Fri, Nov 5 AM 10:30 - 17:15 |
(1) |
10:30-10:55 |
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application |
Masakazu Soshi (Hiroshima City Univ.) |
(2) |
10:55-11:20 |
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks |
Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.) |
(3) |
11:20-11:45 |
Proposal of Time-limited Key Management Scheme Using One-way Functions |
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) |
|
11:45-13:00 |
Break ( 75 min. ) |
(4) |
13:00-13:25 |
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications |
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) |
(5) |
13:25-13:50 |
A Timed-Release Proxy Re-Encryption Scheme and its Applications |
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) |
(6) |
13:50-14:15 |
Ontological Approach toward Cybersecurity in Cloud Computing |
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) |
|
14:15-14:30 |
Break ( 15 min. ) |
(7) |
14:30-14:55 |
Network Topology Analysys for Web Malware Risk Assesment |
Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) |
(8) |
14:55-15:20 |
A Document Access Control Model Based on Role and Security Policy |
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) |
(9) |
15:20-15:45 |
Development of Multifactor Authentication Platform with a Single Sign-On Function |
Jiro Yamada, Satoshi Yagi, Isoo Ueno, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications) |
|
15:45-16:00 |
Break ( 15 min. ) |
(10) |
16:00-16:25 |
Determining granularity of URL filtering based on tree structure of malicious website URL |
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) |
(11) |
16:25-16:50 |
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation |
Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
(12) |
16:50-17:15 |
A Method of Sandbox Analysis of Malware Acting with Use of Online Services |
Kousuke Murakami, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |