IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Special Interest Group on Computer Security (IPSJ-CSEC)  (Searched in: 2007)

Search Results: Keywords 'from:2007-07-19 to:2007-07-19'

[Go to Official IPSJ-CSEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 59 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2007-07-19
15:45
Hokkaido Future University-Hakodate Privacy-Preserving Assocaition Rules Mining Scheme Revisited
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.) ISEC2007-35 SITE2007-29
Assocaition Rules Mining is a frequently used technique which finds interesting associations and correlation relationshi... [more] ISEC2007-35 SITE2007-29
pp.133-138
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:10
Hokkaido Future University-Hakodate Group Key Based Revocation Schemes with Shorter Message Header
Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu) ISEC2007-36 SITE2007-30
 [more] ISEC2007-36 SITE2007-30
pp.139-143
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:35
Hokkaido Future University-Hakodate On Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.) ISEC2007-37 SITE2007-31
An anonymous password-authenticated key exchange (PAKE) protocol is
designed to provide both user's password-based auth... [more]
ISEC2007-37 SITE2007-31
pp.145-151
ISEC, SITE, IPSJ-CSEC 2007-07-19
17:00
Hokkaido Future University-Hakodate A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ) ISEC2007-38 SITE2007-32
We propose the scheme that
stores protected secret key which is made by combination of biometrics and secret key in the... [more]
ISEC2007-38 SITE2007-32
pp.153-158
ISEC, SITE, IPSJ-CSEC 2007-07-19
17:25
Hokkaido Future University-Hakodate On the Standardization of Information Security -- Report on the Moscow Meeting in May, 2007 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA) ISEC2007-39 SITE2007-33
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2007-39 SITE2007-33
pp.159-169
ISEC, SITE, IPSJ-CSEC 2007-07-19
15:45
Hokkaido Future University-Hakodate A composition method of network-independent dynamic authentication VLAN
Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT)
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] ISEC2007-40 SITE2007-34
pp.171-176
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:10
Hokkaido Future University-Hakodate Evaluation of a library against injection attacks
Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC)
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] ISEC2007-41 SITE2007-35
pp.177-184
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:35
Hokkaido Future University-Hakodate A Proposal of User Authentication using Convergence Reflex and Eyeball Shape
Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.)
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] ISEC2007-42 SITE2007-36
pp.185-191
ISEC, SITE, IPSJ-CSEC 2007-07-19
17:00
Hokkaido Future University-Hakodate A study on information content of biometrics
Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.) ISEC2007-43 SITE2007-37
Due to the high security and convenience, biometric authentication is used at access control, ATM and many kinds of iden... [more] ISEC2007-43 SITE2007-37
pp.193-200
ISEC, SITE, IPSJ-CSEC 2007-07-19
17:25
Hokkaido Future University-Hakodate Advantage of User Authentication Using Unclear Images -- Automatic Generation of Decoy Images --
Takumi Yamamoto (Shizuoka Univ.), Atsushi Harada (Mitsubishi Electric), Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
We have recently proposed an user authentication system using "unclear images" as pass-images, in which only the legitim... [more] ISEC2007-44 SITE2007-38
pp.201-208
ISEC, SITE, IPSJ-CSEC 2007-07-20
09:55
Hokkaido Future University-Hakodate A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device
Janghoon Song, Koki Abe (UEC) ISEC2007-45
Random Switching Logic is a countermeasure to DPA that removes the relation between data and power consumption by making... [more] ISEC2007-45
pp.1-8
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:20
Hokkaido Future University-Hakodate Analysis on the Key-Scheduling Algorithm of MICKEY
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-46
MICKEY and MICKEY-128, which are stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM), use a 80-bit se... [more] ISEC2007-46
pp.9-16
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:45
Hokkaido Future University-Hakodate A Study on the Tews-Weinmann-Pyshkin Attack against WEP
Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-47
Tews, Weinmann, and Phshkin have shown a key recovery attack against WEP (the TWP attack), which is the modification of ... [more] ISEC2007-47
pp.17-21
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:10
Hokkaido Future University-Hakodate On Construction of Block Cipher with Variable Security Parameter
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.) ISEC2007-48
Currently, cryptographical technology such as an encryption algorithm is used in many IT systems. When an encryption sch... [more] ISEC2007-48
pp.23-28
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:35
Hokkaido Future University-Hakodate Hardware Implementations of the 128-bit Blockcipher CLEFIA
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.) ISEC2007-49
This paper presents optimization techniques and evaluation results in hardware implementations of the 128-bit blockciphe... [more] ISEC2007-49
pp.29-36
ISEC, SITE, IPSJ-CSEC 2007-07-20
09:55
Hokkaido Future University-Hakodate Proposal for the quantitative method of searching characteristics of node
Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi)
Information about the network worms, such as how they exploit vulnerabilities, infection symptoms, how to remove them, i... [more] ISEC2007-50
pp.37-42
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:20
Hokkaido Future University-Hakodate Orthogonal expansion of port-scan packets
Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi)
Observation of port-scan packets performed over the Internet is involved with so many parameters including time,
port ... [more]
ISEC2007-51
pp.43-49
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:45
Hokkaido Future University-Hakodate Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet
Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai)
We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the... [more] ISEC2007-52
pp.51-56
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:10
Hokkaido Future University-Hakodate Exploring the required condtions for malware to run for behavior analysis
Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT) ISEC2007-53
As a way of knowing host or behavior of malware on the network, we run malware in an isolated environment that doesn't a... [more] ISEC2007-53
pp.57-61
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:35
Hokkaido Future University-Hakodate Automatic malware classification
Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.) ISEC2007-54
It is determined by engineers of Antivirus companies whether the detected malware is new or variant based on past experi... [more] ISEC2007-54
pp.63-70
 Results 21 - 40 of 59 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan