Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
Privacy-Preserving Assocaition Rules Mining Scheme Revisited Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.) ISEC2007-35 SITE2007-29 |
Assocaition Rules Mining is a frequently used technique which finds interesting associations and correlation relationshi... [more] |
ISEC2007-35 SITE2007-29 pp.133-138 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Group Key Based Revocation Schemes with Shorter Message Header Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu) ISEC2007-36 SITE2007-30 |
[more] |
ISEC2007-36 SITE2007-30 pp.139-143 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:35 |
Hokkaido |
Future University-Hakodate |
On Anonymous Password-Authenticated Key Exchange SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.) ISEC2007-37 SITE2007-31 |
An anonymous password-authenticated key exchange (PAKE) protocol is
designed to provide both user's password-based auth... [more] |
ISEC2007-37 SITE2007-31 pp.145-151 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 17:00 |
Hokkaido |
Future University-Hakodate |
A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ) ISEC2007-38 SITE2007-32 |
We propose the scheme that
stores protected secret key which is made by combination of biometrics and secret key in the... [more] |
ISEC2007-38 SITE2007-32 pp.153-158 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 17:25 |
Hokkaido |
Future University-Hakodate |
On the Standardization of Information Security
-- Report on the Moscow Meeting in May, 2007 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA) ISEC2007-39 SITE2007-33 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2007-39 SITE2007-33 pp.159-169 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:45 |
Hokkaido |
Future University-Hakodate |
A composition method of network-independent dynamic authentication VLAN Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT) |
Virtual Private Network (VPN) is a technology that constructs a private network between bases geographically away. OpenV... [more] |
ISEC2007-40 SITE2007-34 pp.171-176 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Evaluation of a library against injection attacks Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC) |
Injection vulnerabilities, which enable attacks done by injecting command string into input data, have big percentage of... [more] |
ISEC2007-41 SITE2007-35 pp.177-184 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:35 |
Hokkaido |
Future University-Hakodate |
A Proposal of User Authentication using Convergence Reflex and Eyeball Shape Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.) |
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] |
ISEC2007-42 SITE2007-36 pp.185-191 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 17:00 |
Hokkaido |
Future University-Hakodate |
A study on information content of biometrics Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.) ISEC2007-43 SITE2007-37 |
Due to the high security and convenience, biometric authentication is used at access control, ATM and many kinds of iden... [more] |
ISEC2007-43 SITE2007-37 pp.193-200 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 17:25 |
Hokkaido |
Future University-Hakodate |
Advantage of User Authentication Using Unclear Images
-- Automatic Generation of Decoy Images -- Takumi Yamamoto (Shizuoka Univ.), Atsushi Harada (Mitsubishi Electric), Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.) |
We have recently proposed an user authentication system using "unclear images" as pass-images, in which only the legitim... [more] |
ISEC2007-44 SITE2007-38 pp.201-208 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 09:55 |
Hokkaido |
Future University-Hakodate |
A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device Janghoon Song, Koki Abe (UEC) ISEC2007-45 |
Random Switching Logic is a countermeasure to DPA that removes the relation between data and power consumption by making... [more] |
ISEC2007-45 pp.1-8 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:20 |
Hokkaido |
Future University-Hakodate |
Analysis on the Key-Scheduling Algorithm of MICKEY Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-46 |
MICKEY and MICKEY-128, which are stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM), use a 80-bit se... [more] |
ISEC2007-46 pp.9-16 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:45 |
Hokkaido |
Future University-Hakodate |
A Study on the Tews-Weinmann-Pyshkin Attack against WEP Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-47 |
Tews, Weinmann, and Phshkin have shown a key recovery attack against WEP (the TWP attack), which is the modification of ... [more] |
ISEC2007-47 pp.17-21 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 11:10 |
Hokkaido |
Future University-Hakodate |
On Construction of Block Cipher with Variable Security Parameter Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.) ISEC2007-48 |
Currently, cryptographical technology such as an encryption algorithm is used in many IT systems. When an encryption sch... [more] |
ISEC2007-48 pp.23-28 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 11:35 |
Hokkaido |
Future University-Hakodate |
Hardware Implementations of the 128-bit Blockcipher CLEFIA Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.) ISEC2007-49 |
This paper presents optimization techniques and evaluation results in hardware implementations of the 128-bit blockciphe... [more] |
ISEC2007-49 pp.29-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 09:55 |
Hokkaido |
Future University-Hakodate |
Proposal for the quantitative method of searching characteristics of node Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi) |
Information about the network worms, such as how they exploit vulnerabilities, infection symptoms, how to remove them, i... [more] |
ISEC2007-50 pp.37-42 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:20 |
Hokkaido |
Future University-Hakodate |
Orthogonal expansion of port-scan packets Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi) |
Observation of port-scan packets performed over the Internet is involved with so many parameters including time,
port ... [more] |
ISEC2007-51 pp.43-49 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:45 |
Hokkaido |
Future University-Hakodate |
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai) |
We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the... [more] |
ISEC2007-52 pp.51-56 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 11:10 |
Hokkaido |
Future University-Hakodate |
Exploring the required condtions for malware to run for behavior analysis Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT) ISEC2007-53 |
As a way of knowing host or behavior of malware on the network, we run malware in an isolated environment that doesn't a... [more] |
ISEC2007-53 pp.57-61 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 11:35 |
Hokkaido |
Future University-Hakodate |
Automatic malware classification Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.) ISEC2007-54 |
It is determined by engineers of Antivirus companies whether the detected malware is new or variant based on past experi... [more] |
ISEC2007-54 pp.63-70 |