Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 14:50 |
Online |
Online |
Distributed Random Number Generation Method on Smart Contracts Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ) ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 |
We propose N-choice game (NCG), a decentralized pseudo-random number generation method that can be executed on smart con... [more] |
ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 pp.104-109 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:35 |
Hokkaido |
San-Refure Hakodate |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT) ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27 pp.171-179 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 16:05 |
Hokkaido |
|
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 pp.75-84 |
SC |
2013-03-15 13:40 |
Tokyo |
|
Towards Provenance-Based Security Risk Assessment Guillermo Horacio Ramirez Caceres, Yohei Murakami, Koji Zettsu, Takeshi Takahashi, Shin'ichiro Matsuo (NICT) |
We are developing a Knowledge Language Grid (KLG) system, which enables users to combine multiple assets data from diffe... [more] |
SC2012-18 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:50 |
Hokkaido |
|
Architecture Design for Visualizing Risks and Implementing Adequate Security Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT) ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17 |
[more] |
ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17 pp.109-114 |
ICSS |
2011-11-18 15:30 |
Tokushima |
Naruto University of Education |
Multitenant Cloud Computing: Security Challenges and Approaches Takeshi Takahashi (NICT), Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama (NAIST), Shin'ichiro Matsuo (NICT) ICSS2011-36 |
This paper presents challenges and approaches of techniques enabling multitenancy in cloud computing, especially resourc... [more] |
ICSS2011-36 pp.25-32 |
ICSS |
2011-03-25 11:35 |
Tokyo |
Suspended |
On Security Model of Cryptographic Protocols for Mobile Devices Shin'ichiro Matsuo (NICT) ICSS2010-59 |
Recently, information devices, with lower computational power than general personal computers such as smartphone, are ge... [more] |
ICSS2010-59 pp.17-21 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 11:10 |
Hokkaido |
Future University-Hakodate |
On Construction of Block Cipher with Variable Security Parameter Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.) ISEC2007-48 |
Currently, cryptographical technology such as an encryption algorithm is used in many IT systems. When an encryption sch... [more] |
ISEC2007-48 pp.23-28 |
ISEC, LOIS |
2005-11-15 15:10 |
Fukuoka |
Kitakyushu Science and Research Park |
Asymmetric 3-party Password Authenticated Kay Exchange Toru Iino, Shin'ichiro Matsuo (NTT DATA), Hiroto Matsuoka, Wakaha Ogata (Tokyo Inst. of Tech.) |
Password-based authenticated key exchange (PAKE) are protocols in which
two parties establish secure session key by us... [more] |
ISEC2005-108 OIS2005-71 pp.63-70 |
ISEC, LOIS |
2005-11-15 15:35 |
Fukuoka |
Kitakyushu Science and Research Park |
A Encryption Scheme with Recording Decryption Evidence Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA) |
Currently, in order to protect individual's privacy information such as the image of surveillance camera, it is indispen... [more] |
ISEC2005-109 OIS2005-72 pp.71-76 |