Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
Verification Points of Security Against a Passive Attack for Key Exchange Protocols Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75 |
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] |
IT2010-96 ISEC2010-100 WBS2010-75 pp.177-184 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Symbolic Criterion for EUC Secure Authentication against Static Adversary Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) IT2010-129 ISEC2010-133 WBS2010-108 |
EUC secure protocol maintains its security even when it is composed and shares public information with arbitrary protoco... [more] |
IT2010-129 ISEC2010-133 WBS2010-108 pp.403-410 |
ISEC, LOIS |
2010-11-18 09:30 |
Ibaraki |
Tsukuba Univ. |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39 |
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] |
ISEC2010-60 LOIS2010-39 pp.73-80 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 10:30 |
Aomori |
Hirosaki University |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2010-26 SITE2010-22 ICSS2010-32 pp.123-132 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Network Usage Control Based on Evaluation of User Security Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58 |
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] |
IT2008-45 ISEC2008-103 WBS2008-58 pp.15-22 |
MoNA, IPSJ-MBL |
2008-05-23 14:50 |
Okinawa |
Okinawa-seinen-kaikan |
Node-Disjoint Multipath Construction Method on Hop by Hop Routing Protocols and its Evaluation Takumi Mori, Osamu Takahashi (FUN) |
Multipath routing protocols aim at improvement in the data arrival rate and shortening the delay time is studied in MANE... [more] |
MoMuC2008-25 pp.141-146 |
NS, IN (Joint) |
2008-03-07 14:30 |
Okinawa |
Bankoku Shinryokan |
Defense Method against Black Hole Attack with Adaptive Blacklist Ken Sajo, Takumi Miyoshi (Shibaura Inst. Tech.) NS2007-197 |
A black hole attack is a serious problem in ad hoc networks.
In this attack, a malicious node camouflages a route reply... [more] |
NS2007-197 pp.365-368 |
IN |
2008-01-17 13:40 |
Aichi |
Nagoya Institute of Technology |
Sub-Marine Attack and its Defense in Ad Hoc Network Routing Protocols XiaoYang Zhang, Yasushi Wakahara (Univ. of Tokyo) IN2007-120 |
Recently, significant attention has been devoted to developing secure routing protocols for an Ad hoc network. In this p... [more] |
IN2007-120 pp.7-12 |
NS, ICM, CQ (Joint) |
2007-11-15 15:50 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
Defense Method to Black Hole Attack on Ad Hoc Network Ken Sajo (Shibaura Inst. Tech.), Takumi Miyoshi (Shibaura Inst.) CQ2007-75 |
A black hole attack is a serious problem in ad hoc networks. In this attack, a malicious node camouflages
a route reply... [more] |
CQ2007-75 pp.21-24 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 17:25 |
Hokkaido |
Future University-Hakodate |
On the Standardization of Information Security
-- Report on the Moscow Meeting in May, 2007 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA) ISEC2007-39 SITE2007-33 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2007-39 SITE2007-33 pp.159-169 |
IN, NS, CS (Joint) |
2006-09-14 11:20 |
Miyagi |
|
A Study of a Routing Attack in OLSR MANET Hidehisa Nakayama, Bounpadith Kannhavong, Nei Kato (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney) NS2006-74 |
Recent advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) w... [more] |
NS2006-74 pp.21-26 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:15 |
Okayama |
Okayama Univ. |
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.) |
Password-authenticated key exchange (PAKE) for multi-party with different passwords
allows group users with different p... [more] |
ISEC2006-55 pp.115-122 |
IT, WBS, ISEC |
2005-03-18 15:55 |
Kyoto |
Kyoto Univ. |
Implementation of a Security Protocol Analyzer based on Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] |
IT2004-54 ISEC2004-110 WBS2004-169 pp.25-30 |
ISEC, LOIS |
2004-11-09 09:50 |
Osaka |
Osaka Univ. |
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] |
ISEC2004-87 OIS2004-54 pp.15-22 |
ICM |
2004-10-01 11:20 |
Gifu |
Hida District Local Industry Promotion Center |
Secure Remote Access System based on Dynamic Secure Terminal Setting Hiroyuki Taniguchi, Izuru Sato (Fujitsu Lab.), Takeshi Ohnishi (FNT), Markus Schneider (FhG-SIT) |
We propose “DSTS: Dynamic Secure Terminal Setting”, which is secure and dynamic terminal information setting technology ... [more] |
TM2004-47 pp.31-36 |
ISEC |
2004-09-17 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Security Protocol Analyzer Considering Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more] |
ISEC2004-67 pp.1-8 |
SS |
2004-08-02 16:15 |
Hokkaido |
Future University Hakodate |
Specification of a Security Protocol based on a State Machine Model Goichi Itabashi (Tohoku Univ.), Kaoru Takahashi, Yasushi Kato (SNCT), Takuo Suganuma, Norio Shiratori (Tohoku Univ.) |
Formal methods such as the spi calculus have been proposed in order to validate security protocols. In this paper, we pr... [more] |
SS2004-12 pp.37-39 |