IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Information Security (ISEC)
Chair: Shinichi Kawamura Vice Chair: Masakatsu Morii, Mitsuru Matsui
Secretary: Shoichi Hirose, Hiroshi Doi
Assistant: Shiho Moriai

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Yoshinori Sakai Vice Chair: Hironobu Kinoshita, Toshinari Tsuruhara
Secretary: Hiroaki Sakamoto, OgawaShunichi Amemiya
Assistant: Masaru Ogawa

DATE:
Thu, Jul 21, 2005 09:30 - 18:15
Fri, Jul 22, 2005 09:30 - 17:50

PLACE:
Iwate Prefectural University(http://www.iwate-pu.ac.jp/postexam/access.html. Toyoo Takata. 019-694-2606)

TOPICS:


----------------------------------------
Thu, Jul 21 AM Room A (09:30 - 12:00)
----------------------------------------

(1) 09:30 - 09:55
A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot
Maki Kataoka, Yumiko Ishige (NTT Data Corporation), Nobutaka Mantani, Humiharu Ohashi (National Police Agency)

(2) 09:55 - 10:20
A Study on Implementation of the Worm Prevention System Following the Infection Process
Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA)

(3) 10:20 - 10:45
A Study on a Method for Malware Quarantine in a Multi-OS Environment
Tatsuya Baba, Hiroshi Fujimoto, Masataka Kado, Tsutomu Inada (NTT Data)

(4) 10:45 - 11:10
A Consideration of Spyware Detection using Traffic Analysis
Akira Yonahara, Hisamichi Ohtani, Tatsuya Baba, Tsutomu Inada (NTT DATA)

(5) 11:10 - 11:35
Evaluation of the quarantine system using "in the wild" viruses
Osamu Tanaka, Katsuya Uchida (IISEC)

(6) 11:35 - 12:00
A Note of Intrusion Detection using Alteration of Data
Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.)

----------------------------------------
Thu, Jul 21 AM Room B (09:55 - 12:00)
----------------------------------------

(7) 09:55 - 10:20
Comparison of Error Probabilities of The Miller-Rabin Test by Experimental Measurement Value and Theoretical Upper Bound
Toshiya Nakajima (Fujitsu Labs.)

(8) 10:20 - 10:45
On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack
Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC)

(9) 10:45 - 11:10
Performance of Prime Order Elliptic Curve Generation based on y-twist
Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

(10) 11:10 - 11:35
Defeating Simple Power Analysis on Koblitz Curves
Katsuyuki Okeya (Hitachi), Tsuyoshi Takagi (Future Univ. of Hakodate), Camille Vuillaume (Hitachi)

(11) 11:35 - 12:00
Development of DPA evaluation platform for 32 bit processor
Koichi Fujisaki, Hideo Shimizu, Atsushi Shimbo (Toshiba Corp.)

----------------------------------------
Thu, Jul 21 PM Room A (13:00 - 17:50)
----------------------------------------

(12) 13:00 - 13:25
Researches on Incident Tendency Detection Method on Frequency Analysis
Hirofumi Nakakoji, Masato Terada, Kenichi Sakamoto (Hitachi)

(13) 13:25 - 13:50
Study on Host Profiling for Incident Analysis
Kazuya Ohkouchi (NICT/HITACHI), Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI)

(14) 13:50 - 14:15
A Simulation-based UDP Traffic Analysis of DNSSEC
Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI), Shinji Shimojo (Osaka Univ.), Hiroki Nogawa (Tokyo Medical and Dental Univ.)

(15) 14:15 - 14:40
Research on Epidemiologic Approach for Anti Computer Viruses - 2
-- Applying to the model of anti mass-mailing virus measure --
Satoshi Seki (Waseda Univ.), Ryoichi Sasaki (Tokyo Denki Univ.), Mitsuru Iwamura (Waseda Univ.), Hiroshi Motosugi (Tokyo Denki Univ.)

(16) 14:40 - 15:05
Extension and Evaluation of Check Function for Improper Sending of Personal Information in Encrypted Mail System
Kenji Yasu (TDU), Yasuhiko Akabane (NSD), Masami Ozaki (HIN), Koji Semoto (DCS), Ryoichi Sasaki (TDU)

(17) 15:05 - 15:30
Guardian watch support system for the children's Web access
Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.)

----- Break ( 15 min. ) -----

(18) 15:45 - 16:10
*
Keiko Kinoshita, Yasuhiro Inazumi, Hirotsugu Kinoshita (Kanagawa Univ.),

(19) 16:10 - 16:35
Systematizing of Information Forensics
Kouichi Mukouyama, Katsuya Uchida (IISEC)

(20) 16:35 - 17:00
Consideration about intellectual property rights in university graduation thesis and production created by students
Ryoju Hamada (Tohoku Univ.), Norihisa Segawa, Yuko Murayama (Iwate-pu)

(21) 17:00 - 17:25
The Direction of Japan's CMVP II
Yuichi Hagiwara (C4T), Travis Spann (InfoGard), Tatsuaki Takebe (Yokogawa)

(22) 17:25 - 17:50
On the Standardization of Information Security
-- Report on the Vienna Meeting in April, 2005 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric), Toshio Tatsuta (IBM Japan), Akira Otsuka (IPA/AIST), Kan Yasuda (NTT)

----------------------------------------
Thu, Jul 21 PM Room B (13:00 - 18:15)
----------------------------------------

(23) 13:00 - 13:25
Construction of Oblivious Signatures
Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.)

(24) 13:25 - 13:50
Partially Blind Signatures with Traceability
Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT)

(25) 13:50 - 14:15
Proposal on Sumi coating method which can change the coating parts to protect against insider attacks
Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ)

(26) 14:15 - 14:40
Exact t-out-of-n Signer-Ambiguous Signature
Eiichiro Fujisaki, Koutarou Suzuki (NTT)

(27) 14:40 - 15:05
An (N,K) Threshold Signature Scheme with Public Keys of Small Size
Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Comm. Univ.)

(28) 15:05 - 15:30
Meta Ring Signature
Hiroyuki Okazaki (KCG), Ryuichi Sakai (OECU), Masao Kasahara (OGU)

----- Break ( 15 min. ) -----

(29) 15:45 - 16:10
An Information Hiding System for Word 2003 XML Documents
Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo)

(30) 16:10 - 16:35
A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow
Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.)

(31) 16:35 - 17:00
A Text hiding by Visual Secret Sharing with Picture Images
Takashi Miyaki, Kazuya Shioda (Shizuoka Univ.), Hideki Yoshida (NTT Data), Masaharu Ozawa (ChanceLab.), Masakatsu Nishigaki (Shizuoka Univ.)

(32) 17:00 - 17:25
Implementation and Evaluation of Memory Protection Methods for Multitask OSes
-- CMS for Resource-poor Platforms and Tampering Detection --
Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo)

(33) 17:25 - 17:50
A description model for data access control in Salvia operating system
Yoshimi Ichiyanagi, Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo (Ritsumeikan Univ.)

(34) 17:50 - 18:15
A Case Study of Gordon-Loeb Model on Optimal Security Investiments
Kimio Kuramitsu (Yokohama National Univ.)

----------------------------------------
Fri, Jul 22 AM Room A (09:30 - 12:00)
----------------------------------------

(35) 09:30 - 09:55
A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation
Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications)

(36) 09:55 - 10:20
Murakami-Kasahara ID-based Key Sharing Scheme Revisited
-- In Comparison With Maurer-Yacobi Scheme --
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)

(37) 10:20 - 10:45
Efficient N-Party Password-based Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo)

(38) 10:45 - 11:10
Relations Among Notions of Security for Identity Based Encryption Schemes
Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST)

(39) 11:10 - 11:35
On a secure circuit evaluation protocol using ElGamal encryption
Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT)

(40) 11:35 - 12:00
An efficiently-verifiable zero-knowledge argument for proofs of knowledge
Tsuyoshi Yamamoto, Eiichiro Fujisaki, Masayuki Abe (NTT)

----------------------------------------
Fri, Jul 22 AM Room B (09:30 - 11:35)
----------------------------------------

(41) 09:30 - 09:55
Development of a certificate path cache method for Certificate Validation Service
Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.)

(42) 09:55 - 10:20
A Status Detection of Secure Communication in Secure Service Platform
Osamu Takata, Yuko Sawai, Kazuyoshi Hoshino, Tadashi Kaji, Keisuke Takeuchi, Takahiro Fujishiro, Satoru Tezuka (Hitachi)

(43) 10:20 - 10:45
Development of Combined Authentication System
Shinji Hirata, Masahiro Mimura, Kenta Takahashi, Yoshiaki Isobe (Hitachi)

(44) 10:45 - 11:10
A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository
Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT)

(45) 11:10 - 11:35
On Shared Attribute Certification
Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.)

----------------------------------------
Fri, Jul 22 PM Room A (13:00 - 17:50)
----------------------------------------

(46) 13:00 - 13:25
Critical cryptoanalysis for Y-00
Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco)

(47) 13:25 - 13:50
Cheater Identifiable Quantum Secret Sharing Schemes
Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST)

(48) 13:50 - 14:15
Improvement of the Security against Photon Number Splitting Attacks
Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing)

(49) 14:15 - 14:40
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices
Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.)

(50) 14:40 - 15:05
Improved Collision Attack on MD4 with Probability Almost 1
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta (UEC)

----- Break ( 15 min. ) -----

(51) 15:20 - 15:45
1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)

(52) 15:45 - 16:10
How to send a return receipt on anonymous channel ?
Shinji Yamanaka (TOSHIBA)

(53) 16:10 - 16:35
Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.)

(54) 16:35 - 17:00
A note on cryptographic schemes using collision-resistant functions based on factoring
Jumpei Wada, Hajime Kanzaki (Kyoto Univ.), Shoichi Hirose (Fukui Univ.), Susumu Yoshida (Kyoto Univ.)

(55) 17:00 - 17:25
Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment
Takeshi Nasako, Yasuyuki Murakami (OECU)

(56) 17:25 - 17:50
Improving the security of S boxes in DES using Genetic Algorithm
Atsushi Koyama, Yasuyuki Murakami (OECU)

----------------------------------------
Fri, Jul 22 PM Room B (13:00 - 17:50)
----------------------------------------

(57) 13:00 - 13:25
Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability
Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.)

(58) 13:25 - 13:50
A Secure Reversible Watermark Using Predictive Coding
Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing)

(59) 13:50 - 14:15
An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking
Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ)

(60) 14:15 - 14:40
Robust watermarking scheme for copied, rotated and clipped documents
Kurato Maeno, Masayuki Suto (Oki)

(61) 14:40 - 15:05
An Implementation of Partial Integrity Assurance Method for Image Data
Masahiko Takenaka, Takashi Yoshioka (FUJITSU LABS.)

----- Break ( 15 min. ) -----

(62) 15:20 - 15:45
Study on a Anti-Tracking RF-ID Tag System
Atsushi Sakai, Masahiko Takenaka (FUJITSU LABS.)

(63) 15:45 - 16:10
Proposal and evaluation of digital forensic logging system using USB Device
Yuki Ashino, Hiroto Kokawa, Tsukasa Sato, Ryoichi Sasaki (TDU)

(64) 16:10 - 16:35
A study of wireless location privacy protection considering communication quality
Hiroshi Yamane, Leping Huang, Kanta Matsuura, Kaoru Sezaki (Tokyo Univ.)

(65) 16:35 - 17:00
Personal Information Management System based on Linkability Control
Yoshinori Sato, Akihiko Kawasaki, Toyohisa Morita, Takashi Fukumoto (Hitachi, Ltd.)

(66) 17:00 - 17:25
Identity Control Method Considering Privacy
Hajime Morito, Akihiko Kawasaki, Toyohisa Morita, Kazuo Takaragi (Hitachi Ltd.)

(67) 17:25 - 17:50
A Report on the 4th Annual PKI R&D Workshop
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)

# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.


=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 16, 2005: Kikai-Shinko-Kaikan Bldg. [Fri, Jul 22]

# SECRETARY:
Shoichi Hirose(School of Engineering, The University of Fukui)
TEL0776-27-9738,FAX0776-27-9738
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===
# FUTURE SCHEDULE:

Fri, Oct 7, 2005: Matsuyama-Univ. [Mon, Aug 15]


Last modified: 2005-06-29 09:47:24


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan