IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


===============================================
Technical Committee on Information Security (ISEC)
Chair: Masakatsu Morii Vice Chair: Mitsuru Matsui, Kazuo OtaUEC
Secretary: Hiroshi Doi, Shiho Moriai
Assistant: Zenmei Shiraishi

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Hironobu Kinoshita Vice Chair: Toshinari Tsuruhara, Hiroyuki Inaba
Secretary: Shunichi Amemiya, Masaru Ogawa
Assistant: Eizen Kimura

DATE:
Thu, Jul 20, 2006 09:05 - 17:50
Fri, Jul 21, 2006 09:30 - 17:25

PLACE:
Tsushima Campus, Okayama University(3-1-1, Tsushimanaka, Okayama-shi, 700-8530 Japan. Access http://www.okayama-u.ac.jp/en/access.html, Campus Map http://www.okayama-u.ac.jp/en/tsushima_e.html. Prof. Toshihiro Tabata. 086-251-8188)

TOPICS:


----------------------------------------
Thu, Jul 20 AM Room A (09:30 - 11:35)
----------------------------------------

(1) 09:30 - 09:55
A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation
Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

(2) 09:55 - 10:20
Square Root Calculation Algorithm over Type-II All One Polynomial Field
Hidehiro Kato (Okayama Univ.), Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

(3) 10:20 - 10:45
Pairing Computation with MNT Curve over All One Polynomial Field
Masataka Akane, Takumi Okimoto, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

(4) 10:45 - 11:10
Efficient Calculation for Tate Pairing
Masaaki Shirase, Tsuyoshi Takagi (FUN), Eiji Okamoto (Univ of Tsukuba)

(5) 11:10 - 11:35
A Survey on Dedicated Factoring Hardware (Relation Finding Step)
Tetsuya Izu (FUJITSU), Noboru Kunihiro (UEC), Takeshi Shimoyama (FUJITSU)

----------------------------------------
Thu, Jul 20 AM Room B (09:05 - 12:00)
----------------------------------------

(6) 09:05 - 09:30
A Proposal to Hi-Tech Pollution Based on the Criterion of "Relationism-First"
-- A Principle Experiment of EM Environment around VDT and Its Basics Theory --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Emeritus Prof. of Hiroshima Univ.)

(7) 09:30 - 09:55
A copyright and proprietary rights protection system with an Information Filter and an Information Capsule
Kota Yamada, Hirotsugu Kinoshita (KU), Tetsuya Morizumi (TNSi)

(8) 09:55 - 10:20
Balance between Security and Privacy
Yasutoshi Ishizaki (Chuo Univ.)

(9) 10:20 - 10:45
A Study on Dynamic Risk Analysis Corresponding to Environmental Changes
Hideaki Kawanishi, Koichi Kato, Tatsuaki Takahashi, Ramirez Caceres Guillermo Horacio, Yoshimi Teshigawara (Soka Univ.)

(10) 10:45 - 11:10
Survey and Analysis on Data Delete in PC for Internet Auction
Satsuki Sato, Yuki Ashino (TDU), Tetsutaro Uehara (KU), Ryoichi Sasaki (TDU)

(11) 11:10 - 11:35
Development of Internet Watchdog Systems for Children Protection
Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.)

(12) 11:35 - 12:00
Genaral Decline in the Literacy of Science
Takeshi Shimomura

----------------------------------------
Thu, Jul 20 PM Room A (13:00 - 17:50)
----------------------------------------

(13) 13:00 - 13:25
Secure Exponentiation with High Flexibility
Camille Vuillaume, Katsuyuki Okeya (Hitachi)

(14) 13:25 - 13:50
Double-Size Montgomery Multiplication of a Crypto-Coprocessor
Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume (Hitachi)

(15) 13:50 - 14:15
An Improved Mehtod for the Table Lookup Multiplication Algorithm over GF(2^m)
Yoichi Hadama, Daisuke Nakamura (Kobe Univ.), Masanori Hirotomo (Hyogo Inst. of Info. Education Foundation), Masakatu Morii (Kobe Univ.)

(16) 14:15 - 14:40
Fast Generation of Safe Primes using Deterministic Primality Tests based on Maurer Method
Hidehiro Kumakyu, Akito Niwa (Toshiba Solusions Corp.)

(17) 14:40 - 15:05
A method for generating elliptic curves suitable for implementing an efficient group signature scheme
Norikazu Kubotera, Jun Furukawa, Kazue Sako (NEC)

----- Break ( 15 min. ) -----

(18) 15:20 - 15:45
Batch Processing of Interactive Proofs
Tsuyoshi Yamamoto, Koji Chida (NTT)

(19) 15:45 - 16:10
Efficient Implementation of Secure Circuit Evaluation Using Batch Processing
Koji Chida, Tsuyoshi Yamamoto (NTT)

(20) 16:10 - 16:35
Inspection of sufficient conditions of MD5
Yuto Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)

(21) 16:35 - 17:00
Possibility of the Key Recovery Attack against Py
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)

(22) 17:00 - 17:25
Tight theoretical estimation of the security of RC6 against chi-square attack
Takatomi Wada, Atsuko Miyaji (JAIST), Tomohiko Hinoue (OMRON)

(23) 17:25 - 17:50
On the security of Piece In Hand Concept based on Sequential Solution Method
Daisuke Ito, Yoshitomo Fukushima, Toshinobu Kaneko (TUS)

----------------------------------------
Thu, Jul 20 PM Room B (13:00 - 17:50)
----------------------------------------

(24) 13:00 - 13:25
A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems
Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)

(25) 13:25 - 13:50
IDS for SSL Enncrypted Web Traffic
Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.)

(26) 13:50 - 14:15
DHT-based Dynamic VPN Instantiation Mechanism for Secure Home Network Access
Ayumu Kubota, Akira Yamada, Yutaka Miyake (KDDI R&D Labs.)

(27) 14:15 - 14:40
Performance Improvement of Anomaly Detection System by Simplifying Call Stack Inspection
Katsuhiro Suzuki (Univ. of Tsukuba), Hirotake Abe (JST), Kazuhiko Kato (Univ. of Tsukuba), Akira Kinno, Yuka Ikebe, Takehiro Nakayama, Atsushi Takeshita (NTT DoCoMo)

----- Break ( 40 min. ) -----

(28) 15:20 - 15:45
A Proposal of Response Delay Method for Spam Mail from BOTNET
Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU)

(29) 15:45 - 16:10
A Study on Bot Detection using Response Time
Yuji Hoshizawa, Motoaki Yamamura (SecureBrain)

(30) 16:10 - 16:35
A Configuration Parameter Correction for Security Configuration Analyzing System
Sumitaka Okajo, Katsushi Matsuda (NEC)

(31) 16:35 - 17:00
On Enforcement of Noninterference
Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech)

(32) 17:00 - 17:25
Preventing Buffer Overflow Attacks bypassing NXbit Protection
Takahiro Shinagawa (TUAT)

(33) 17:25 - 17:50
Security Enhancement of HTTP-FUSE Knoppix Client by Trusted Computing
Megumi Nakamura, Seiji Munetoh (IBM Japan), Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Ichiro Osawa (AIST)

----------------------------------------
Fri, Jul 21 AM Room A (09:30 - 12:00)
----------------------------------------

(34) 09:30 - 09:55
A Study of Partial Disclosure Problem in Ramp Schemes Using Polynomial Function
-- A Proposal of Cascaded Ramp Scheme --
Keiichi Hirota (NTT), Kazuo Mogi (NTT Communications)

(35) 09:55 - 10:20
Quantum Threshold Scheme Using Two States
Takeshi Okada, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)

(36) 10:20 - 10:45
Traveling Salesman Problem and Tribonacci Sequence
Kunikatsu Kobayashi, Seiichirou Kokubun (Yamagata Univ.)

(37) 10:45 - 11:10
Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols
Hirofumi Muratani (Toshiba)

(38) 11:10 - 11:35
Privacy-preserving Scalar Product Comparison Protocol
Jun Sakuma, Shigenobu Kobayashi (TokyoTech)

(39) 11:35 - 12:00
Secure optimization for distributed TSP using scalar product comparison protocol
Jun Sakuma, Shigenobu Kobayashi (TokyoTech)

----------------------------------------
Fri, Jul 21 AM Room B (09:30 - 12:00)
----------------------------------------

(40) 09:30 - 09:55
On the Standardization of Information Security
-- Report on the Madrid Meeting in May, 2006 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba)

(41) 09:55 - 10:20
Security Requirements for PIN Authentication in Financial Transactions
Yuko Tamura (BOJ), Masashi Une (BOJ/AIST)

(42) 10:20 - 10:45
Proposal and Evaluation on Epidemiological Approach to Computer Virus
Ryoichi Sasaki (Dendai)

(43) 10:45 - 11:10
Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet
Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.)

(44) 11:10 - 11:35
A study on security technologies for paper documents
Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi)

(45) 11:35 - 12:00
Visualization Technologies of nicter Incident Analysis System
Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE)

----------------------------------------
Fri, Jul 21 PM Room A (13:00 - 17:25)
----------------------------------------

(46) 13:00 - 13:25
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates
Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST)

(47) 13:25 - 13:50
Fingerprinting Protocol Equipping Electronic Payment System
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.)

(48) 13:50 - 14:15
An Efficient Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.)

(49) 14:15 - 14:40
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.)

(50) 14:40 - 15:05
Distributed Privacy-preserving Document Clustering
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.)

----- Break ( 15 min. ) -----

(51) 15:20 - 15:45
Key-Management Scheme for Secure Multicast based on Network Topology
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)

(52) 15:45 - 16:10
The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA
Yasutaka Shinzaki, Takeshi Ogino, Shintaro Ueda, Hiroshi Shigeno (Keio Univ.)

(53) 16:10 - 16:35
An Implementation of a Privacy Enhancing Questionnaire System for Evaluating Classes
Koji Tanigawa, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)

(54) 16:35 - 17:00
Proposal on whistle-blower protection technology to prevent the exposure of accuser from an indictment document
Masataka Tada, Mituyuki Takatuka, Takanobu Masubuchi, Ryoichi Sasaki (Tokyo Den Univ.)

(55) 17:00 - 17:25
3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions
Naoki Miyake, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)

----------------------------------------
Fri, Jul 21 PM Room B (13:00 - 17:25)
----------------------------------------

(56) 13:00 - 13:25
Watermarking Method by Alternative Representation of Document Backgrounds
Takashi Hashimoto, Kurato Maeno, Hiroyuki Hota (Oki Electric Industry Co., Ltd.)

(57) 13:25 - 13:50
A User Authentication using Blind Spot and Papillary Light Reflex (part2)
Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ)

(58) 13:50 - 14:15
An Improvement of User Authentication Using Schema of Visual Memory
-- An extension of the system using hint --
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ)

(59) 14:15 - 14:40
Extracting Contexts From Keystroke Data
Munetoshi Ishikawa, Mizuki Oka, Kazuhiko Kato (Tsukuba Univ.)

(60) 14:40 - 15:05
Development of IH-ZIP: A Data Compression Tool for Information Hiding
Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Koji Nakao (NICT), Tsutomu Matsumoto (Yokohama National Univ.)

----- Break ( 15 min. ) -----

(61) 15:20 - 15:45
A Proposal on Cancelable Biometrics for Image Matching based biometrics
Shinji Hirata, Kenta Takahashi, Masahiro Mimura (Hitachi)

(62) 15:45 - 16:10
Comparison of revocation problem between ID based encryption and biometric authentication schemes
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ)

(63) 16:10 - 16:35
A Design of DRM systems with hardware-based authentication
Hiromi Fukaya (Pastel Co.), Kouichi Sakurai (Kyushu Univ.)

(64) 16:35 - 17:00
A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)

(65) 17:00 - 17:25
Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security
Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)


# CONFERENCE ANNOUNCEMENT:
- Please join us for an opening reception after the sessions of the first day.


=== Special Interest Group on Computer Security (IPSJ-CSEC) ===

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Wed, Sep 13, 2006: Kikai-Shinko-Kaikan Bldg. [Fri, Jul 21]

# SECRETARY:
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-mail: ic-c (to ISEC secretaries)

=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===


Last modified: 2006-07-15 15:43:33


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan