IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2006)

Search Results: Keywords 'from:2006-07-20 to:2006-07-20'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 41 - 60 of 65 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2006-07-21
09:55
Okayama Okayama Univ. Security Requirements for PIN Authentication in Financial Transactions
Yuko Tamura (BOJ), Masashi Une (BOJ/AIST)
 [more] ISEC2006-47
pp.53-60
ISEC, SITE, IPSJ-CSEC 2006-07-21
10:20
Okayama Okayama Univ. Proposal and Evaluation on Epidemiological Approach to Computer Virus
Ryoichi Sasaki (Dendai)
Because computer virus has evolved every moment, the range which encounters computer virus is expanded or damage has tur... [more] ISEC2006-48
pp.61-67
ISEC, SITE, IPSJ-CSEC 2006-07-21
10:45
Okayama Okayama Univ. Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet
Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.)
Computer virus and worms perform randomly spyware and port-scanning to nd a vulnerability in the
Internet. The fractio... [more]
ISEC2006-49
pp.69-74
ISEC, SITE, IPSJ-CSEC 2006-07-21
11:10
Okayama Okayama Univ. A study on security technologies for paper documents
Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi)
While the administration of the Privacy Law and the expected application of J-SOX (Japanese version of The Sarbanes-Oxle... [more] ISEC2006-50
pp.75-81
ISEC, SITE, IPSJ-CSEC 2006-07-21
11:35
Okayama Okayama Univ. Visualization Technologies of nicter Incident Analysis System
Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE)
The authors have been working on the R&D activities of nicter, an Internet security incident analysis center investigati... [more] ISEC2006-51
pp.83-89
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:00
Okayama Okayama Univ. Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates
Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST)
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] ISEC2006-52
pp.91-98
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:25
Okayama Okayama Univ. Fingerprinting Protocol Equipping Electronic Payment System
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.)
On digital contents distribution system fingerprinting protocols enable sellers to trace the buyer who redistributed a c... [more] ISEC2006-53
pp.99-106
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:50
Okayama Okayama Univ. An Efficient Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.)
Recently, Viet et al., \cite{VYT05} have proposed an anonymous
password-authenticated key exchange (PAKE) protocol agai... [more]
ISEC2006-54
pp.107-114
ISEC, SITE, IPSJ-CSEC 2006-07-21
14:15
Okayama Okayama Univ. Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.)
Password-authenticated key exchange (PAKE) for multi-party with different passwords
allows group users with different p... [more]
ISEC2006-55
pp.115-122
ISEC, SITE, IPSJ-CSEC 2006-07-21
14:40
Okayama Okayama Univ. Distributed Privacy-preserving Document Clustering
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-56
pp.123-130
ISEC, SITE, IPSJ-CSEC 2006-07-21
15:20
Okayama Okayama Univ. Key-Management Scheme for Secure Multicast based on Network Topology
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-57
pp.131-135
ISEC, SITE, IPSJ-CSEC 2006-07-21
15:45
Okayama Okayama Univ. The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA
Yasutaka Shinzaki, Takeshi Ogino, Shintaro Ueda, Hiroshi Shigeno (Keio Univ.)
In this paper, we propose a multipurpose authentication method used for streaming multimedia data. In our method, we gen... [more] ISEC2006-58
pp.137-144
ISEC, SITE, IPSJ-CSEC 2006-07-21
16:10
Okayama Okayama Univ. An Implementation of a Privacy Enhancing Questionnaire System for Evaluating Classes
Koji Tanigawa, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)
 [more] ISEC2006-59
pp.145-151
ISEC, SITE, IPSJ-CSEC 2006-07-21
16:35
Okayama Okayama Univ. Proposal on whistle-blower protection technology to prevent the exposure of accuser from an indictment document
Masataka Tada, Mituyuki Takatuka, Takanobu Masubuchi, Ryoichi Sasaki (Tokyo Den Univ.)
 [more] ISEC2006-60
pp.153-158
ISEC, SITE, IPSJ-CSEC 2006-07-21
17:00
Okayama Okayama Univ. 3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions
Naoki Miyake, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)
This paper proposes a new anonymous communication system called 3MN (3-Mode Net). The system can be regarded as an exten... [more] ISEC2006-61
pp.159-164
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:00
Okayama Okayama Univ. Watermarking Method by Alternative Representation of Document Backgrounds
Takashi Hashimoto, Kurato Maeno, Hiroyuki Hota (Oki Electric Industry Co., Ltd.)
When a digital watermark is embedded in a document image, the watermark patterns are interfered with by the background e... [more] ISEC2006-62
pp.165-172
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:25
Okayama Okayama Univ. A User Authentication using Blind Spot and Papillary Light Reflex (part2)
Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ)
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] ISEC2006-63
pp.173-180
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:50
Okayama Okayama Univ. An Improvement of User Authentication Using Schema of Visual Memory -- An extension of the system using hint --
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ)
We have already proposed an user authentication system using “unclear images” as pass-images, in which only the legitima... [more] ISEC2006-64
pp.181-188
ISEC, SITE, IPSJ-CSEC 2006-07-21
14:15
Okayama Okayama Univ. Extracting Contexts From Keystroke Data
Munetoshi Ishikawa, Mizuki Oka, Kazuhiko Kato (Tsukuba Univ.)
 [more] ISEC2006-65
pp.189-196
ISEC, SITE, IPSJ-CSEC 2006-07-21
14:40
Okayama Okayama Univ. Development of IH-ZIP: A Data Compression Tool for Information Hiding
Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Koji Nakao (NICT), Tsutomu Matsumoto (Yokohama National Univ.)
We have previously proposed several methods of information hiding for lossless data compression for LZ77 and Huffman cod... [more] ISEC2006-66
pp.197-204
 Results 41 - 60 of 65 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan