Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:10 |
Hokkaido |
San-Refure Hakodate |
Problems Concerning the Digitization of the Japanese Government Authorized Textbooks
-- Study of Open Access and Free License of the Digital Textbooks -- Takahiro Haga (Gifu Shotoku Gakuen Univ.), Tsugumasa Suzuki (Keio Gijuku Youchisha Primary School), Takushi Otani (Kibi International Univ.) ISEC2014-30 SITE2014-25 ICSS2014-34 EMM2014-30 |
The digitization of textbooks that have been authorized by the Minister of Education(hereafter referred to as Authorized... [more] |
ISEC2014-30 SITE2014-25 ICSS2014-34 EMM2014-30 pp.221-228 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:35 |
Hokkaido |
San-Refure Hakodate |
Information ethics in interdiscplinarity
-- Codes of Ethics and Belief Revision -- Yuko Murakami (Tohoku Univ.) ISEC2014-31 SITE2014-26 ICSS2014-35 EMM2014-31 |
Interdiscplinarity issues arise from incompatible codes of ethics from each discipline, although they are often regarded... [more] |
ISEC2014-31 SITE2014-26 ICSS2014-35 EMM2014-31 pp.229-232 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:15 |
Hokkaido |
San-Refure Hakodate |
On Hidden Credential Retrieval SeongHan Shin, Kazukuni Kobara (AIST) ISEC2014-32 SITE2014-27 ICSS2014-36 EMM2014-32 |
Hidden Credential Retrieval (HCR) protocols are designed for access credentials management where users who remember shor... [more] |
ISEC2014-32 SITE2014-27 ICSS2014-36 EMM2014-32 pp.233-237 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Cryptanalysis of a matrix variant of NTRU Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] |
ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 pp.239-246 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:05 |
Hokkaido |
San-Refure Hakodate |
New Higher Order Differential Property of Piccolo Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34 |
Piccolo is a 64-bit block cipher proposed by Shibutani et.al in 2011. It has been reported that 8-/10-round Piccolo with... [more] |
ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34 pp.247-252 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:30 |
Hokkaido |
San-Refure Hakodate |
Quantitative Evaluation of the Key Information That is Learned through Timing Attack
-- The Contribution of Bucketing Technique for RSA Cryptosystem -- Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 |
Timing attacks are regarded as serious threats to many practical cryptographic algorithms, but it is difficult to estima... [more] |
ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 pp.253-258 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 10:40 |
Hokkaido |
San-Refure Hakodate |
Some Properties on Disaster Prevention Broadcasting Based on Data Hiding Technique Tetsuya Kojima, Akihiro Oizumi (Tokyo NCT) ISEC2014-36 SITE2014-31 ICSS2014-40 EMM2014-36 |
Data hiding schemes using complete complementary codes have been developed for image and audio signals. It has been show... [more] |
ISEC2014-36 SITE2014-31 ICSS2014-40 EMM2014-36 pp.259-264 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:05 |
Hokkaido |
San-Refure Hakodate |
Information hiding technique to protect copyright of digital data for 3-D printing Piyarat Silapasuphakornwong, Masahiro Suzuki, Hiroshi Unno, Kazutake Uehira (Kanagawa Inst. of Tech.), Youichi Takashima (NTT) ISEC2014-37 SITE2014-32 ICSS2014-41 EMM2014-37 |
This study presents a technique of information hiding to protect copy right of digital data for 3-D printing. In this te... [more] |
ISEC2014-37 SITE2014-32 ICSS2014-41 EMM2014-37 pp.265-270 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:30 |
Hokkaido |
San-Refure Hakodate |
Integration for Web reservation data of Hotel Yu Ichifuji, Noboru Sonehara (NII) ISEC2014-38 SITE2014-33 ICSS2014-42 EMM2014-38 |
Policy decisions like tourism should be determined on the bases of social data. In this situation, these data are collec... [more] |
ISEC2014-38 SITE2014-33 ICSS2014-42 EMM2014-38 pp.271-274 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:25 |
Hokkaido |
San-Refure Hakodate |
Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2) Hiroyuki Inaba, Takuto Tamai (Kyoto Inst. of Tech.) ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39 |
In recent years, a lot of incident of password leakage by illegal access occurs frequently, therefore a password list at... [more] |
ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39 pp.275-280 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:50 |
Hokkaido |
San-Refure Hakodate |
Proposal on Fast Searchable Encryption Scheme Using Bloom Filter Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 pp.281-286 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 |
[more] |
ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 pp.287-292 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 |
[more] |
ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 pp.293-300 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:25 |
Hokkaido |
San-Refure Hakodate |
Evaluating Resistance of Android Applications to Automated Repackaging Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-43 SITE2014-38 ICSS2014-47 EMM2014-43 |
Android is widely used as a smartphone OS. On the other hand, malware targeting the Android devices is increasing. Somet... [more] |
ISEC2014-43 SITE2014-38 ICSS2014-47 EMM2014-43 pp.301-307 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:50 |
Hokkaido |
San-Refure Hakodate |
A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications) ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 |
In order to detect the malware infection in internal network, we focus on HTTP traffic to the Internet. URL blacklist is... [more] |
ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 pp.309-314 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 |
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] |
ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 pp.315-319 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:40 |
Hokkaido |
San-Refure Hakodate |
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 |
[more] |
ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 pp.321-326 |