Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 09:55 |
Okayama |
Okayama Univ. |
Security Requirements for PIN Authentication in Financial Transactions Yuko Tamura (BOJ), Masashi Une (BOJ/AIST) |
[more] |
ISEC2006-47 pp.53-60 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:20 |
Okayama |
Okayama Univ. |
Proposal and Evaluation on Epidemiological Approach to Computer Virus Ryoichi Sasaki (Dendai) |
Because computer virus has evolved every moment, the range which encounters computer virus is expanded or damage has tur... [more] |
ISEC2006-48 pp.61-67 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:45 |
Okayama |
Okayama Univ. |
Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.) |
Computer virus and worms perform randomly spyware and port-scanning to nd a vulnerability in the
Internet. The fractio... [more] |
ISEC2006-49 pp.69-74 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:10 |
Okayama |
Okayama Univ. |
A study on security technologies for paper documents Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi) |
While the administration of the Privacy Law and the expected application of J-SOX (Japanese version of The Sarbanes-Oxle... [more] |
ISEC2006-50 pp.75-81 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 11:35 |
Okayama |
Okayama Univ. |
Visualization Technologies of nicter Incident Analysis System Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE) |
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] |
ISEC2006-51 pp.83-89 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:00 |
Okayama |
Okayama Univ. |
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST) |
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] |
ISEC2006-52 pp.91-98 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:25 |
Okayama |
Okayama Univ. |
Fingerprinting Protocol Equipping Electronic Payment System Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.) |
On digital contents distribution system fingerprinting protocols enable sellers to trace the buyer who redistributed a c... [more] |
ISEC2006-53 pp.99-106 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:50 |
Okayama |
Okayama Univ. |
An Efficient Anonymous Password-Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.) |
Recently, Viet et al., \cite{VYT05} have proposed an anonymous
password-authenticated key exchange (PAKE) protocol agai... [more] |
ISEC2006-54 pp.107-114 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:15 |
Okayama |
Okayama Univ. |
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.) |
Password-authenticated key exchange (PAKE) for multi-party with different passwords
allows group users with different p... [more] |
ISEC2006-55 pp.115-122 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:40 |
Okayama |
Okayama Univ. |
Distributed Privacy-preserving Document Clustering Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-56 pp.123-130 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 15:20 |
Okayama |
Okayama Univ. |
Key-Management Scheme for Secure Multicast based on Network Topology Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-57 pp.131-135 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 15:45 |
Okayama |
Okayama Univ. |
The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA Yasutaka Shinzaki, Takeshi Ogino, Shintaro Ueda, Hiroshi Shigeno (Keio Univ.) |
In this paper, we propose a multipurpose authentication method used for streaming multimedia data. In our method, we gen... [more] |
ISEC2006-58 pp.137-144 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 16:10 |
Okayama |
Okayama Univ. |
An Implementation of a Privacy Enhancing Questionnaire System for Evaluating Classes Koji Tanigawa, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
[more] |
ISEC2006-59 pp.145-151 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 16:35 |
Okayama |
Okayama Univ. |
Proposal on whistle-blower protection technology to prevent the exposure of accuser from an indictment document Masataka Tada, Mituyuki Takatuka, Takanobu Masubuchi, Ryoichi Sasaki (Tokyo Den Univ.) |
[more] |
ISEC2006-60 pp.153-158 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 17:00 |
Okayama |
Okayama Univ. |
3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions Naoki Miyake, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.) |
This paper proposes a new anonymous communication system called 3MN (3-Mode Net). The system can be regarded as an exten... [more] |
ISEC2006-61 pp.159-164 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:00 |
Okayama |
Okayama Univ. |
Watermarking Method by Alternative Representation of Document Backgrounds Takashi Hashimoto, Kurato Maeno, Hiroyuki Hota (Oki Electric Industry Co., Ltd.) |
When a digital watermark is embedded in a document image, the watermark patterns are interfered with by the background e... [more] |
ISEC2006-62 pp.165-172 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:25 |
Okayama |
Okayama Univ. |
A User Authentication using Blind Spot and Papillary Light Reflex (part2) Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ) |
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] |
ISEC2006-63 pp.173-180 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:50 |
Okayama |
Okayama Univ. |
An Improvement of User Authentication Using Schema of Visual Memory
-- An extension of the system using hint -- Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ) |
We have already proposed an user authentication system using “unclear images” as pass-images, in which only the legitima... [more] |
ISEC2006-64 pp.181-188 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:15 |
Okayama |
Okayama Univ. |
Extracting Contexts From Keystroke Data Munetoshi Ishikawa, Mizuki Oka, Kazuhiko Kato (Tsukuba Univ.) |
[more] |
ISEC2006-65 pp.189-196 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 14:40 |
Okayama |
Okayama Univ. |
Development of IH-ZIP: A Data Compression Tool for Information Hiding Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Koji Nakao (NICT), Tsutomu Matsumoto (Yokohama National Univ.) |
We have previously proposed several methods of information hiding for lossless data compression for LZ77 and Huffman cod... [more] |
ISEC2006-66 pp.197-204 |
|