Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 13:00 |
Akita |
Akita University |
Simplified Proof for Small Secret Key Attack on RSA and its Extension Noboru Kunihiro (Univ. of Tokyo), Kaoru Kurosawa (Ibaragi Univ.) ISEC2009-15 SITE2009-7 ICSS2009-29 |
[more] |
ISEC2009-15 SITE2009-7 ICSS2009-29 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 13:25 |
Akita |
Akita University |
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack (Part2) Takeshi Nasako, Yasuyuki Murakami (OECU), Masao Kasahara (OGU) ISEC2009-16 SITE2009-8 ICSS2009-30 |
Recently present authors proposed a double-sequence knapsack public key cryptosystem on the basis of MH PKC. We also pro... [more] |
ISEC2009-16 SITE2009-8 ICSS2009-30 pp.7-13 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 13:50 |
Akita |
Akita University |
Relationship between Weight of Plaintext and Successful Attacks in Knapsack Cryptosystems Tatsuo Douzono, Takeshi Nasako, Yasuyuki Murakami (Osaka Electoro-Communication Univ.) ISEC2009-17 SITE2009-9 ICSS2009-31 |
[more] |
ISEC2009-17 SITE2009-9 ICSS2009-31 pp.15-19 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 14:30 |
Akita |
Akita University |
Proposal on Password Authentication Against Iterative Shoulder Surfing Ryota Kitabayashi, Hiroyuki Inaba (KIT) ISEC2009-18 SITE2009-10 ICSS2009-32 |
Personal identification is one of the essential technology in order to
construct a secure information oriented society... [more] |
ISEC2009-18 SITE2009-10 ICSS2009-32 pp.21-26 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 14:55 |
Akita |
Akita University |
Problems between Disclosure of Technical Information and Restriction of Intellectual Property Protection Haruo Kodama (OUJ/SOKENDAI) ISEC2009-19 SITE2009-11 ICSS2009-33 |
Software as technical information are in principle made public to be protected as copyrighted works of program or invent... [more] |
ISEC2009-19 SITE2009-11 ICSS2009-33 pp.27-32 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 15:20 |
Akita |
Akita University |
An analysis of Copyright Laws Through Informatics Naonori Kato (SOKENDAI) ISEC2009-20 SITE2009-12 ICSS2009-34 |
In constructing global copyright laws, the incentive theory is indispensable. That in the idea to give some incentive fo... [more] |
ISEC2009-20 SITE2009-12 ICSS2009-34 pp.33-38 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 15:45 |
Akita |
Akita University |
Current situation and issues of health information exchange
-- the national database of health insurance claim and health check information -- Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD) ISEC2009-21 SITE2009-13 ICSS2009-35 |
In 2009, Ministry of Health and welfare started to build and maintain healthcare database. It’s called “the national dat... [more] |
ISEC2009-21 SITE2009-13 ICSS2009-35 pp.39-44 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 16:10 |
Akita |
Akita University |
About the Security Model built in the Search Engine Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) ISEC2009-22 SITE2009-14 ICSS2009-36 |
The Cloud is the logic system with name space where relationships among resources in the Internet are represented by pre... [more] |
ISEC2009-22 SITE2009-14 ICSS2009-36 pp.45-49 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 16:35 |
Akita |
Akita University |
Logical Structure of the Cloud Which Projects Various Values onto Oneself
-- From the Aspect of the Agent of Self-Referred Social Systems -- Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2009-23 SITE2009-15 ICSS2009-37 |
The semantics cloud is a logical system that the relation of the object world is described by the predicate logic, and t... [more] |
ISEC2009-23 SITE2009-15 ICSS2009-37 pp.51-56 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 17:00 |
Akita |
Akita University |
A Model for JSL Emergency Message System for the Deaf Kazuo Kamata (Utsunomiya Univ.), Shunichi Yonemura (NTT) ISEC2009-24 SITE2009-16 ICSS2009-38 |
Emergency messages are important for everyone in protecting oneself from danger in everyday life. In this report, we foc... [more] |
ISEC2009-24 SITE2009-16 ICSS2009-38 pp.57-64 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 09:30 |
Akita |
Akita University |
Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors Yumi Sakemi, Kazushi Nishii, Tetsuya Izuta, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-25 SITE2009-17 ICSS2009-39 |
Recently, pairing-based cryptographic applications such as ID-based cryptography have received much attention. On the ot... [more] |
ISEC2009-25 SITE2009-17 ICSS2009-39 pp.125-129 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 09:55 |
Akita |
Akita University |
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models Yusuke Naito (Mitsubishi Electric), Lei Wang, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2009-26 SITE2009-18 ICSS2009-40 |
[more] |
ISEC2009-26 SITE2009-18 ICSS2009-40 pp.131-138 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 10:20 |
Akita |
Akita University |
Proposal of Integrated MPKC: PPS
-- STS Enhanced by Perturbed Piece In Hand Method -- Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) ISEC2009-27 SITE2009-19 ICSS2009-41 |
In this paper, we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) Internal... [more] |
ISEC2009-27 SITE2009-19 ICSS2009-41 pp.139-146 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 10:45 |
Akita |
Akita University |
On the strength evaluation of Lesamnta against differential cryptanalysis Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-28 SITE2009-20 ICSS2009-42 |
We focus on the cryptographic hash algorithm Lesamnta-256, which is one of the
candidates for the new hash algorithm S... [more] |
ISEC2009-28 SITE2009-20 ICSS2009-42 pp.147-152 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:10 |
Akita |
Akita University |
A Study on Stream-Cipher-Based Hash Functions Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) ISEC2009-29 SITE2009-21 ICSS2009-43 |
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based h... [more] |
ISEC2009-29 SITE2009-21 ICSS2009-43 pp.153-159 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:35 |
Akita |
Akita University |
Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44 |
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more] |
ISEC2009-30 SITE2009-22 ICSS2009-44 pp.161-168 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:00 |
Akita |
Akita University |
Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) ISEC2009-31 SITE2009-23 ICSS2009-45 |
In MANETs (Mobile Ad-hoc Networks), distributed key managements are effective because of the infrastructureless feature.... [more] |
ISEC2009-31 SITE2009-23 ICSS2009-45 pp.169-174 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:25 |
Akita |
Akita University |
Investigation about Malware Distribution to Websites Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46 |
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] |
ISEC2009-32 SITE2009-24 ICSS2009-46 pp.175-180 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:50 |
Akita |
Akita University |
A Study on the Log Getting Process for Detection of the Remaining Files Copied from Removable Storage Medium Chikako Ishizawa, Makoto Nishida (Akita Univ.) ISEC2009-33 SITE2009-25 ICSS2009-47 |
There are a lot of information leakages because the files are copied from the removable storage medium and are left in t... [more] |
ISEC2009-33 SITE2009-25 ICSS2009-47 pp.181-187 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 14:15 |
Akita |
Akita University |
Risk Assessment Method for Networked Systems using CVSS Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48 |
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] |
ISEC2009-34 SITE2009-26 ICSS2009-48 pp.189-194 |