Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 16:35 |
Okayama |
Okayama Univ. |
Possibility of the Key Recovery Attack against Py Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
Biham and Seberry have submitted the stream cipher Py to the ECRYPT
Stream Cipher Project (eSTREAM).
In this paper, ... [more] |
ISEC2006-28 SITE2006-25 pp.141-148 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 17:00 |
Okayama |
Okayama Univ. |
Tight theoretical estimation of the security of RC6 against chi-square attack Takatomi Wada, Atsuko Miyaji (JAIST), Tomohiko Hinoue (OMRON) |
[more] |
ISEC2006-29 SITE2006-26 pp.149-154 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 17:25 |
Okayama |
Okayama Univ. |
On the security of Piece In Hand Concept based on Sequential Solution Method Daisuke Ito, Yoshitomo Fukushima, Toshinobu Kaneko (TUS) |
In 2003, Tsujii et al. proposed multivariate type public key cryptosystem, named \textit{Piece In Hand Concept}. This cr... [more] |
ISEC2006-30 SITE2006-27 pp.155-159 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:00 |
Okayama |
Okayama Univ. |
A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
The interconnected IP traceback is a method for identifying theoriginator of an IP packet. A traceback server sends quer... [more] |
ISEC2006-31 SITE2006-28 pp.161-165 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:25 |
Okayama |
Okayama Univ. |
IDS for SSL Enncrypted Web Traffic Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.) |
The threat of attacks on web applications, such as SQL injection and cross site scripting, remains a serious problem. Th... [more] |
ISEC2006-32 SITE2006-29 pp.167-173 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 13:50 |
Okayama |
Okayama Univ. |
DHT-based Dynamic VPN Instantiation Mechanism for Secure Home Network Access Ayumu Kubota, Akira Yamada, Yutaka Miyake (KDDI R&D Labs.) |
[more] |
ISEC2006-33 SITE2006-30 pp.175-182 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 14:15 |
Okayama |
Okayama Univ. |
Performance Improvement of Anomaly Detection System by Simplifying Call Stack Inspection Katsuhiro Suzuki (Univ. of Tsukuba), Hirotake Abe (JST), Kazuhiko Kato (Univ. of Tsukuba), Akira Kinno, Yuka Ikebe, Takehiro Nakayama, Atsushi Takeshita (NTT DoCoMo) |
Recently, the computer is exposed to various attacks from the outside and the inside of the system. We are studying to t... [more] |
ISEC2006-34 SITE2006-31 pp.183-190 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:20 |
Okayama |
Okayama Univ. |
A Proposal of Response Delay Method for Spam Mail from BOTNET Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU) |
Recently, increasing spam mails have been becoming causes of many problems. About 80 % of spam mails have been sent from... [more] |
ISEC2006-35 SITE2006-32 pp.191-197 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 15:45 |
Okayama |
Okayama Univ. |
A Study on Bot Detection using Response Time Yuji Hoshizawa, Motoaki Yamamura (SecureBrain) |
[more] |
|
ISEC, SITE, IPSJ-CSEC |
2006-07-20 16:10 |
Okayama |
Okayama Univ. |
A Configuration Parameter Correction for Security Configuration Analyzing System Sumitaka Okajo, Katsushi Matsuda (NEC) |
[more] |
ISEC2006-36 SITE2006-33 pp.199-206 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 16:35 |
Okayama |
Okayama Univ. |
On Enforcement of Noninterference Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech) |
We discuss a characterization of security policies to be enforced with a monitor. The monitor is a enforcement mechanism... [more] |
ISEC2006-37 SITE2006-34 pp.207-214 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 17:00 |
Okayama |
Okayama Univ. |
Preventing Buffer Overflow Attacks bypassing NXbit Protection Takahiro Shinagawa (TUAT) |
This paper presents a protection scheme to prevent buffer overflow attacks that bypass the NXbit protection and execute ... [more] |
ISEC2006-38 SITE2006-35 pp.215-222 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 17:25 |
Okayama |
Okayama Univ. |
Security Enhancement of HTTP-FUSE Knoppix Client by Trusted Computing Megumi Nakamura, Seiji Munetoh (IBM Japan), Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Ichiro Osawa (AIST) |
HTTP-FUSE KNOPPIX starts by getting the root filesystem by way of the Internet. The reliability of this KNOPPIX is great... [more] |
ISEC2006-39 SITE2006-36 pp.223-230 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 09:30 |
Okayama |
Okayama Univ. |
A Study of Partial Disclosure Problem in Ramp Schemes Using Polynomial Function
-- A Proposal of Cascaded Ramp Scheme -- Keiichi Hirota (NTT), Kazuo Mogi (NTT Communications) |
[more] |
ISEC2006-40 pp.1-8 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 09:55 |
Okayama |
Okayama Univ. |
Quantum Threshold Scheme Using Two States Takeshi Okada, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
Cleve, Gottesman, and Lo have shown the (k,n) quantum threshold scheme using several states. However, it is not easy to... [more] |
ISEC2006-41 pp.9-12 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:20 |
Okayama |
Okayama Univ. |
Traveling Salesman Problem and Tribonacci Sequence Kunikatsu Kobayashi, Seiichirou Kokubun (Yamagata Univ.) |
We consider the relation between the cycle and cycle length of traveling salesman problem using tribonacci sequence. It ... [more] |
ISEC2006-42 pp.13-18 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:45 |
Okayama |
Okayama Univ. |
Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols Hirofumi Muratani (Toshiba) |
We derive a lower bound on the round complexity of an $m$-bounded concurrent black-box zero-knowledge interactive proof ... [more] |
ISEC2006-43 pp.19-26 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:10 |
Okayama |
Okayama Univ. |
Privacy-preserving Scalar Product Comparison Protocol Jun Sakuma, Shigenobu Kobayashi (TokyoTech) |
[more] |
ISEC2006-44 pp.27-34 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:35 |
Okayama |
Okayama Univ. |
Secure optimization for distributed TSP using scalar product comparison protocol Jun Sakuma, Shigenobu Kobayashi (TokyoTech) |
[more] |
ISEC2006-45 pp.35-42 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 09:30 |
Okayama |
Okayama Univ. |
On the Standardization of Information Security
-- Report on the Madrid Meeting in May, 2006 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba) |
[more] |
ISEC2006-46 pp.43-52 |
|