Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2009-03-09 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
Proposal of Piece Falsification Detection Method on JetJigsaw Tatsuyuki Matsushita, Kentaro Umesawa, Shinji Yamanaka (Toshiba) IT2008-43 ISEC2008-101 WBS2008-56 |
In SCIS2009, we proposed JetJigsaw, a content delivery method with content protection mechanism[SCIS2009]. We introduced... [more] |
IT2008-43 ISEC2008-101 WBS2008-56 pp.1-6 |
WBS, IT, ISEC |
2009-03-09 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
Access control model for distributed systems and its application for service proxies Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC) IT2008-44 ISEC2008-102 WBS2008-57 |
Terminals in a distributed system provide their services for other terminals. In this manuscript, we propose Scope-based... [more] |
IT2008-44 ISEC2008-102 WBS2008-57 pp.7-13 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Network Usage Control Based on Evaluation of User Security Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58 |
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] |
IT2008-45 ISEC2008-103 WBS2008-58 pp.15-22 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Anomaly detection based on the machine learning of the human behavior on home network Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59 |
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] |
IT2008-46 ISEC2008-104 WBS2008-59 pp.23-28 |
WBS, IT, ISEC |
2009-03-09 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
On the Possibility of Taking off Prime Number Generation in RSA-based Access Control Jin Tamura (NICT) IT2008-47 ISEC2008-105 WBS2008-60 |
An Access Control Scheme, which was proposed by Chick et al. in CRYPTO89, has applied into many applications (Broadcast ... [more] |
IT2008-47 ISEC2008-105 WBS2008-60 pp.29-33 |
WBS, IT, ISEC |
2009-03-09 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
A Note on Security of Knapsack Type PKC with Random Sequence Yasuyuki Murakami (Osaka Electro-Comm Univ.) IT2008-48 ISEC2008-106 WBS2008-61 |
Present author proposed a new method for constructing knapsack PKC
by using a random sequence.
In this paper, we propo... [more] |
IT2008-48 ISEC2008-106 WBS2008-61 pp.35-40 |
WBS, IT, ISEC |
2009-03-09 11:40 |
Hokkaido |
Hakodate Mirai Univ. |
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2008-49 ISEC2008-107 WBS2008-62 |
Recently present authors proposed a double-sequence knapsack public key cryptosystem on the basis of MH PKC(KMN PKC). We... [more] |
IT2008-49 ISEC2008-107 WBS2008-62 pp.41-45 |
WBS, IT, ISEC |
2009-03-09 13:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Advances in Public-Key Cryptography (RSA, ECC, IBE) Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63 |
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] |
IT2008-50 ISEC2008-108 WBS2008-63 pp.47-48 |
WBS, IT, ISEC |
2009-03-09 14:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Performance Evaluation of Error Correcting Codes Toru Fujiwara (Osaka Univ.) IT2008-51 ISEC2008-109 WBS2008-64 |
In this talk, performance analysis on error correcting codes used in digtal watermarking and in network coding is discus... [more] |
IT2008-51 ISEC2008-109 WBS2008-64 p.49 |
WBS, IT, ISEC |
2009-03-09 15:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Algebraic topology and sensor networks Yasuaki Hiraoka (Hiroshima Univ./JTS PRESTO), Zin Arai (Hokkaido Univ./JTS PRESTO), Kazunori Hayashi (Kyoto Univ.) IT2008-52 ISEC2008-110 WBS2008-65 |
[more] |
IT2008-52 ISEC2008-110 WBS2008-65 pp.51-56 |
WBS, IT, ISEC |
2009-03-09 16:20 |
Hokkaido |
Hakodate Mirai Univ. |
Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.) IT2008-53 ISEC2008-111 WBS2008-66 |
Stream cipher is one of primitive classes in symmetric key ciphers where plaintext symbols are combined with pseudo rand... [more] |
IT2008-53 ISEC2008-111 WBS2008-66 pp.57-64 |
WBS, IT, ISEC |
2009-03-09 16:45 |
Hokkaido |
Hakodate Mirai Univ. |
Sharing Multilevel Secrets among Groups Using Concatenation of Reed-Solomon Codes Hachiro Fujita (Tokyo Metropolitan Univ.), Chigusa Kawashima (Univ. of Electro-Comm.), Tomoko K. Matsushima (Polytechnic Univ.) IT2008-54 ISEC2008-112 WBS2008-67 |
[more] |
IT2008-54 ISEC2008-112 WBS2008-67 pp.65-70 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68 |
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] |
IT2008-55 ISEC2008-113 WBS2008-68 pp.71-78 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69 |
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] |
IT2008-56 ISEC2008-114 WBS2008-69 pp.79-84 |
WBS, IT, ISEC |
2009-03-09 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
Spectrum spreading sequences generated by chaotic dynamics and its correlational properties Tohru Kohda, Takao Une, Yuichiro Koura (Kyushu Univ.) IT2008-57 ISEC2008-115 WBS2008-70 |
The performance of code division multiple access (CDMA) system
largely depends on the SS codes.
Many methods of genera... [more] |
IT2008-57 ISEC2008-115 WBS2008-70 pp.85-90 |
WBS, IT, ISEC |
2009-03-09 09:25 |
Hokkaido |
Hakodate Mirai Univ. |
Markovian Coded Gaussian Filter with its application to Filterbanks Tohru Kohda, Yutaka Jitsumatsu, Tatsuma Kuwazaki, Kenjiro Fujino (Kyushu Univ.) IT2008-58 ISEC2008-116 WBS2008-71 |
In code division multiple access (CDMA) systems, spreading code is introduced as the third axis in addition to the time ... [more] |
IT2008-58 ISEC2008-116 WBS2008-71 pp.91-98 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Data Dissemination in Mobile Environment Using Collaborative Approach Mohd Rashid, Atsushi Kinjo, Tomokazu Nagata, Shiro Tamaki (Univ. of the Ryukyus) IT2008-59 ISEC2008-117 WBS2008-72 |
Data dissemination in mobile environment has attracted the research community for its various applications. The academic... [more] |
IT2008-59 ISEC2008-117 WBS2008-72 pp.99-104 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Modulation Classification Based on Amplitude and Cosine moments Shinji Ohara, Masato Kita, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2008-60 ISEC2008-118 WBS2008-73 |
Recently cognitive radios attract much attention, because it leads to flexible and high capacity wireless systems. Modul... [more] |
IT2008-60 ISEC2008-118 WBS2008-73 pp.105-108 |
WBS, IT, ISEC |
2009-03-09 10:50 |
Hokkaido |
Hakodate Mirai Univ. |
Error-Trellis State Complexity of LDPC Convolutional Codes Based on Circulant Matrices Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) IT2008-61 ISEC2008-119 WBS2008-74 |
Let H(D) be the parity-check matrix of an LDPC convolutional code corresponding to the parity-check matrix H of a quasi-... [more] |
IT2008-61 ISEC2008-119 WBS2008-74 pp.109-116 |
WBS, IT, ISEC |
2009-03-09 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
Accelerated Algorithm for Computing the Weight Distribution of Convolutional Codes, part 2 Yasuo Asakura, Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Hiroshi Sasano (Kinki Univ.) IT2008-62 ISEC2008-120 WBS2008-75 |
In this paper, we propose an generalized AFAST algorithm.
This algorithm detects minimum distance at precomputation.
... [more] |
IT2008-62 ISEC2008-120 WBS2008-75 pp.117-122 |