IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Yoshinori Sakai
Vice Chair Hironobu Kinoshita, Toshinari Tsuruhara
Secretary Hiroaki Sakamoto, OgawaShunichi Amemiya
Assistant Masaru Ogawa

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Shinichi Kawamura
Vice Chair Masakatsu Morii, Mitsuru Matsui
Secretary Shoichi Hirose, Hiroshi Doi
Assistant Shiho Moriai

Conference Date Thu, Jul 21, 2005 09:30 - 18:15
Fri, Jul 22, 2005 09:30 - 17:50
Topics  
Conference Place Iwate Prefectural University 
Transportation Guide http://www.iwate-pu.ac.jp/postexam/access.html
Contact
Person
Toyoo Takata
019-694-2606

Thu, Jul 21 AM  Room A
09:30 - 12:00
(1) 09:30-09:55 A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot Maki Kataoka, Yumiko Ishige (NTT Data Corporation), Nobutaka Mantani, Humiharu Ohashi (National Police Agency)
(2) 09:55-10:20 A Study on Implementation of the Worm Prevention System Following the Infection Process Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA)
(3) 10:20-10:45 A Study on a Method for Malware Quarantine in a Multi-OS Environment Tatsuya Baba, Hiroshi Fujimoto, Masataka Kado, Tsutomu Inada (NTT Data)
(4) 10:45-11:10 A Consideration of Spyware Detection using Traffic Analysis Akira Yonahara, Hisamichi Ohtani, Tatsuya Baba, Tsutomu Inada (NTT DATA)
(5) 11:10-11:35 Evaluation of the quarantine system using "in the wild" viruses Osamu Tanaka, Katsuya Uchida (IISEC)
(6) 11:35-12:00 A Note of Intrusion Detection using Alteration of Data Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.)
Thu, Jul 21 AM  Room B
09:55 - 12:00
(7) 09:55-10:20 Comparison of Error Probabilities of The Miller-Rabin Test by Experimental Measurement Value and Theoretical Upper Bound Toshiya Nakajima (Fujitsu Labs.)
(8) 10:20-10:45 On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC)
(9) 10:45-11:10 Performance of Prime Order Elliptic Curve Generation based on y-twist Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
(10) 11:10-11:35 Defeating Simple Power Analysis on Koblitz Curves Katsuyuki Okeya (Hitachi), Tsuyoshi Takagi (Future Univ. of Hakodate), Camille Vuillaume (Hitachi)
(11) 11:35-12:00 Development of DPA evaluation platform for 32 bit processor Koichi Fujisaki, Hideo Shimizu, Atsushi Shimbo (Toshiba Corp.)
Thu, Jul 21 PM  Room A
13:00 - 17:50
(12) 13:00-13:25 Researches on Incident Tendency Detection Method on Frequency Analysis Hirofumi Nakakoji, Masato Terada, Kenichi Sakamoto (Hitachi)
(13) 13:25-13:50 Study on Host Profiling for Incident Analysis Kazuya Ohkouchi (NICT/HITACHI), Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI)
(14) 13:50-14:15 A Simulation-based UDP Traffic Analysis of DNSSEC Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI), Shinji Shimojo (Osaka Univ.), Hiroki Nogawa (Tokyo Medical and Dental Univ.)
(15) 14:15-14:40 Research on Epidemiologic Approach for Anti Computer Viruses - 2
-- Applying to the model of anti mass-mailing virus measure --
Satoshi Seki (Waseda Univ.), Ryoichi Sasaki (Tokyo Denki Univ.), Mitsuru Iwamura (Waseda Univ.), Hiroshi Motosugi (Tokyo Denki Univ.)
(16) 14:40-15:05 Extension and Evaluation of Check Function for Improper Sending of Personal Information in Encrypted Mail System Kenji Yasu (TDU), Yasuhiko Akabane (NSD), Masami Ozaki (HIN), Koji Semoto (DCS), Ryoichi Sasaki (TDU)
(17) 15:05-15:30 Guardian watch support system for the children's Web access Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.)
  15:30-15:45 Break ( 15 min. )
(18) 15:45-16:10 * Keiko Kinoshita, Yasuhiro Inazumi, Hirotsugu Kinoshita (Kanagawa Univ.),
(19) 16:10-16:35 Systematizing of Information Forensics Kouichi Mukouyama, Katsuya Uchida (IISEC)
(20) 16:35-17:00 Consideration about intellectual property rights in university graduation thesis and production created by students Ryoju Hamada (Tohoku Univ.), Norihisa Segawa, Yuko Murayama (Iwate-pu)
(21) 17:00-17:25 The Direction of Japan's CMVP II Yuichi Hagiwara (C4T), Travis Spann (InfoGard), Tatsuaki Takebe (Yokogawa)
(22) 17:25-17:50 On the Standardization of Information Security
-- Report on the Vienna Meeting in April, 2005 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric), Toshio Tatsuta (IBM Japan), Akira Otsuka (IPA/AIST), Kan Yasuda (NTT)
Thu, Jul 21 PM  Room B
13:00 - 18:15
(23) 13:00-13:25 Construction of Oblivious Signatures Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.)
(24) 13:25-13:50 Partially Blind Signatures with Traceability Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT)
(25) 13:50-14:15 Proposal on Sumi coating method which can change the coating parts to protect against insider attacks Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ)
(26) 14:15-14:40 Exact t-out-of-n Signer-Ambiguous Signature Eiichiro Fujisaki, Koutarou Suzuki (NTT)
(27) 14:40-15:05 An (N,K) Threshold Signature Scheme with Public Keys of Small Size Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Comm. Univ.)
(28) 15:05-15:30 Meta Ring Signature Hiroyuki Okazaki (KCG), Ryuichi Sakai (OECU), Masao Kasahara (OGU)
  15:30-15:45 Break ( 15 min. )
(29) 15:45-16:10 An Information Hiding System for Word 2003 XML Documents Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo)
(30) 16:10-16:35 A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.)
(31) 16:35-17:00 A Text hiding by Visual Secret Sharing with Picture Images Takashi Miyaki, Kazuya Shioda (Shizuoka Univ.), Hideki Yoshida (NTT Data), Masaharu Ozawa (ChanceLab.), Masakatsu Nishigaki (Shizuoka Univ.)
(32) 17:00-17:25 Implementation and Evaluation of Memory Protection Methods for Multitask OSes
-- CMS for Resource-poor Platforms and Tampering Detection --
Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo)
(33) 17:25-17:50 A description model for data access control in Salvia operating system Yoshimi Ichiyanagi, Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo (Ritsumeikan Univ.)
(34) 17:50-18:15 A Case Study of Gordon-Loeb Model on Optimal Security Investiments Kimio Kuramitsu (Yokohama National Univ.)
Fri, Jul 22 AM  Room A
09:30 - 12:00
(35) 09:30-09:55 A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications)
(36) 09:55-10:20 Murakami-Kasahara ID-based Key Sharing Scheme Revisited
-- In Comparison With Maurer-Yacobi Scheme --
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
(37) 10:20-10:45 Efficient N-Party Password-based Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo)
(38) 10:45-11:10 Relations Among Notions of Security for Identity Based Encryption Schemes Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST)
(39) 11:10-11:35 On a secure circuit evaluation protocol using ElGamal encryption Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT)
(40) 11:35-12:00 An efficiently-verifiable zero-knowledge argument for proofs of knowledge Tsuyoshi Yamamoto, Eiichiro Fujisaki, Masayuki Abe (NTT)
Fri, Jul 22 AM  Room B
09:30 - 11:35
(41) 09:30-09:55 Development of a certificate path cache method for Certificate Validation Service Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.)
(42) 09:55-10:20 A Status Detection of Secure Communication in Secure Service Platform Osamu Takata, Yuko Sawai, Kazuyoshi Hoshino, Tadashi Kaji, Keisuke Takeuchi, Takahiro Fujishiro, Satoru Tezuka (Hitachi)
(43) 10:20-10:45 Development of Combined Authentication System Shinji Hirata, Masahiro Mimura, Kenta Takahashi, Yoshiaki Isobe (Hitachi)
(44) 10:45-11:10 A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT)
(45) 11:10-11:35 On Shared Attribute Certification Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.)
Fri, Jul 22 PM  Room A
13:00 - 17:50
(46) 13:00-13:25 Critical cryptoanalysis for Y-00 Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco)
(47) 13:25-13:50 Cheater Identifiable Quantum Secret Sharing Schemes Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST)
(48) 13:50-14:15 Improvement of the Security against Photon Number Splitting Attacks Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing)
(49) 14:15-14:40 Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.)
(50) 14:40-15:05 Improved Collision Attack on MD4 with Probability Almost 1 Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta (UEC)
  15:05-15:20 Break ( 15 min. )
(51) 15:20-15:45 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
(52) 15:45-16:10 How to send a return receipt on anonymous channel ? Shinji Yamanaka (TOSHIBA)
(53) 16:10-16:35 Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.)
(54) 16:35-17:00 A note on cryptographic schemes using collision-resistant functions based on factoring Jumpei Wada, Hajime Kanzaki (Kyoto Univ.), Shoichi Hirose (Fukui Univ.), Susumu Yoshida (Kyoto Univ.)
(55) 17:00-17:25 Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment Takeshi Nasako, Yasuyuki Murakami (OECU)
(56) 17:25-17:50 Improving the security of S boxes in DES using Genetic Algorithm Atsushi Koyama, Yasuyuki Murakami (OECU)
Fri, Jul 22 PM  Room B
13:00 - 17:50
(57) 13:00-13:25 Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
(58) 13:25-13:50 A Secure Reversible Watermark Using Predictive Coding Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing)
(59) 13:50-14:15 An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ)
(60) 14:15-14:40 Robust watermarking scheme for copied, rotated and clipped documents Kurato Maeno, Masayuki Suto (Oki)
(61) 14:40-15:05 An Implementation of Partial Integrity Assurance Method for Image Data Masahiko Takenaka, Takashi Yoshioka (FUJITSU LABS.)
  15:05-15:20 Break ( 15 min. )
(62) 15:20-15:45 Study on a Anti-Tracking RF-ID Tag System Atsushi Sakai, Masahiko Takenaka (FUJITSU LABS.)
(63) 15:45-16:10 Proposal and evaluation of digital forensic logging system using USB Device Yuki Ashino, Hiroto Kokawa, Tsukasa Sato, Ryoichi Sasaki (TDU)
(64) 16:10-16:35 A study of wireless location privacy protection considering communication quality Hiroshi Yamane, Leping Huang, Kanta Matsuura, Kaoru Sezaki (Tokyo Univ.)
(65) 16:35-17:00 Personal Information Management System based on Linkability Control Yoshinori Sato, Akihiko Kawasaki, Toyohisa Morita, Takashi Fukumoto (Hitachi, Ltd.)
(66) 17:00-17:25 Identity Control Method Considering Privacy Hajime Morito, Akihiko Kawasaki, Toyohisa Morita, Kazuo Takaragi (Hitachi Ltd.)
(67) 17:25-17:50 A Report on the 4th Annual PKI R&D Workshop Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Shoichi Hirose(School of Engineering, The University of Fukui)
TEL0776-27-9738,FAX0776-27-9738
E--mail: ic-c (to ISEC secretaries) 


Last modified: 2005-06-29 09:47:24


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /  
 
 Go Top  Go Back   / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan