IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Social Implications of Technology and Information Ethics (SITE)  (Searched in: 2008)

Search Results: Keywords 'from:2008-07-24 to:2008-07-24'

[Go to Official SITE Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 47  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry A Note on the Security of KMN PKC and Presentation of Challenge Problems
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) ISEC2008-16 SITE2008-10
In this paper we discuss on a method for improving the security of the previously propsed KMN PKC where two pairs of cip... [more] ISEC2008-16 SITE2008-10
pp.1-8
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems -- MPKC systems proposed in SCIS'07 --
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.) ISEC2008-17 SITE2008-11
MOCHIGOMA (Piece in Hand) system is an encryption algorithm proposed by
Tujii et al. in 2003, for enhancing the securi... [more]
ISEC2008-17 SITE2008-11
pp.9-14
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Design Policy of MPKC based on Piece in Hand Concept
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] ISEC2008-18 SITE2008-12
pp.15-22
ISEC, SITE, IPSJ-CSEC 2008-07-24
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Knapsack Cryptosystem on Elliptic Curves of Trace Tow
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-19 SITE2008-13
The LLL algorithm is strong algorithm that decrypts the additional type Knapsack cryptosystem.However, the LLL algorithm... [more] ISEC2008-19 SITE2008-13
pp.23-26
ISEC, SITE, IPSJ-CSEC 2008-07-24
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA) ISEC2008-20 SITE2008-14
 [more] ISEC2008-20 SITE2008-14
pp.27-36
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II)
Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.)
The Partial Integrity Assurance Technology (PIAT) is a signature scheme that guarantees the integrity even if an origina... [more] ISEC2008-21 SITE2008-15
pp.37-44
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry Efficiency of a Redactable Signature with Tree Construction
Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.)
A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of som... [more] ISEC2008-22 SITE2008-16
pp.45-50
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry A System against Leakage though Paper Documents in Multi-Vendor Environment
Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI)
 [more] ISEC2008-23 SITE2008-17
pp.51-58
ISEC, SITE, IPSJ-CSEC 2008-07-24
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone
Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)
When a cellular phone is lost or stolen, it may be unjustly used by a malicious user. There are many cellular phones wit... [more] ISEC2008-24 SITE2008-18
pp.59-66
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents
Haruo Kodama (NIME) ISEC2008-25 SITE2008-19
It is necessary to construct Digital Rights Management(DRM) systems to promote webcasting contents. There are problems o... [more] ISEC2008-25 SITE2008-19
pp.67-72
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:45
Fukuoka Fukuoka Institute of System LSI Design Industry Basic Study on Designing Navigation Systems for the Blind
Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal) ISEC2008-26 SITE2008-20
The final goal of our study is building an effective tool of thought for considering both users and use situations in th... [more] ISEC2008-26 SITE2008-20
pp.73-80
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:10
Fukuoka Fukuoka Institute of System LSI Design Industry A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment -- Under a Viewpoint of Relationism First --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.) ISEC2008-27 SITE2008-21
 [more] ISEC2008-27 SITE2008-21
pp.81-88
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:35
Fukuoka Fukuoka Institute of System LSI Design Industry Study on Reputation Systems for Trusty Information Network
Noriaki Yoshikai (Niohn Univ.) ISEC2008-28 SITE2008-22
 [more] ISEC2008-28 SITE2008-22
pp.89-96
ISEC, SITE, IPSJ-CSEC 2008-07-24
17:00
Fukuoka Fukuoka Institute of System LSI Design Industry Ontology and Epistemology in Semantic Network for Pluralistic Society -- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] ISEC2008-29 SITE2008-23
pp.97-102
ISEC, SITE, IPSJ-CSEC 2008-07-24
17:25
Fukuoka Fukuoka Institute of System LSI Design Industry Study of method for expressing context
Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS) ISEC2008-30 SITE2008-24
In the contemporary society that overflows with information, it becomes difficult to treat the flood of information.
T... [more]
ISEC2008-30 SITE2008-24
pp.103-108
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more]
ISEC2008-31 SITE2008-25
pp.109-114
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:45
Fukuoka Fukuoka Institute of System LSI Design Industry Information Leakage Prevention Function of host based for P2P File Exchange Environment
Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
Recently, there are many incidents to which the classified information of the individual or the organization flows out i... [more] ISEC2008-32 SITE2008-26
pp.115-122
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:10
Fukuoka Fukuoka Institute of System LSI Design Industry Study of Database for information sharing of P2P File Exchange Environment
Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi)
Recently, there are many problems regarding the P2P file exchange environment on the Internet. The need to reconsider th... [more] ISEC2008-33 SITE2008-27
pp.123-128
ISEC, SITE, IPSJ-CSEC 2008-07-24
16:35
Fukuoka Fukuoka Institute of System LSI Design Industry An enhancement of VMM snapshot utility for detcting code injection
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT)
VMM (Virtual Machine Monitor) provide a more fine grained external
observability of virutal machine compared with previ... [more]
ISEC2008-34 SITE2008-28
pp.129-134
ISEC, SITE, IPSJ-CSEC 2008-07-25
09:55
Fukuoka Fukuoka Institute of System LSI Design Industry Detecting of Unknown Computer Virus Variants Based on Computer Behavior
Haruka Mimori, Koki Abe (UEC) ISEC2008-35
We observed the behavior of computer viruses by monitoring the behavior of computers infected by the mass-mailing viruse... [more] ISEC2008-35
pp.1-8
 Results 1 - 20 of 47  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan