IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Kazuo Ota (Univ. of Electro-Comm.)
Vice Chair Kazuo Takaragi (Hitachi), Toru Fujiwara (Osaka Univ.)
Secretary Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Noboru Kunihiro (Univ. of Tokyo)
Assistant Katsuyuki Takashima (Mitsubishi Electric)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Toshinari Tsuruhara (DT)
Vice Chair Hiroyuki Inaba (Kyoto Inst. of Tech.), Michio Nakanishi (Osaka Inst. of Tech.)
Secretary Tetsuya Morizumi (Toyo Networks & System Integration), Eizen Kimura (Ehime Univ.)
Assistant Yukiko Kawaguchi (Uekusa), Soichiro Morishita (Univ. of Tokyo)

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Conference Date Thu, Jul 24, 2008 13:00 - 17:50
Fri, Jul 25, 2008 09:55 - 17:25
Topics  
Conference Place Fukuoka Institute of System LSI Design Industry 
Transportation Guide http://www.ist.or.jp/lsi/pg03_01.html
Contact
Person
Prof. Toshihiko Shimokawa

Thu, Jul 24 PM 
13:00 - 15:05
(1) 13:00-13:25 A Note on the Security of KMN PKC and Presentation of Challenge Problems Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.)
(2) 13:25-13:50 On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 --
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.)
(3) 13:50-14:15 Design Policy of MPKC based on Piece in Hand Concept Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.)
(4) 14:15-14:40 Knapsack Cryptosystem on Elliptic Curves of Trace Tow Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.)
(5) 14:40-15:05 On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA)
Thu, Jul 24 PM 
13:00 - 14:40
(6) 13:00-13:25 An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II) Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.)
(7) 13:25-13:50 Efficiency of a Redactable Signature with Tree Construction Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.)
(8) 13:50-14:15 A System against Leakage though Paper Documents in Multi-Vendor Environment Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI)
(9) 14:15-14:40 Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)
Thu, Jul 24 PM 
15:20 - 17:50
(10) 15:20-15:45 Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents Haruo Kodama (NIME)
(11) 15:45-16:10 Basic Study on Designing Navigation Systems for the Blind Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal)
(12) 16:10-16:35 A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.)
(13) 16:35-17:00 Study on Reputation Systems for Trusty Information Network Noriaki Yoshikai (Niohn Univ.)
(14) 17:00-17:25 Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC)
(15) 17:25-17:50 Study of method for expressing context Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS)
Thu, Jul 24 PM 
15:20 - 17:00
(16) 15:20-15:45 Variable Probabilistic Packet Mareking with TTL for IP Traceback Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
(17) 15:45-16:10 Information Leakage Prevention Function of host based for P2P File Exchange Environment Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
(18) 16:10-16:35 Study of Database for information sharing of P2P File Exchange Environment Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi)
(19) 16:35-17:00 An enhancement of VMM snapshot utility for detcting code injection Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT)
Fri, Jul 25 AM 
09:55 - 12:00
(20) 09:55-10:20 Detecting of Unknown Computer Virus Variants Based on Computer Behavior Haruka Mimori, Koki Abe (UEC)
(21) 10:20-10:45 Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems Ryoya Miyazawa, Koki Abe (UEC)
(22) 10:45-11:10 A Proposal of Intrusion Detection using Third-parties Support Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT)
(23) 11:10-11:35 Examination of the issues in designing of electronic signature documentation system Miyuki Takao, Koichiro Hayashi (IISEC)
(24) 11:35-12:00 Clone Resistance of Paper Artifact-Metrics with Segmented Matching Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU)
Fri, Jul 25 AM 
09:55 - 12:00
(25) 09:55-10:20 Architecture Optimization of a Group Signature Circuit Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC)
(26) 10:20-10:45 A Lattice Model of the General Confidentiality Policies Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
(27) 10:45-11:10 Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)
(28) 11:10-11:35 Proposal of Anonymos Routing Technique with DHT Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.)
(29) 11:35-12:00 Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.)
Fri, Jul 25 PM 
13:00 - 15:05
(30) 13:00-13:25 Implementation of Block Cipher Camellia with a Configurable and Extensible Processor Kazuyoshi Matsuo, Koki Abe (UEC)
(31) 13:25-13:50 Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
(32) 13:50-14:15 Hash Function Using MMO Compression Function and MDP Domain Extension Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.)
(33) 14:15-14:40 Traitor Tracing from ID based Broadcast Encryption Ryuichi Sakai (OECU)
(34) 14:40-15:05 A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
Fri, Jul 25 PM 
13:00 - 15:05
(35) 13:00-13:25 Invalidation of a Mailing-list Address against Spam Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)
(36) 13:25-13:50 Proposal of a Cue & Response Based User Authentication Using Unclear Image Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
(37) 13:50-14:15 Self expandable RBAC for distributed systems Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)
(38) 14:15-14:40 Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)
(39) 14:40-15:05 A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Fri, Jul 25 PM 
15:20 - 17:25
(40) 15:20-15:45 Watermarking Method with a Quasi-One-Way Function Kazuo Ohzeki, Engyoku Gi (SIT)
(41) 15:45-16:10 Ring Authenticated Group Key Establishment with Member Repudiation Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo)
(42) 16:10-16:35 A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
(43) 16:35-17:00 Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.)
(44) 17:00-17:25 A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
Fri, Jul 25 PM 
15:20 - 16:35
(45) 15:20-15:45 A Study on Detecting Information Leak Virus by Activity Monitoring Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.)
(46) 15:45-16:10 Development of publicity function of the illegitimate activity host by the IP marking Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
(47) 16:10-16:35 P2P Node Detection method based on Connection Analysis Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.)

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  


Last modified: 2008-07-02 23:09:55


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan