Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2016-03-10 14:30 |
Tokyo |
The University of Electro-Communications |
A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers Yusuke Nagahama, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) IT2015-116 ISEC2015-75 WBS2015-99 |
Bilinear Pairing is a major tool to realize advanced cryptographic functionality such as searchable encryption, aggregat... [more] |
IT2015-116 ISEC2015-75 WBS2015-99 pp.95-100 |
ICSS |
2015-03-03 13:25 |
Okinawa |
Meio Univiersity |
Anomaly Detection Based on Clustering of Network Traffic Characteristics Considering Results of Signature Based IDS Evaluation Kohei Imai, Shigeki Aoki, Takao Miyamoto (Osaka Prefecture Univ.) ICSS2014-64 |
There is a lot of attacks over the Internet,intrusion detection systems(IDSs) are an active area of research.IDSs are cl... [more] |
ICSS2014-64 pp.7-12 |
NS, IN (Joint) |
2015-03-03 16:40 |
Okinawa |
Okinawa Convention Center |
Identity-Based Aggregate Signatures Applied to NDN for Short Message Transfers Byambajav Namsraijav, Tohru Asami, Yoshihiro Kawahara (UTokyo), Jun Kurihara, Kohei Sugiyama, Atsushi Tagami (KDDI R&D Labs.), Tomohiko Yagyu (NEC), Toru Hasegawa (Osaka Univ.) IN2014-175 |
In Named Data Networking (NDN), security is imposed on contents instead of end-to-end connections; therefore, every cont... [more] |
IN2014-175 pp.319-324 |
AP, SANE (Joint) |
2014-08-29 10:25 |
Niigata |
Niigata University Satellite campus |
Development of speckle filter based on the four-component scattering power decomposition Takuya Ochiai, Yoshio Yamaguchi, Hiroyoshi Yamada, Cui Yi (Niigata Univ.) SANE2014-56 |
Speckle noise in SAR images makes the image interpretation difficult and reduces the accuracy of terrain classification.... [more] |
SANE2014-56 pp.47-52 |
ISEC |
2013-12-11 16:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on An Analysis Prevention Scheme for Embedded System Firmware Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-81 |
There are increasing attacks against embedded system software as well as PC software. Software of embedded system is cal... [more] |
ISEC2013-81 pp.53-57 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-14 10:40 |
Nara |
Todaiji Total Cultural Center |
A Study of the Anomaly Detection Method Characteristics based on the Traffic Parameter Clustering Kouhei Tatsumi, Toyokazu Akiyama (Kyoto Sangyo Univ.) SITE2012-49 IA2012-87 |
The ”targeted attacks” especially to the government and the companies increase in recent years. Such unknown
attacks ar... [more] |
SITE2012-49 IA2012-87 pp.25-30 |
SANE |
2011-10-19 10:15 |
Overseas |
Udayana University, Bali, Indonesia |
Assessment of Variability in Target Scattering Mechanism Contribution in SAR Polarimetric Decomposition Bindi Pradip Shastri (CEPT University), Ram Lal Mehta, Dr. Shiv Mohan (SAC, ISRO), Professor Anjana Vyas (CEPT University) SANE2011-111 |
In the present study, full polarimetric L-band ALOS PALSAR cata covering parts of Nagaur distric in Rajasthan, has been ... [more] |
SANE2011-111 pp.259-268 |
ISEC, IT, WBS |
2011-03-04 11:40 |
Osaka |
Osaka University |
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-123 ISEC2010-127 WBS2010-102 |
This paper proposes an digital watermark method using extended smear-desmearing transform and high-pass filter.In this m... [more] |
IT2010-123 ISEC2010-127 WBS2010-102 pp.367-372 |
ISEC, LOIS |
2009-11-12 13:55 |
Gifu |
Gifu Univ. |
A Hierarchical Multisignature Based on the Gap Diffie-Hellman Signature Scheme Masaki Inamura, Ryu Watanabe, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-52 LOIS2009-41 |
We first propose a hierarchical structured multisignature scheme based on the Gap Diffie-Hellman(GDH) problem. We have e... [more] |
ISEC2009-52 LOIS2009-41 pp.9-14 |
ISEC, LOIS |
2009-11-12 14:20 |
Gifu |
Gifu Univ. |
A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings Hiroki Fujii, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2009-53 LOIS2009-42 |
Group signature scheme is the digital signature scheme enhancing the privacy of the user,and efficient pairing-based sch... [more] |
ISEC2009-53 LOIS2009-42 pp.15-22 |
ISEC |
2009-05-22 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check Amang Sudarsono, Toru Nakanishi, Yumi Sakemi, Yasuyuki Nogami, Nobuo Funabiki (Okayama Univ.) ISEC2009-6 |
A group signature scheme with efficient verifier-local revocation check has been proposed. This scheme provides a more e... [more] |
ISEC2009-6 pp.37-42 |
ICSS |
2009-05-15 14:20 |
Hyogo |
Kobe University |
Notes on Malware Detection System Based on Process Monitoring Yuko Ozasa, Kengo Kuniyoshi, Akira Morikawa, Masakatu Morii (Kobe Univ.) ICSS2009-3 |
Due to the increase of malwares and its variants, such as bots, worms,
spywares and adwares, both personal and busines... [more] |
ICSS2009-3 pp.9-14 |
WBS, IT, ISEC |
2009-03-10 17:30 |
Hokkaido |
Hakodate Mirai Univ. |
Detecting anomalies by monitoring terminals in Home Network Kengo Kuniyoshi, Masakatu Morii (Kobe Univ.) IT2008-94 ISEC2008-152 WBS2008-107 |
The system like IDS and IPS based on the handcrafted signatures which represent the illegal characteristics is effective... [more] |
IT2008-94 ISEC2008-152 WBS2008-107 pp.329-334 |
WBS, IT, ISEC |
2009-03-10 17:05 |
Hokkaido |
Hakodate Mirai Univ. |
An ID-Based 2-Functional Proxy Cryptosystem Lihua Wang (NICT) IT2008-130 ISEC2008-188 WBS2008-143 |
Proxy cryptosystems are classified into several types according to the proxy’s functions. For example, proxy decryption ... [more] |
IT2008-130 ISEC2008-188 WBS2008-143 pp.563-568 |
IA, SITE |
2009-03-05 14:40 |
Kumamoto |
|
String Matching Algorithms specialized for IDS Takashi Imaizumi (Chiba Univ.), Keisuke Mizuno (Nara Inst. of S and T) SITE2008-62 IA2008-85 |
While we use intrusion detection system, we can not be free from false positive alerts. In other words, there is little... [more] |
SITE2008-62 IA2008-85 pp.107-112 |
IN, NS (Joint) |
2009-03-03 09:20 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
PrBL: Probabilistic BlackList for E-mail Spammers Tatsuya Mori (NTT) NS2008-146 |
Recent drastic increase in the number of spam messages has caused
significant overload on e-mail delivery systems.
IP... [more] |
NS2008-146 pp.15-20 |
ISEC, LOIS |
2008-11-13 16:05 |
Aichi |
Nagoya Noh Theater |
A Proposal of an Efficient Forward-Secure Group Signature Scheme Using Pairing Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-80 OIS2008-56 |
Group signature scheme is one of signature schemes which keep signer’s identity information secret. To prevent a problem... [more] |
ISEC2008-80 OIS2008-56 pp.47-54 |
DE |
2008-09-21 14:45 |
Fukushima |
|
[Invited Talk]
Approximate Queries on String Collections Xiaochun Yang, Bin Wang (Northeastern Univ., China), Chen Li (UC Irvine) DE2008-31 |
Approximate queries on a collection of strings are important in many applications such as record linkage, spell checking... [more] |
DE2008-31 pp.3-4 |
ISEC |
2008-09-12 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reduction of Public-Key Size in a Revocable Group Signature Scheme with Constant Costs for Signing and Verifying Hiroki Fujii, Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-68 |
Group signature scheme is the digital signature scheme enhancing the privacy of the user. We proposed a revocable scheme... [more] |
ISEC2008-68 pp.33-38 |
ISEC, IT, WBS |
2008-02-29 14:15 |
Tokyo |
|
A proposal of modified multi ring signature Mitsuaki Ikeda, Yutaka Kawai, Kazuo Ohta (UEC) IT2007-58 ISEC2007-155 WBS2007-89 |
The $k$-out-of-$n$ signature is a signature scheme where $k$ real signers
among $n$ signers corporate in signature gene... [more] |
IT2007-58 ISEC2007-155 WBS2007-89 pp.65-71 |