Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Note on the Security of KMN PKC and Presentation of Challenge Problems Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) ISEC2008-16 SITE2008-10 |
In this paper we discuss on a method for improving the security of the previously propsed KMN PKC where two pairs of cip... [more] |
ISEC2008-16 SITE2008-10 pp.1-8 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 -- Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.) ISEC2008-17 SITE2008-11 |
MOCHIGOMA (Piece in Hand) system is an encryption algorithm proposed by
Tujii et al. in 2003, for enhancing the securi... [more] |
ISEC2008-17 SITE2008-11 pp.9-14 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Design Policy of MPKC based on Piece in Hand Concept Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12 |
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] |
ISEC2008-18 SITE2008-12 pp.15-22 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Knapsack Cryptosystem on Elliptic Curves of Trace Tow Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) ISEC2008-19 SITE2008-13 |
The LLL algorithm is strong algorithm that decrypts the additional type Knapsack cryptosystem.However, the LLL algorithm... [more] |
ISEC2008-19 SITE2008-13 pp.23-26 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA) ISEC2008-20 SITE2008-14 |
[more] |
ISEC2008-20 SITE2008-14 pp.27-36 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II) Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.) |
The Partial Integrity Assurance Technology (PIAT) is a signature scheme that guarantees the integrity even if an origina... [more] |
ISEC2008-21 SITE2008-15 pp.37-44 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Efficiency of a Redactable Signature with Tree Construction Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.) |
A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of som... [more] |
ISEC2008-22 SITE2008-16 pp.45-50 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A System against Leakage though Paper Documents in Multi-Vendor Environment Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI) |
[more] |
ISEC2008-23 SITE2008-17 pp.51-58 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.) |
When a cellular phone is lost or stolen, it may be unjustly used by a malicious user. There are many cellular phones wit... [more] |
ISEC2008-24 SITE2008-18 pp.59-66 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents Haruo Kodama (NIME) ISEC2008-25 SITE2008-19 |
It is necessary to construct Digital Rights Management(DRM) systems to promote webcasting contents. There are problems o... [more] |
ISEC2008-25 SITE2008-19 pp.67-72 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Basic Study on Designing Navigation Systems for the Blind Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal) ISEC2008-26 SITE2008-20 |
The final goal of our study is building an effective tool of thought for considering both users and use situations in th... [more] |
ISEC2008-26 SITE2008-20 pp.73-80 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First -- Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.) ISEC2008-27 SITE2008-21 |
[more] |
ISEC2008-27 SITE2008-21 pp.81-88 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study on Reputation Systems for Trusty Information Network Noriaki Yoshikai (Niohn Univ.) ISEC2008-28 SITE2008-22 |
[more] |
ISEC2008-28 SITE2008-22 pp.89-96 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 17:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems -- Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23 |
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] |
ISEC2008-29 SITE2008-23 pp.97-102 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 17:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study of method for expressing context Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS) ISEC2008-30 SITE2008-24 |
In the contemporary society that overflows with information, it becomes difficult to treat the flood of information.
T... [more] |
ISEC2008-30 SITE2008-24 pp.103-108 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Variable Probabilistic Packet Mareking with TTL for IP Traceback Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more] |
ISEC2008-31 SITE2008-25 pp.109-114 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 15:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Information Leakage Prevention Function of host based for P2P File Exchange Environment Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
Recently, there are many incidents to which the classified information of the individual or the organization flows out i... [more] |
ISEC2008-32 SITE2008-26 pp.115-122 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study of Database for information sharing of P2P File Exchange Environment Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi) |
Recently, there are many problems regarding the P2P file exchange environment on the Internet. The need to reconsider th... [more] |
ISEC2008-33 SITE2008-27 pp.123-128 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 16:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
An enhancement of VMM snapshot utility for detcting code injection Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT) |
VMM (Virtual Machine Monitor) provide a more fine grained external
observability of virutal machine compared with previ... [more] |
ISEC2008-34 SITE2008-28 pp.129-134 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 09:55 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Detecting of Unknown Computer Virus Variants Based on Computer Behavior Haruka Mimori, Koki Abe (UEC) ISEC2008-35 |
We observed the behavior of computer viruses by monitoring the behavior of computers infected by the mass-mailing viruse... [more] |
ISEC2008-35 pp.1-8 |