IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Special Interest Group on Computer Security (IPSJ-CSEC)  (Searched in: 2007)

Search Results: Keywords 'from:2007-07-19 to:2007-07-19'

[Go to Official IPSJ-CSEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 59  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2007-07-19
10:20
Hokkaido Future University-Hakodate The study for the position authentication and the security of location information
Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC) ISEC2007-16 SITE2007-10
The use of the location information such as walk-navigation by the mobile telephone and car navigations using the GPS sp... [more] ISEC2007-16 SITE2007-10
pp.1-6
ISEC, SITE, IPSJ-CSEC 2007-07-19
10:45
Hokkaido Future University-Hakodate A preference transmission method with information security database systems on the Internet
Yasuyoshi Okada, Naoshi Sato (I.I.S.) ISEC2007-17 SITE2007-11
The number of computer viruses or illegal accesses on the Internet is rapidly increasing. According to information techn... [more] ISEC2007-17 SITE2007-11
pp.7-14
ISEC, SITE, IPSJ-CSEC 2007-07-19
11:10
Hokkaido Future University-Hakodate On the Security and Complexity of Shared Attribute Certification Systems
Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.) ISEC2007-18 SITE2007-12
 [more] ISEC2007-18 SITE2007-12
pp.15-22
ISEC, SITE, IPSJ-CSEC 2007-07-19
11:35
Hokkaido Future University-Hakodate User Authentication Method Based On Statistical Analysis of Keystrokes
Yoshihiro Kataoka, Takao Miyamoto, Shigeki Aoki, Masao Izumi, Kunio Fukunaga (Osaka Pref Univ) ISEC2007-19 SITE2007-13
In this paper, we propose a new user authentication method based on statistical analysis of keystrokes. First of all, we... [more] ISEC2007-19 SITE2007-13
pp.23-30
ISEC, SITE, IPSJ-CSEC 2007-07-19
09:55
Hokkaido Future University-Hakodate A random number generation method with a variable degree of safety and its analysis
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications)
In this report, a method for generating a random number sequence, which we call a mixture random number sequence, by mix... [more] ISEC2007-20 SITE2007-14
pp.31-36
ISEC, SITE, IPSJ-CSEC 2007-07-19
10:20
Hokkaido Future University-Hakodate Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes
Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC)
Loss of anonymity, bribery, and coercion are more serious in small-scale voting than in large-scale one. This paper show... [more] ISEC2007-21 SITE2007-15
pp.37-44
ISEC, SITE, IPSJ-CSEC 2007-07-19
10:45
Hokkaido Future University-Hakodate Consideration on effectiveness of CC V3.1 Function Specific Assurance ST
Masue Shiba, Naokazu Sasaki, Takahisa Ishida, Hiroshi Iguchi, Tsuyoshi Shimada (Toshiba Solusions Corp.)
Function Specific Assurance and Prototyping Function Specific Assurance are new concepts of Common Criteria Version3.1. ... [more] ISEC2007-22 SITE2007-16
pp.45-50
ISEC, SITE, IPSJ-CSEC 2007-07-19
11:10
Hokkaido Future University-Hakodate Japan-U.S. comparisons of information security survey
Kentarou Yamaguchi, Katsuya Uchida (IISEC)
The internet is borderless network and the threat at the internet is also similar. Therefore, it is very important to th... [more] ISEC2007-23 SITE2007-17
pp.51-57
ISEC, SITE, IPSJ-CSEC 2007-07-19
11:35
Hokkaido Future University-Hakodate Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand
Seiichiro Yatake, Katsuya Uchida (IISEC)
Developing information technology and hardware technology or changing Internal Control makes System Administrators and M... [more] ISEC2007-24 SITE2007-18
pp.59-64
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:00
Hokkaido Future University-Hakodate Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels"
Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) ISEC2007-25 SITE2007-19
There is a research where the data base is expressed by the deduction inference to make the world a database in construc... [more] ISEC2007-25 SITE2007-19
pp.65-70
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:25
Hokkaido Future University-Hakodate Monetary Value of Security Damages Based on the Subjective Evaluation by Internet Users
Naoko Sakurai, Tokio Otsuka, Hitoshi Mitomo (Waseda Univ.)
Since the personal information protection law has been in force, a series of accidents relating to personal information ... [more]
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:50
Hokkaido Future University-Hakodate Technological and Social Studies for Emergency Message Services
Shunichi Yonemura (NTT), Kazuo Kamata (Utsunomiya Univ.), Masakatsu Aoki (NTT), Akinori Yonekura (Utsunomiya Univ.) ISEC2007-26 SITE2007-20
This report addresses designing emergency information transmission services that are necessary for avoiding and decreasi... [more] ISEC2007-26 SITE2007-20
pp.71-78
ISEC, SITE, IPSJ-CSEC 2007-07-19
14:15
Hokkaido Future University-Hakodate Study on Information Transparency and Trust from the view point of Web innovation
Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.) ISEC2007-27 SITE2007-21
In the flow of the globalization and the networking, the profit or the loss which you can get in the network business de... [more] ISEC2007-27 SITE2007-21
pp.79-86
ISEC, SITE, IPSJ-CSEC 2007-07-19
14:40
Hokkaido Future University-Hakodate A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow.
Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT) ISEC2007-28 SITE2007-22
An identity escrow scheme called Decentralized Identity Escrow (DECIDE) has three identity tiers,’identity’ (=’real iden... [more] ISEC2007-28 SITE2007-22
pp.87-94
ISEC, SITE, IPSJ-CSEC 2007-07-19
15:05
Hokkaido Future University-Hakodate Beginning of Broadcast over the Internet in Japan
Masataka Ohta (TIT) ISEC2007-29 SITE2007-23
BB cable TV service by Softbank Corp. and retransmission of surface wave broadcast by IP multicast in Sakae-mura, Nagano... [more] ISEC2007-29 SITE2007-23
pp.95-98
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:25
Hokkaido Future University-Hakodate A Mutual Authentication System for Web Server Access by Using Cellar Phone
Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.)
Password authentication is widely used for web accesses currently. However this authentication scheme becomes insecure, ... [more] ISEC2007-30 SITE2007-24
pp.99-105
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:50
Hokkaido Future University-Hakodate A Method to Limit Appriciation of Content
Takehisa Kato (Toshiba Solutions Corp.)
Free content delivery service spreads worldwide as the network spreads, and the number of users increases rapidly. Howev... [more] ISEC2007-31 SITE2007-25
pp.107-112
ISEC, SITE, IPSJ-CSEC 2007-07-19
14:15
Hokkaido Future University-Hakodate A method of excluding disapproval connection on authentication network
Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT)
IEEE802.1X is a technology to construct the network authentication system on LAN. The IEEE802.1X authentication system w... [more] ISEC2007-32 SITE2007-26
pp.113-118
ISEC, SITE, IPSJ-CSEC 2007-07-19
14:40
Hokkaido Future University-Hakodate An authentication network system using virtual authenticatior module
Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT)
The IEEE802.1X authentication network system is effective to an illegal, connected prevention to the LAN . However, the ... [more] ISEC2007-33 SITE2007-27
pp.119-124
ISEC, SITE, IPSJ-CSEC 2007-07-19
15:05
Hokkaido Future University-Hakodate Human communication security to adapt to ever-expanding media environment
Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC)
As network-based media such as Web systems are improved, various new forms of human communication become possible but, a... [more] ISEC2007-34 SITE2007-28
pp.125-131
 Results 1 - 20 of 59  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan