IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev SITE Conf / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 

===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Toshinari Tsuruhara (DT)
Vice Chair: Hiroyuki Inaba (Kyoto Inst. of Tech.), Michio Nakanishi (Osaka Inst. of Tech.)
Secretary: Tetsuya Morizumi (Toyo Networks & System Integration), Eizen Kimura (Ehime Univ.)
Assistant: Yukiko Kawaguchi (Uekusa), Soichiro Morishita (Univ. of Tokyo)

===============================================
Technical Committee on Information Security (ISEC)
Chair: Kazuo Ota (Univ. of Electro-Comm.) Vice Chair: Kazuo Takaragi (Hitachi), Toru Fujiwara (Osaka Univ.)
Secretary: Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Noboru Kunihiro (Univ. of Tokyo)
Assistant: Katsuyuki Takashima (Mitsubishi Electric)

===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)


DATE:
Thu, Jul 24, 2008 13:00 - 17:50
Fri, Jul 25, 2008 09:55 - 17:25

PLACE:
Fukuoka Institute of System LSI Design Industry(http://www.ist.or.jp/lsi/pg03_01.html. Prof. Toshihiko Shimokawa)

TOPICS:


----------------------------------------
Thu, Jul 24 PM (13:00 - 15:05)
----------------------------------------

(1) 13:00 - 13:25
A Note on the Security of KMN PKC and Presentation of Challenge Problems
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.)

(2) 13:25 - 13:50
On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 --
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.)

(3) 13:50 - 14:15
Design Policy of MPKC based on Piece in Hand Concept
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.)

(4) 14:15 - 14:40
Knapsack Cryptosystem on Elliptic Curves of Trace Tow
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.)

(5) 14:40 - 15:05
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA)

----------------------------------------
Thu, Jul 24 PM (13:00 - 14:40)
----------------------------------------

(6) 13:00 - 13:25
An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II)
Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.)

(7) 13:25 - 13:50
Efficiency of a Redactable Signature with Tree Construction
Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.)

(8) 13:50 - 14:15
A System against Leakage though Paper Documents in Multi-Vendor Environment
Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI)

(9) 14:15 - 14:40
Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone
Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)

----------------------------------------
Thu, Jul 24 PM (15:20 - 17:50)
----------------------------------------

(10) 15:20 - 15:45
Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents
Haruo Kodama (NIME)

(11) 15:45 - 16:10
Basic Study on Designing Navigation Systems for the Blind
Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal)

(12) 16:10 - 16:35
A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.)

(13) 16:35 - 17:00
Study on Reputation Systems for Trusty Information Network
Noriaki Yoshikai (Niohn Univ.)

(14) 17:00 - 17:25
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC)

(15) 17:25 - 17:50
Study of method for expressing context
Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS)

----------------------------------------
Thu, Jul 24 PM (15:20 - 17:00)
----------------------------------------

(16) 15:20 - 15:45
Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)

(17) 15:45 - 16:10
Information Leakage Prevention Function of host based for P2P File Exchange Environment
Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)

(18) 16:10 - 16:35
Study of Database for information sharing of P2P File Exchange Environment
Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi)

(19) 16:35 - 17:00
An enhancement of VMM snapshot utility for detcting code injection
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT)

----------------------------------------
Fri, Jul 25 AM (09:55 - 12:00)
----------------------------------------

(20) 09:55 - 10:20
Detecting of Unknown Computer Virus Variants Based on Computer Behavior
Haruka Mimori, Koki Abe (UEC)

(21) 10:20 - 10:45
Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems
Ryoya Miyazawa, Koki Abe (UEC)

(22) 10:45 - 11:10
A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT)

(23) 11:10 - 11:35
Examination of the issues in designing of electronic signature documentation system
Miyuki Takao, Koichiro Hayashi (IISEC)

(24) 11:35 - 12:00
Clone Resistance of Paper Artifact-Metrics with Segmented Matching
Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU)

----------------------------------------
Fri, Jul 25 AM (09:55 - 12:00)
----------------------------------------

(25) 09:55 - 10:20
Architecture Optimization of a Group Signature Circuit
Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC)

(26) 10:20 - 10:45
A Lattice Model of the General Confidentiality Policies
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)

(27) 10:45 - 11:10
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases
Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)

(28) 11:10 - 11:35
Proposal of Anonymos Routing Technique with DHT
Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.)

(29) 11:35 - 12:00
Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document
Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.)

----------------------------------------
Fri, Jul 25 PM (13:00 - 15:05)
----------------------------------------

(30) 13:00 - 13:25
Implementation of Block Cipher Camellia with a Configurable and Extensible Processor
Kazuyoshi Matsuo, Koki Abe (UEC)

(31) 13:25 - 13:50
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)

(32) 13:50 - 14:15
Hash Function Using MMO Compression Function and MDP Domain Extension
Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.)

(33) 14:15 - 14:40
Traitor Tracing from ID based Broadcast Encryption
Ryuichi Sakai (OECU)

(34) 14:40 - 15:05
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography
Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)

----------------------------------------
Fri, Jul 25 PM (13:00 - 15:05)
----------------------------------------

(35) 13:00 - 13:25
Invalidation of a Mailing-list Address against Spam
Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)

(36) 13:25 - 13:50
Proposal of a Cue & Response Based User Authentication Using Unclear Image
Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)

(37) 13:50 - 14:15
Self expandable RBAC for distributed systems
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)

(38) 14:15 - 14:40
Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)

(39) 14:40 - 15:05
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)

----------------------------------------
Fri, Jul 25 PM (15:20 - 17:25)
----------------------------------------

(40) 15:20 - 15:45
Watermarking Method with a Quasi-One-Way Function
Kazuo Ohzeki, Engyoku Gi (SIT)

(41) 15:45 - 16:10
Ring Authenticated Group Key Establishment with Member Repudiation
Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo)

(42) 16:10 - 16:35
A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack
Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)

(43) 16:35 - 17:00
Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.)

(44) 17:00 - 17:25
A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree
Chunhua Su, Kouichi Sakurai (Kyushu Univ.)

----------------------------------------
Fri, Jul 25 PM (15:20 - 16:35)
----------------------------------------

(45) 15:20 - 15:45
A Study on Detecting Information Leak Virus by Activity Monitoring
Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.)

(46) 15:45 - 16:10
Development of publicity function of the illegitimate activity host by the IP marking
Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)

(47) 16:10 - 16:35
P2P Node Detection method based on Connection Analysis
Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.)



=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===
# FUTURE SCHEDULE:

Fri, Oct 17, 2008: [Thu, Aug 14]

=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:

Fri, Sep 12, 2008: Kikai-Shinko-Kaikan Bldg. [Thu, Jul 17]

# SECRETARY:
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-mail: ic-c (to ISEC secretaries)

=== Special Interest Group on Computer Security (IPSJ-CSEC) ===


Last modified: 2008-07-02 23:09:55


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   Prev SITE Conf / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan