IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev SITE Conf / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Toshinari Tsuruhara (DT)
Vice Chair Hiroyuki Inaba (Kyoto Inst. of Tech.), Michio Nakanishi (Osaka Inst. of Tech.)
Secretary Tetsuya Morizumi (Toyo Networks & System Integration), Eizen Kimura (Ehime Univ.)
Assistant Yukiko Kawaguchi (Uekusa), Soichiro Morishita (Univ. of Tokyo)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Kazuo Ota (Univ. of Electro-Comm.)
Vice Chair Kazuo Takaragi (Hitachi), Toru Fujiwara (Osaka Univ.)
Secretary Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Noboru Kunihiro (Univ. of Tokyo)
Assistant Katsuyuki Takashima (Mitsubishi Electric)

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

{INFOMESITEM}
Conference Date Thu, Jul 24, 2008 13:00 - 17:50
Fri, Jul 25, 2008 09:55 - 17:25
Topics  
Conference Place Fukuoka Institute of System LSI Design Industry 
Transportation Guide http://www.ist.or.jp/lsi/pg03_01.html
Contact
Person
Prof. Toshihiko Shimokawa
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

Thu, Jul 24 PM 
13:00 - 15:05
(1) 13:00-13:25 A Note on the Security of KMN PKC and Presentation of Challenge Problems ISEC2008-16 SITE2008-10 Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.)
(2) 13:25-13:50 On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 --
ISEC2008-17 SITE2008-11
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.)
(3) 13:50-14:15 Design Policy of MPKC based on Piece in Hand Concept ISEC2008-18 SITE2008-12 Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.)
(4) 14:15-14:40 Knapsack Cryptosystem on Elliptic Curves of Trace Tow ISEC2008-19 SITE2008-13 Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.)
(5) 14:40-15:05 On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
ISEC2008-20 SITE2008-14
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA)
Thu, Jul 24 PM 
13:00 - 14:40
(6) 13:00-13:25 An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II) Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.)
(7) 13:25-13:50 Efficiency of a Redactable Signature with Tree Construction Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.)
(8) 13:50-14:15 A System against Leakage though Paper Documents in Multi-Vendor Environment Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI)
(9) 14:15-14:40 Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)
Thu, Jul 24 PM 
15:20 - 17:50
(10) 15:20-15:45 Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents ISEC2008-25 SITE2008-19 Haruo Kodama (NIME)
(11) 15:45-16:10 Basic Study on Designing Navigation Systems for the Blind ISEC2008-26 SITE2008-20 Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal)
(12) 16:10-16:35 A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First --
ISEC2008-27 SITE2008-21
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.)
(13) 16:35-17:00 Study on Reputation Systems for Trusty Information Network ISEC2008-28 SITE2008-22 Noriaki Yoshikai (Niohn Univ.)
(14) 17:00-17:25 Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems --
ISEC2008-29 SITE2008-23
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC)
(15) 17:25-17:50 Study of method for expressing context ISEC2008-30 SITE2008-24 Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS)
Thu, Jul 24 PM 
15:20 - 17:00
(16) 15:20-15:45 Variable Probabilistic Packet Mareking with TTL for IP Traceback Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
(17) 15:45-16:10 Information Leakage Prevention Function of host based for P2P File Exchange Environment Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
(18) 16:10-16:35 Study of Database for information sharing of P2P File Exchange Environment Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi)
(19) 16:35-17:00 An enhancement of VMM snapshot utility for detcting code injection Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT)
Fri, Jul 25 AM 
09:55 - 12:00
(20) 09:55-10:20 Detecting of Unknown Computer Virus Variants Based on Computer Behavior ISEC2008-35 Haruka Mimori, Koki Abe (UEC)
(21) 10:20-10:45 Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems ISEC2008-36 Ryoya Miyazawa, Koki Abe (UEC)
(22) 10:45-11:10 A Proposal of Intrusion Detection using Third-parties Support ISEC2008-37 Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT)
(23) 11:10-11:35 Examination of the issues in designing of electronic signature documentation system ISEC2008-38 Miyuki Takao, Koichiro Hayashi (IISEC)
(24) 11:35-12:00 Clone Resistance of Paper Artifact-Metrics with Segmented Matching ISEC2008-39 Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU)
Fri, Jul 25 AM 
09:55 - 12:00
(25) 09:55-10:20 Architecture Optimization of a Group Signature Circuit Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC)
(26) 10:20-10:45 A Lattice Model of the General Confidentiality Policies Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
(27) 10:45-11:10 Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)
(28) 11:10-11:35 Proposal of Anonymos Routing Technique with DHT Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.)
(29) 11:35-12:00 Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.)
Fri, Jul 25 PM 
13:00 - 15:05
(30) 13:00-13:25 Implementation of Block Cipher Camellia with a Configurable and Extensible Processor ISEC2008-45 Kazuyoshi Matsuo, Koki Abe (UEC)
(31) 13:25-13:50 Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function ISEC2008-46 Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
(32) 13:50-14:15 Hash Function Using MMO Compression Function and MDP Domain Extension ISEC2008-47 Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.)
(33) 14:15-14:40 Traitor Tracing from ID based Broadcast Encryption ISEC2008-48 Ryuichi Sakai (OECU)
(34) 14:40-15:05 A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography ISEC2008-49 Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
Fri, Jul 25 PM 
13:00 - 15:05
(35) 13:00-13:25 Invalidation of a Mailing-list Address against Spam Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)
(36) 13:25-13:50 Proposal of a Cue & Response Based User Authentication Using Unclear Image Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
(37) 13:50-14:15 Self expandable RBAC for distributed systems Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)
(38) 14:15-14:40 Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)
(39) 14:40-15:05 A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Fri, Jul 25 PM 
15:20 - 17:25
(40) 15:20-15:45 Watermarking Method with a Quasi-One-Way Function ISEC2008-55 Kazuo Ohzeki, Engyoku Gi (SIT)
(41) 15:45-16:10 Ring Authenticated Group Key Establishment with Member Repudiation ISEC2008-56 Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo)
(42) 16:10-16:35 A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack ISEC2008-57 Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
(43) 16:35-17:00 Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes ISEC2008-58 Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.)
(44) 17:00-17:25 A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree ISEC2008-59 Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
Fri, Jul 25 PM 
15:20 - 16:35
(45) 15:20-15:45 A Study on Detecting Information Leak Virus by Activity Monitoring Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.)
(46) 15:45-16:10 Development of publicity function of the illegitimate activity host by the IP marking Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
(47) 16:10-16:35 P2P Node Detection method based on Connection Analysis Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.)

Contact Address and Latest Schedule Information
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-: ic-c (to ISEC secretaries) 
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  


Last modified: 2008-07-02 23:09:55


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 

[On-Site Price List of Paper Version of Proceedings (Technical Report)] (in Japanese)
 
[Presentation and Participation FAQ] (in Japanese)
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   Prev SITE Conf / Next SITE Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan