Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2008-11-13 13:00 |
Aichi |
Nagoya Noh Theater |
On Host-based Packet Capturing Mechanism for Network Forensics Shunsuke Inai (Nagoya Institute of Technology), Youji Fukuta (Aichi Univ. of Edu.), Shoji Mizobuchi (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Institute of Technology), Ryoji Noguchi (Toyotsu Syscom Corp.) ISEC2008-73 OIS2008-49 |
Digital forensics is application of computer crime investigation and analysis techniques in the interests of determing p... [more] |
ISEC2008-73 OIS2008-49 pp.1-6 |
ISEC, LOIS |
2008-11-13 13:25 |
Aichi |
Nagoya Noh Theater |
A RIA Groupware System using Google Gdata Protocol
-- A Schedule Information Sharing System -- Rui Zhuang, Yukio Rikiso (U. of Hyogo) ISEC2008-74 OIS2008-50 |
We developed a new groupware system using the web service provided by Google with the Google data APIs("GData" for short... [more] |
ISEC2008-74 OIS2008-50 pp.7-14 |
ISEC, LOIS |
2008-11-13 13:50 |
Aichi |
Nagoya Noh Theater |
Study of e-P.O.Box Basic System for The Social Security Service Takashi Obi, Masuyoshi Yachida, Joong Sun Lee, Yuji Homma, Nagaaki Ohyama (Tokyo Inst. of Tech.), Takumi Kashiwagi, Hiromasa Kawamura, Eikazu Niwano (Nippon Tetegraph and telephone Corporation) ISEC2008-75 OIS2008-51 |
It is the current situation that people's social security information is separately managed by each organization and the... [more] |
ISEC2008-75 OIS2008-51 pp.15-22 |
ISEC, LOIS |
2008-11-13 14:15 |
Aichi |
Nagoya Noh Theater |
A suggestion of the offer and management system of the individual prescription and medication history Aya Matsudaira, Hiroyuki Suzuki, Takashi Obi, Kouichi Kita, Masahiro Yamaguchi, Joong Sun Lee, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) ISEC2008-76 OIS2008-52 |
Now the investigative committee on the medical information network infrastructure examines about the digital prescriptio... [more] |
ISEC2008-76 OIS2008-52 pp.23-28 |
ISEC, LOIS |
2008-11-13 14:50 |
Aichi |
Nagoya Noh Theater |
An Experiment with DPA and DEMA on FPGA Equipped on SASEBO Takahiko Syouji, Akira Nozawa, Takayuki Kimura (Y.D.K. Co.,Ltd.), Tomoyasu Suzaki, Noritaka Yamashita, Yukiyasu Tsunoo (NEC Corporation) ISEC2008-77 OIS2008-53 |
(To be available after the conference date) [more] |
ISEC2008-77 OIS2008-53 pp.29-34 |
ISEC, LOIS |
2008-11-13 15:15 |
Aichi |
Nagoya Noh Theater |
On the Hardness of Discrete Logarithm Problem in Algebraic Tori Hirofumi Muratani, Tomoko Yonemura, Taichi Isogai, Kenji Ohkuma, Yoshikazu Hanatani, Kenichiro Furuta, Yuichi Komano, Hanae Nozaki, Atsushi Shimbo (Toshiba Corporation) ISEC2008-78 OIS2008-54 |
[more] |
ISEC2008-78 OIS2008-54 pp.35-40 |
ISEC, LOIS |
2008-11-13 15:40 |
Aichi |
Nagoya Noh Theater |
Multivariate Public-Key Cryptosystems Constructed Based on K(I).SE(1)Scheme and Applications of MPKC on Common Key Cryptosystem Masao Kasahara (Osaka Gakuin Univ.) ISEC2008-79 OIS2008-55 |
[more] |
ISEC2008-79 OIS2008-55 pp.41-46 |
ISEC, LOIS |
2008-11-13 16:05 |
Aichi |
Nagoya Noh Theater |
A Proposal of an Efficient Forward-Secure Group Signature Scheme Using Pairing Yuta Hira, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2008-80 OIS2008-56 |
Group signature scheme is one of signature schemes which keep signer’s identity information secret. To prevent a problem... [more] |
ISEC2008-80 OIS2008-56 pp.47-54 |
ISEC, LOIS |
2008-11-13 16:40 |
Aichi |
Nagoya Noh Theater |
[Invited Talk]
A Secure and Accessible Knowledge Management System for Home-Based Care Services for the Elderly
-- An Area Portal for Tacit Knowledge Sharing and Collaboration in Home-Based Care Services -- Akira Iwata (Nagoya Institute of Technology) ISEC2008-81 OIS2008-57 |
The demand of home-based care services for elderly are increasing rapidly in Japan in recent years since the number of e... [more] |
ISEC2008-81 OIS2008-57 pp.55-62 |
ISEC, LOIS |
2008-11-14 09:30 |
Aichi |
Nagoya Noh Theater |
Elliptic curves with a pre-determined embedding degree. Shoujirou Hirasawa, Atsuko Miyaji (Japan Advanced Instisute of Science and Technology) ISEC2008-82 OIS2008-58 |
Embedding degree k is one indicator to the difference between on the elliptic curve discrete logarithm problem (ECDLP) a... [more] |
ISEC2008-82 OIS2008-58 pp.63-66 |
ISEC, LOIS |
2008-11-14 09:55 |
Aichi |
Nagoya Noh Theater |
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences Masahiro Sukegawa, Atsuko Miyaji (Japan Advanced Institute of Science and Technology) ISEC2008-83 OIS2008-59 |
In this paper, we focus on a shuffle-exchange structure of PRGA.
We investigate how the structure mixes the permutatio... [more] |
ISEC2008-83 OIS2008-59 pp.67-72 |
ISEC, LOIS |
2008-11-14 10:20 |
Aichi |
Nagoya Noh Theater |
Uniquely decipherable Rabin cryptosystem with modulus p^kq Kensuke Takamura, Akira Hayashi (Kanazawa Institute of Technology) ISEC2008-84 OIS2008-60 |
T. Takagi proposed and analyzed variants of the RSA cryptosystem, in which the modulus is $p^k q$. He also suggested a v... [more] |
ISEC2008-84 OIS2008-60 pp.73-78 |
ISEC, LOIS |
2008-11-14 10:45 |
Aichi |
Nagoya Noh Theater |
On lattice bases for the Lagarias-Odlyzko attack against TSP cryptosystems Takeshi Taniguchi, Akira Hayashi (Kanazawa Institute of Technology) ISEC2008-85 OIS2008-61 |
The Lagarias-Odlyzko (LO) method is a tool for attacks against many variants of knapsack cryptosystems.Specifically it i... [more] |
ISEC2008-85 OIS2008-61 pp.79-82 |
ISEC, LOIS |
2008-11-14 11:20 |
Aichi |
Nagoya Noh Theater |
Dynamic Node Relocation Algorithm for Improvement Communication Quality in Multi-hop Wireless Network Yoko Furuzumi, Yukikazu Nakamoto (Hyogo Univ.) ISEC2008-86 OIS2008-62 |
We studied how to relocate mobile devices to achieve high communications quality, one of quality of serve in a mobile wi... [more] |
ISEC2008-86 OIS2008-62 pp.83-88 |
ISEC, LOIS |
2008-11-14 11:45 |
Aichi |
Nagoya Noh Theater |
Overseas Trends on and a Consideration about Privacy Protection and Utilization Technologies Takashi Hatashima, Shigeaki Tanimoto, Katsumi Takahashi (Nippon Telegraph and Telephone Corporation) ISEC2008-87 OIS2008-63 |
For realizing a secure IT society under the ubiquitous environments, it is important that implementing security counterm... [more] |
ISEC2008-87 OIS2008-63 pp.89-96 |
ISEC, LOIS |
2008-11-14 12:10 |
Aichi |
Nagoya Noh Theater |
A Study on Visualization of Personal Life Log Considering Disclosure Control Shin-ichiro Eitoku, Narimune Matsumura, Tomohiro Yamada, Shin-yo Muto, Masanobu Abe (Nippon Telegraph and Telephone Corporation) ISEC2008-88 OIS2008-64 |
In recent years, because of miniaturization of mobile terminals with various sensors, life-log services have begun to re... [more] |
ISEC2008-88 OIS2008-64 pp.97-104 |