IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


===============================================
Technical Committee on Information Security (ISEC)
Chair: Mitsuru Matsui Vice Chair: Kazuo Ota, Kazuo Takaragi
Secretary: Shiho Moriai, Yoshiaki Shiraishi
Assistant: Noboru Kunihiro

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Hirotsugu Kinoshita Vice Chair: Toshinari Tsuruhara, Hiroyuki Inaba
Secretary: Masaru Ogawa, Eizen Kimura
Assistant: Tetsuya Morizumi

DATE:
Thu, Jul 19, 2007 09:55 - 17:50
Fri, Jul 20, 2007 09:55 - 17:25

PLACE:
Future University-Hakodate(116-2 Kamedanakano-cho Hakodate Hokkaido, 041-8655 Japan. http://www.fun.ac.jp/~takagi/workshop.html. Prof. Tsuyoshi Takagi. 0138-34-6224)

TOPICS:


----------------------------------------
Thu, Jul 19 AM Room A (10:20 - 12:00)
----------------------------------------

(1) 10:20 - 10:45
The study for the position authentication and the security of location information
Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC)

(2) 10:45 - 11:10
A preference transmission method with information security database systems on the Internet
Yasuyoshi Okada, Naoshi Sato (I.I.S.)

(3) 11:10 - 11:35
On the Security and Complexity of Shared Attribute Certification Systems
Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.)

(4) 11:35 - 12:00
User Authentication Method Based On Statistical Analysis of Keystrokes
Yoshihiro Kataoka, Takao Miyamoto, Shigeki Aoki, Masao Izumi, Kunio Fukunaga (Osaka Pref Univ)

----------------------------------------
Thu, Jul 19 AM Room B (09:55 - 12:00)
----------------------------------------

(5) 09:55 - 10:20
A random number generation method with a variable degree of safety and its analysis
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications)

(6) 10:20 - 10:45
Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes
Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC)

(7) 10:45 - 11:10
Consideration on effectiveness of CC V3.1 Function Specific Assurance ST
Masue Shiba, Naokazu Sasaki, Takahisa Ishida, Hiroshi Iguchi, Tsuyoshi Shimada (Toshiba Solusions Corp.)

(8) 11:10 - 11:35
Japan-U.S. comparisons of information security survey
Kentarou Yamaguchi, Katsuya Uchida (IISEC)

(9) 11:35 - 12:00
Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand
Seiichiro Yatake, Katsuya Uchida (IISEC)

----------------------------------------
Thu, Jul 19 PM Room A (13:00 - 15:30)
----------------------------------------

(10) 13:00 - 13:25
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels"
Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS)

(11) 13:25 - 13:50
Monetary Value of Security Damages Based on the Subjective Evaluation by Internet Users
Naoko Sakurai, Tokio Otsuka, Hitoshi Mitomo (Waseda Univ.)

(12) 13:50 - 14:15
Technological and Social Studies for Emergency Message Services
Shunichi Yonemura (NTT), Kazuo Kamata (Utsunomiya Univ.), Masakatsu Aoki (NTT), Akinori Yonekura (Utsunomiya Univ.)

(13) 14:15 - 14:40
Study on Information Transparency and Trust from the view point of Web innovation
Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.)

(14) 14:40 - 15:05
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow.
Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT)

(15) 15:05 - 15:30
Beginning of Broadcast over the Internet in Japan
Masataka Ohta (TIT)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 19 PM Room B (13:25 - 15:30)
----------------------------------------

(16) 13:25 - 13:50
A Mutual Authentication System for Web Server Access by Using Cellar Phone
Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.)

(17) 13:50 - 14:15
A Method to Limit Appriciation of Content
Takehisa Kato (Toshiba Solutions Corp.)

(18) 14:15 - 14:40
A method of excluding disapproval connection on authentication network
Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT)

(19) 14:40 - 15:05
An authentication network system using virtual authenticatior module
Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT)

(20) 15:05 - 15:30
Human communication security to adapt to ever-expanding media environment
Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC)

----- Break ( 15 min. ) -----

----------------------------------------
Thu, Jul 19 PM Room A (15:45 - 17:50)
----------------------------------------

(21) 15:45 - 16:10
Privacy-Preserving Assocaition Rules Mining Scheme Revisited
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.)

(22) 16:10 - 16:35
Group Key Based Revocation Schemes with Shorter Message Header
Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu)

(23) 16:35 - 17:00
On Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.)

(24) 17:00 - 17:25
A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ)

(25) 17:25 - 17:50
On the Standardization of Information Security
-- Report on the Moscow Meeting in May, 2007 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA)

----------------------------------------
Thu, Jul 19 PM Room B (15:45 - 17:50)
----------------------------------------

(26) 15:45 - 16:10
A composition method of network-independent dynamic authentication VLAN
Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT)

(27) 16:10 - 16:35
Evaluation of a library against injection attacks
Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC)

(28) 16:35 - 17:00
A Proposal of User Authentication using Convergence Reflex and Eyeball Shape
Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.)

(29) 17:00 - 17:25
A study on information content of biometrics
Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.)

(30) 17:25 - 17:50
Advantage of User Authentication Using Unclear Images
-- Automatic Generation of Decoy Images --
Takumi Yamamoto (Shizuoka Univ.), Atsushi Harada (Mitsubishi Electric), Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)

----------------------------------------
Fri, Jul 20 AM Room A (09:55 - 12:00)
----------------------------------------

(31) 09:55 - 10:20
A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device
Janghoon Song, Koki Abe (UEC)

(32) 10:20 - 10:45
Analysis on the Key-Scheduling Algorithm of MICKEY
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)

(33) 10:45 - 11:10
A Study on the Tews-Weinmann-Pyshkin Attack against WEP
Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)

(34) 11:10 - 11:35
On Construction of Block Cipher with Variable Security Parameter
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.)

(35) 11:35 - 12:00
Hardware Implementations of the 128-bit Blockcipher CLEFIA
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.)

----------------------------------------
Fri, Jul 20 AM Room B (09:55 - 12:00)
----------------------------------------

(36) 09:55 - 10:20
Proposal for the quantitative method of searching characteristics of node
Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi)

(37) 10:20 - 10:45
Orthogonal expansion of port-scan packets
Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi)

(38) 10:45 - 11:10
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet
Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai)

(39) 11:10 - 11:35
Exploring the required condtions for malware to run for behavior analysis
Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT)

(40) 11:35 - 12:00
Automatic malware classification
Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.)

----------------------------------------
Fri, Jul 20 PM Room A (13:00 - 15:05)
----------------------------------------

(41) 13:00 - 13:25
A Factoring Algorithm Searching Squares
Kunikatsu Kobayashi (Yamagata Univ.)

(42) 13:25 - 13:50
A Construction Method of Nonlinear Piece In Hand Matrix for Universally Enhancing the Security of Various Multivariate Public Key Cryptosystems
Shigeo Tsujii (iisec), Kohtaro Tadaki (Chuo Univ.), Ryou Fujita (iisec)

(43) 13:50 - 14:15
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
Erik Dahmen (TUDarmstadt), Katsuyuki Okeya (Hitachi), Daniel Schepers (TUDarmstadt)

(44) 14:15 - 14:40
A Generalized Merkle Signature Scheme
Erik Dahmen (TU Darmstadt), Camille Vuillaume, Katsuyuki Okeya (Hitachi), Elena Klintsevich, Johannes Buchmann (TU Darmstadt)

(45) 14:40 - 15:05
*
Kunio Miyamoto, Hidehiko Tanaka (IISEC)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 20 PM Room B (13:00 - 15:05)
----------------------------------------

(46) 13:00 - 13:25
A Design and Evaluation of Filtering Method of Image Spam in Bayesian Filter
Masahiro Uemura, Toshihiro Tabata (Okayama Univ.)

(47) 13:25 - 13:50
A Study for Characteristics Transition of SPAM
Yosuke Aragane, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT)

(48) 13:50 - 14:15
A Study of Spam Mail Combined with Social Engineering
Kensuke Shibata, Itaru Kamiya, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)

(49) 14:15 - 14:40
A study of outward features of Spam mails
Itaru Kamiya, Kensuke Shibata, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)

(50) 14:40 - 15:05
Partial Integrity Assurance Technology PIAT: An Application to Sender Domain Authentication
Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka (FUJITSU Lab.)

----- Break ( 15 min. ) -----

----------------------------------------
Fri, Jul 20 PM Room A (15:20 - 17:00)
----------------------------------------

(51) 15:20 - 15:45
Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK)

(52) 15:45 - 16:10
Efficient Group Signature Scheme based on the DDH Problem
Takuya Yoshida, Koji Okada (Toshiba Solutions)

(53) 16:10 - 16:35
An Extension of Sanitizable and Deletable Signature
Masami Izumi (UEC), Tetsuya Izu (FUJITSU Lab.), Noboru Kunihiro, Kazuo Ohta (UEC)

(54) 16:35 - 17:00
(TBA)
Masahiko Takenaka, Takeshi Shimoyama, Tetsuya Izu (Fujitsu Labs.)

----------------------------------------
Fri, Jul 20 PM Room B (15:20 - 17:25)
----------------------------------------

(55) 15:20 - 15:45
A Consideration for Detecting Virus Email by Using Mail Form Information
Daisuke Miyamoto, Takuji Iimura, Youki Kadobayashi (NAIST)

(56) 15:45 - 16:10
An extension of secure OS on virtual machine monitor using split device driver
Ruo Ando, Youki Kadobayashi (NICT)

(57) 16:10 - 16:35
Preliminary studies of secure OS as application platform
Hidenori Tsuji (IISEC/Institute of Information Tech.), Masaki Hashimoto, Mira Kim, Hidehiko Tanaka (IISEC)

(58) 16:35 - 17:00
Phishing detection based on features of mimic content.
Shinta Nakayama, Hiroshi Yoshiura (UEC)

(59) 17:00 - 17:25
Capability-Based System for Distributed Environment
Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC)



=== Special Interest Group on Computer Security (IPSJ-CSEC) ===

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 7, 2007: Kikai-Shinko-Kaikan Bldg. [Mon, Jun 18]

# SECRETARY:
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===


Last modified: 2007-06-28 19:44:29


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan