Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:20 |
Hokkaido |
Future University-Hakodate |
The study for the position authentication and the security of location information Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC) ISEC2007-16 SITE2007-10 |
The use of the location information such as walk-navigation by the mobile telephone and car navigations using the GPS sp... [more] |
ISEC2007-16 SITE2007-10 pp.1-6 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:45 |
Hokkaido |
Future University-Hakodate |
A preference transmission method with information security database systems on the Internet Yasuyoshi Okada, Naoshi Sato (I.I.S.) ISEC2007-17 SITE2007-11 |
The number of computer viruses or illegal accesses on the Internet is rapidly increasing. According to information techn... [more] |
ISEC2007-17 SITE2007-11 pp.7-14 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 11:10 |
Hokkaido |
Future University-Hakodate |
On the Security and Complexity of Shared Attribute Certification Systems Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.) ISEC2007-18 SITE2007-12 |
[more] |
ISEC2007-18 SITE2007-12 pp.15-22 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 11:35 |
Hokkaido |
Future University-Hakodate |
User Authentication Method Based On Statistical Analysis of Keystrokes Yoshihiro Kataoka, Takao Miyamoto, Shigeki Aoki, Masao Izumi, Kunio Fukunaga (Osaka Pref Univ) ISEC2007-19 SITE2007-13 |
In this paper, we propose a new user authentication method based on statistical analysis of keystrokes. First of all, we... [more] |
ISEC2007-19 SITE2007-13 pp.23-30 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 09:55 |
Hokkaido |
Future University-Hakodate |
A random number generation method with a variable degree of safety and its analysis Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications) |
In this report, a method for generating a random number sequence, which we call a mixture random number sequence, by mix... [more] |
ISEC2007-20 SITE2007-14 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:20 |
Hokkaido |
Future University-Hakodate |
Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC) |
Loss of anonymity, bribery, and coercion are more serious in small-scale voting than in large-scale one. This paper show... [more] |
ISEC2007-21 SITE2007-15 pp.37-44 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:45 |
Hokkaido |
Future University-Hakodate |
Consideration on effectiveness of CC V3.1 Function Specific Assurance ST Masue Shiba, Naokazu Sasaki, Takahisa Ishida, Hiroshi Iguchi, Tsuyoshi Shimada (Toshiba Solusions Corp.) |
Function Specific Assurance and Prototyping Function Specific Assurance are new concepts of Common Criteria Version3.1. ... [more] |
ISEC2007-22 SITE2007-16 pp.45-50 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 11:10 |
Hokkaido |
Future University-Hakodate |
Japan-U.S. comparisons of information security survey Kentarou Yamaguchi, Katsuya Uchida (IISEC) |
The internet is borderless network and the threat at the internet is also similar. Therefore, it is very important to th... [more] |
ISEC2007-23 SITE2007-17 pp.51-57 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 11:35 |
Hokkaido |
Future University-Hakodate |
Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand Seiichiro Yatake, Katsuya Uchida (IISEC) |
Developing information technology and hardware technology or changing Internal Control makes System Administrators and M... [more] |
ISEC2007-24 SITE2007-18 pp.59-64 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:00 |
Hokkaido |
Future University-Hakodate |
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels" Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) ISEC2007-25 SITE2007-19 |
There is a research where the data base is expressed by the deduction inference to make the world a database in construc... [more] |
ISEC2007-25 SITE2007-19 pp.65-70 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:25 |
Hokkaido |
Future University-Hakodate |
Monetary Value of Security Damages Based on the Subjective Evaluation by Internet Users Naoko Sakurai, Tokio Otsuka, Hitoshi Mitomo (Waseda Univ.) |
Since the personal information protection law has been in force, a series of accidents relating to personal information ... [more] |
|
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:50 |
Hokkaido |
Future University-Hakodate |
Technological and Social Studies for Emergency Message Services Shunichi Yonemura (NTT), Kazuo Kamata (Utsunomiya Univ.), Masakatsu Aoki (NTT), Akinori Yonekura (Utsunomiya Univ.) ISEC2007-26 SITE2007-20 |
This report addresses designing emergency information transmission services that are necessary for avoiding and decreasi... [more] |
ISEC2007-26 SITE2007-20 pp.71-78 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:15 |
Hokkaido |
Future University-Hakodate |
Study on Information Transparency and Trust from the view point of Web innovation Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.) ISEC2007-27 SITE2007-21 |
In the flow of the globalization and the networking, the profit or the loss which you can get in the network business de... [more] |
ISEC2007-27 SITE2007-21 pp.79-86 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow. Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT) ISEC2007-28 SITE2007-22 |
An identity escrow scheme called Decentralized Identity Escrow (DECIDE) has three identity tiers,’identity’ (=’real iden... [more] |
ISEC2007-28 SITE2007-22 pp.87-94 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:05 |
Hokkaido |
Future University-Hakodate |
Beginning of Broadcast over the Internet in Japan Masataka Ohta (TIT) ISEC2007-29 SITE2007-23 |
BB cable TV service by Softbank Corp. and retransmission of surface wave broadcast by IP multicast in Sakae-mura, Nagano... [more] |
ISEC2007-29 SITE2007-23 pp.95-98 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:25 |
Hokkaido |
Future University-Hakodate |
A Mutual Authentication System for Web Server Access by Using Cellar Phone Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.) |
Password authentication is widely used for web accesses currently. However this authentication scheme becomes insecure, ... [more] |
ISEC2007-30 SITE2007-24 pp.99-105 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:50 |
Hokkaido |
Future University-Hakodate |
A Method to Limit Appriciation of Content Takehisa Kato (Toshiba Solutions Corp.) |
Free content delivery service spreads worldwide as the network spreads, and the number of users increases rapidly. Howev... [more] |
ISEC2007-31 SITE2007-25 pp.107-112 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:15 |
Hokkaido |
Future University-Hakodate |
A method of excluding disapproval connection on authentication network Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT) |
IEEE802.1X is a technology to construct the network authentication system on LAN. The IEEE802.1X authentication system w... [more] |
ISEC2007-32 SITE2007-26 pp.113-118 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
An authentication network system using virtual authenticatior module Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT) |
The IEEE802.1X authentication network system is effective to an illegal, connected prevention to the LAN . However, the ... [more] |
ISEC2007-33 SITE2007-27 pp.119-124 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:05 |
Hokkaido |
Future University-Hakodate |
Human communication security to adapt to ever-expanding media environment Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC) |
As network-based media such as Web systems are improved, various new forms of human communication become possible but, a... [more] |
ISEC2007-34 SITE2007-28 pp.125-131 |