IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Social Implications of Technology and Information Ethics (SITE)  (Searched in: 2009)

Search Results: Keywords 'from:2009-07-02 to:2009-07-02'

[Go to Official SITE Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
13:00
Akita Akita University Simplified Proof for Small Secret Key Attack on RSA and its Extension
Noboru Kunihiro (Univ. of Tokyo), Kaoru Kurosawa (Ibaragi Univ.) ISEC2009-15 SITE2009-7 ICSS2009-29
 [more] ISEC2009-15 SITE2009-7 ICSS2009-29
pp.1-6
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
13:25
Akita Akita University Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack (Part2)
Takeshi Nasako, Yasuyuki Murakami (OECU), Masao Kasahara (OGU) ISEC2009-16 SITE2009-8 ICSS2009-30
Recently present authors proposed a double-sequence knapsack public key cryptosystem on the basis of MH PKC. We also pro... [more] ISEC2009-16 SITE2009-8 ICSS2009-30
pp.7-13
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
13:50
Akita Akita University Relationship between Weight of Plaintext and Successful Attacks in Knapsack Cryptosystems
Tatsuo Douzono, Takeshi Nasako, Yasuyuki Murakami (Osaka Electoro-Communication Univ.) ISEC2009-17 SITE2009-9 ICSS2009-31
 [more] ISEC2009-17 SITE2009-9 ICSS2009-31
pp.15-19
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
14:30
Akita Akita University Proposal on Password Authentication Against Iterative Shoulder Surfing
Ryota Kitabayashi, Hiroyuki Inaba (KIT) ISEC2009-18 SITE2009-10 ICSS2009-32
Personal identification is one of the essential technology in order to
construct a secure information oriented society... [more]
ISEC2009-18 SITE2009-10 ICSS2009-32
pp.21-26
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
14:55
Akita Akita University Problems between Disclosure of Technical Information and Restriction of Intellectual Property Protection
Haruo Kodama (OUJ/SOKENDAI) ISEC2009-19 SITE2009-11 ICSS2009-33
Software as technical information are in principle made public to be protected as copyrighted works of program or invent... [more] ISEC2009-19 SITE2009-11 ICSS2009-33
pp.27-32
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
15:20
Akita Akita University An analysis of Copyright Laws Through Informatics
Naonori Kato (SOKENDAI) ISEC2009-20 SITE2009-12 ICSS2009-34
In constructing global copyright laws, the incentive theory is indispensable. That in the idea to give some incentive fo... [more] ISEC2009-20 SITE2009-12 ICSS2009-34
pp.33-38
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
15:45
Akita Akita University Current situation and issues of health information exchange -- the national database of health insurance claim and health check information --
Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD) ISEC2009-21 SITE2009-13 ICSS2009-35
In 2009, Ministry of Health and welfare started to build and maintain healthcare database. It’s called “the national dat... [more] ISEC2009-21 SITE2009-13 ICSS2009-35
pp.39-44
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
16:10
Akita Akita University About the Security Model built in the Search Engine
Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) ISEC2009-22 SITE2009-14 ICSS2009-36
The Cloud is the logic system with name space where relationships among resources in the Internet are represented by pre... [more] ISEC2009-22 SITE2009-14 ICSS2009-36
pp.45-49
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
16:35
Akita Akita University Logical Structure of the Cloud Which Projects Various Values onto Oneself -- From the Aspect of the Agent of Self-Referred Social Systems --
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2009-23 SITE2009-15 ICSS2009-37
The semantics cloud is a logical system that the relation of the object world is described by the predicate logic, and t... [more] ISEC2009-23 SITE2009-15 ICSS2009-37
pp.51-56
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
17:00
Akita Akita University A Model for JSL Emergency Message System for the Deaf
Kazuo Kamata (Utsunomiya Univ.), Shunichi Yonemura (NTT) ISEC2009-24 SITE2009-16 ICSS2009-38
Emergency messages are important for everyone in protecting oneself from danger in everyday life. In this report, we foc... [more] ISEC2009-24 SITE2009-16 ICSS2009-38
pp.57-64
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
09:30
Akita Akita University Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors
Yumi Sakemi, Kazushi Nishii, Tetsuya Izuta, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2009-25 SITE2009-17 ICSS2009-39
Recently, pairing-based cryptographic applications such as ID-based cryptography have received much attention. On the ot... [more] ISEC2009-25 SITE2009-17 ICSS2009-39
pp.125-129
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
09:55
Akita Akita University How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito (Mitsubishi Electric), Lei Wang, Kazuo Ohta (Univ. of Electro-Comm.) ISEC2009-26 SITE2009-18 ICSS2009-40
 [more] ISEC2009-26 SITE2009-18 ICSS2009-40
pp.131-138
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
10:20
Akita Akita University Proposal of Integrated MPKC: PPS -- STS Enhanced by Perturbed Piece In Hand Method --
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) ISEC2009-27 SITE2009-19 ICSS2009-41
In this paper, we propose a new MPKC, called PPS, based on (i) the 2-layer nonlinear piece in hand method, (ii) Internal... [more] ISEC2009-27 SITE2009-19 ICSS2009-41
pp.139-146
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
10:45
Akita Akita University On the strength evaluation of Lesamnta against differential cryptanalysis
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-28 SITE2009-20 ICSS2009-42
We focus on the cryptographic hash algorithm Lesamnta-256, which is one of the
candidates for the new hash algorithm S... [more]
ISEC2009-28 SITE2009-20 ICSS2009-42
pp.147-152
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
11:10
Akita Akita University A Study on Stream-Cipher-Based Hash Functions
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) ISEC2009-29 SITE2009-21 ICSS2009-43
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based h... [more] ISEC2009-29 SITE2009-21 ICSS2009-43
pp.153-159
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
11:35
Akita Akita University Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) ISEC2009-30 SITE2009-22 ICSS2009-44
In this paper, we present a new methodology for constructing
an efficient identification scheme, and based on it,
we... [more]
ISEC2009-30 SITE2009-22 ICSS2009-44
pp.161-168
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:00
Akita Akita University Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks
Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) ISEC2009-31 SITE2009-23 ICSS2009-45
In MANETs (Mobile Ad-hoc Networks), distributed key managements are effective because of the infrastructureless feature.... [more] ISEC2009-31 SITE2009-23 ICSS2009-45
pp.169-174
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:25
Akita Akita University Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) ISEC2009-32 SITE2009-24 ICSS2009-46
This paper reports the actual situation of malware distribution to websites by constructing web honeynets, which carries... [more] ISEC2009-32 SITE2009-24 ICSS2009-46
pp.175-180
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:50
Akita Akita University A Study on the Log Getting Process for Detection of the Remaining Files Copied from Removable Storage Medium
Chikako Ishizawa, Makoto Nishida (Akita Univ.) ISEC2009-33 SITE2009-25 ICSS2009-47
There are a lot of information leakages because the files are copied from the removable storage medium and are left in t... [more] ISEC2009-33 SITE2009-25 ICSS2009-47
pp.181-187
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
14:15
Akita Akita University Risk Assessment Method for Networked Systems using CVSS
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] ISEC2009-34 SITE2009-26 ICSS2009-48
pp.189-194
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan