Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, IPSJ-EIP |
2013-05-16 11:25 |
Kanagawa |
Institute of Infomation Security |
Proposal of SNS Membership Qualification System Using Security Information Database Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3 |
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] |
SITE2013-3 pp.11-16 |
SITE, IPSJ-EIP |
2013-05-16 13:30 |
Kanagawa |
Institute of Infomation Security |
[Invited Talk]
Property versus Secrecy:
-- Toward A General Theory for Information Law -- Koichiro Hayashi (Institute of Information Security) SITE2013-5 |
[more] |
SITE2013-5 pp.23-28 |
ICSS |
2013-03-25 11:35 |
Kanagawa |
Yokohama National University |
Partially Doubly-Encrypted ID-based Encryption and its Security Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60 |
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] |
ICSS2012-60 pp.19-24 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 16:05 |
Nara |
Todaiji Total Cultural Center |
A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS) SITE2012-71 IA2012-109 |
In Wi-Fi and Bluetooth connection, by specifications, devices exchange their unique assigned device addresses in the cle... [more] |
SITE2012-71 IA2012-109 pp.249-254 |
NS, IN (Joint) |
2013-03-08 09:40 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Proposition on Identity Management for Business Users in Cloud Environment Takuma Iwabuchi, Atsuhiro Goto (IISEC) NS2012-259 |
With the recent growth of cloud computing market and with ID life cycle becoming more multifaceted, the importance of ID... [more] |
NS2012-259 pp.547-552 |
NS, IN (Joint) |
2013-03-08 13:40 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A Study of sensor data privacy concern from multiple points of view toward its fully utilizing society Takamichi Aso, Atsuhiro Goto (IISEC) NS2012-284 |
Recently sensor service gets attention. It has some big opportunities because of using of various and large amount of da... [more] |
NS2012-284 pp.693-698 |
NS, IN (Joint) |
2013-03-08 14:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Android Security Improvement by Visualization of Application Behavior Rika Hayashi, Atsuhiro Goto (IISEC) NS2012-286 |
Android applications which work out of users' intention, "suspicious application", are becoming from "annoying" to "thre... [more] |
NS2012-286 pp.705-710 |
NS, IN (Joint) |
2013-03-08 14:50 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Comparing Malware with Already Analyzed One to Make Static Analysis Efficient Hiroki Hada, Atsuhiro Goto (IISEC) NS2012-287 |
[more] |
NS2012-287 pp.711-716 |
ICSS |
2012-11-22 11:35 |
Hiroshima |
Miyajima Mori-no-Yado |
An analytical study for sensor service provider to keep their use's security Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47 |
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] |
ICSS2012-47 pp.13-18 |
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM (Joint) [detail] |
2012-07-20 11:00 |
Ibaraki |
University Hall, University of Tsukuba |
Location Proof by GPS and WLAN Information Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43 |
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] |
MoMuC2012-18 IE2012-43 pp.43-48 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 13:30 |
Hokkaido |
|
Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems
-- For Overcoming Contradiction of Protection and Utilization of Personal Data -- Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 |
[more] |
ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25 pp.175-179 |
ICSS |
2012-03-16 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47 |
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] |
ICSS2011-47 pp.49-54 |
KBSE |
2011-09-21 09:30 |
Overseas |
Ocean Grand Hotel Jeju |
Development of a Software Security Learning Environment Atsuo Hazeyama (TGU), Hiroto Shimizu (IIS) KBSE2011-24 |
Importance for software security technologies has been recognized according to increase of services on the internet. It ... [more] |
KBSE2011-24 pp.1-6 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
AN, MoNA, USN (Joint) |
2011-01-21 10:30 |
Hiroshima |
Hiroshima City University |
Computer Simulation on Rescueing Movement using Adhoc Network in case of a disaster Yuta Koide, Naoshi Sato, Kazuyuki Ishii (IISEC) USN2010-58 |
A variety of wireless networks were high-speed and steady and it came to be organizable as the wireless technology devel... [more] |
USN2010-58 pp.107-112 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 10:30 |
Aomori |
Hirosaki University |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2010-26 SITE2010-22 ICSS2010-32 pp.123-132 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 13:25 |
Aomori |
Hirosaki University |
Attribute-based encryption with arbitrary number of authorities Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] |
ISEC2010-30 SITE2010-26 ICSS2010-36 pp.153-158 |
IT, ISEC, WBS |
2010-03-04 09:25 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Considerations on Web System Development Process against XSS worms. Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security) IT2009-73 ISEC2009-81 WBS2009-52 |
(To be available after the conference date) [more] |
IT2009-73 ISEC2009-81 WBS2009-52 pp.7-14 |
AI |
2010-01-22 11:00 |
Tokyo |
|
Reduction technique of user rating histories for information filtering systems Takayuki Uda (IISEC), Tetsuo Kinoshita (TOHOKU Univ.) AI2009-21 |
The information filtering system refers to action histories and evaluation histories of the user to perform filtering. ... [more] |
AI2009-21 pp.13-18 |