37) 10:20-10:45 Orthogonal expansion of port-scan packets Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi)
(38) 10:45-11:10 Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai)
(39) 11:10-11:35 Exploring the required condtions for malware to run for behavior analysis Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT)
(40) 11:35-12:00 Automatic malware classification Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.)
Fri, Jul 20 PM  Room A
13:00 - 15:05
(41) 13:00-13:25 A Factoring Algorithm Searching Squares Kunikatsu Kobayashi (Yamagata Univ.)
(42) 13:25-13:50 A Construction Method of Nonlinear Piece In Hand Matrix for Universally Enhancing the Security of Various Multivariate Public Key Cryptosystems Shigeo Tsujii (iisec), Kohtaro Tadaki (Chuo Univ.), Ryou Fujita (iisec)
(43) 13:50-14:15 Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography Erik Dahmen (TUDarmstadt), Katsuyuki Okeya (Hitachi), Daniel Schepers (TUDarmstadt)
(44) 14:15-14:40 A Generalized Merkle Signature Scheme Erik Dahmen (TU Darmstadt), Camille Vuillaume, Katsuyuki Okeya (Hitachi), Elena Klintsevich, Johannes Buchmann (TU Darmstadt)
(45) 14:40-15:05 * Kunio Miyamoto, Hidehiko Tanaka (IISEC)
  15:05-15:20 Break ( 15 min. )
Fri, Jul 20 PM  Room B
13:00 - 15:05
(46) 13:00-13:25 A Design and Evaluation of Filtering Method of Image Spam in Bayesian Filter Masahiro Uemura, Toshihiro Tabata (Okayama Univ.)
(47) 13:25-13:50 A Study for Characteristics Transition of SPAM Yosuke Aragane, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT)
(48) 13:50-14:15 A Study of Spam Mail Combined with Social Engineering Kensuke Shibata, Itaru Kamiya, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)
(49) 14:15-14:40 A study of outward features of Spam mails Itaru Kamiya, Kensuke Shibata, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)
(50) 14:40-15:05 Partial Integrity Assurance Technology PIAT: An Application to Sender Domain Authentication Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka (FUJITSU Lab.)
  15:05-15:20 Break ( 15 min. )
Fri, Jul 20 PM  Room A
15:20 - 17:00
(51) 15:20-15:45 Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK)
(52) 15:45-16:10 Efficient Group Signature Scheme based on the DDH Problem Takuya Yoshida, Koji Okada (Toshiba Solutions)
(53) 16:10-16:35 An Extension of Sanitizable and Deletable Signature Masami Izumi (UEC), Tetsuya Izu (FUJITSU Lab.), Noboru Kunihiro, Kazuo Ohta (UEC)
(54) 16:35-17:00 (TBA) Masahiko Takenaka, Takeshi Shimoyama, Tetsuya Izu (Fujitsu Labs.)
Fri, Jul 20 PM  Room B
15:20 - 17:25
(55) 15:20-15:45 A Consideration for Detecting Virus Email by Using Mail Form Information Daisuke Miyamoto, Takuji Iimura, Youki Kadobayashi (NAIST)
(56) 15:45-16:10 An extension of secure OS on virtual machine monitor using split device driver Ruo Ando, Youki Kadobayashi (NICT)
(57) 16:10-16:35 Preliminary studies of secure OS as application platform Hidenori Tsuji (IISEC/Institute of Information Tech.), Masaki Hashimoto, Mira Kim, Hidehiko Tanaka (IISEC)
(58) 16:35-17:00 Phishing detection based on features of mimic content. Shinta Nakayama, Hiroshi Yoshiura (UEC)
(59) 17:00-17:25 Capability-Based System for Distributed Environment Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC)

Contact Address and Latest Schedule Information
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  


Last modified: 2007-06-28 19:44:29


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan