Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 10:30 |
Aomori |
Hirosaki University |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2010-26 SITE2010-22 ICSS2010-32 pp.123-132 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 13:25 |
Aomori |
Hirosaki University |
Attribute-based encryption with arbitrary number of authorities Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36 |
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] |
ISEC2010-30 SITE2010-26 ICSS2010-36 pp.153-158 |
IT, ISEC, WBS |
2010-03-04 09:25 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Considerations on Web System Development Process against XSS worms. Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security) IT2009-73 ISEC2009-81 WBS2009-52 |
(To be available after the conference date) [more] |
IT2009-73 ISEC2009-81 WBS2009-52 pp.7-14 |
IT, ISEC, WBS |
2010-03-04 11:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55 |
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] |
IT2009-76 ISEC2009-84 WBS2009-55 pp.31-38 |
AI |
2010-01-22 11:00 |
Tokyo |
|
Reduction technique of user rating histories for information filtering systems Takayuki Uda (IISEC), Tetsuo Kinoshita (TOHOKU Univ.) AI2009-21 |
The information filtering system refers to action histories and evaluation histories of the user to perform filtering. ... [more] |
AI2009-21 pp.13-18 |
R |
2009-12-18 13:50 |
Tokyo |
|
An Investigation of Reliability Evaluation of Networks with Layer Structure Ayako Suzuki (Inst. of Information Security), Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Inst. of Information Security), Masaki Hanada (Tokyo Univ. of Science) R2009-48 |
There are many networks organized on an exist network by using appropriate network technologies. In these cases, the re... [more] |
R2009-48 pp.11-16 |
CPSY |
2009-10-20 16:20 |
Tokyo |
212, 1F, Bldg.E-2, The University of Tokyo |
[Panel Discussion]
The Future of Infomation Technology and its Experts Hidetsugu Irie (Toyo Univ.), Hidenori Tsuji (Inst. of Info. security), Masaaki Kondo (UEC), Takashi Toyoshima (Fujitsu), Kazuyuki Shudo (Tokyo Inst. of Tech), Koji Ara (Advanced Research Laboratory, Hitachi, Ltd) |
[more] |
|
ISEC |
2009-09-25 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Beijing Meeting in May, 2009 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corp/IPA) ISEC2009-45 |
[more] |
ISEC2009-45 pp.35-43 |
EA |
2009-03-27 10:30 |
Tokyo |
|
Kalman Filter Based Robust Restoration Method with Colored Driving Source Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci), Hideaki Matsue (Tokyo Univ. of Sci, Suwa.), Shigeo Tsujii (Inst. of Info Security) EA2008-136 |
This paper proposes a Kalman filter based robust restoration method with colored driving source for degraded images. The... [more] |
EA2008-136 pp.1-5 |
EA |
2009-03-27 11:00 |
Tokyo |
|
A Fast Noise Suppression Algorithm using Kalman filter with Colored Driving Source Nari Tanabe, Yasuhiro Onozuka, Masataka Tabata (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci.), Shigeo Tsujii (Inst. of Information Security.) EA2008-137 |
[more] |
EA2008-137 pp.7-11 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Network Usage Control Based on Evaluation of User Security Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58 |
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] |
IT2008-45 ISEC2008-103 WBS2008-58 pp.15-22 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Anomaly detection based on the machine learning of the human behavior on home network Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59 |
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] |
IT2008-46 ISEC2008-104 WBS2008-59 pp.23-28 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104 |
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] |
IT2008-91 ISEC2008-149 WBS2008-104 pp.307-314 |
IA |
2009-01-29 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Method of Grouping Routers by Using Positional Addresses Shigetoshi Okazaki, Naoshi Sato (Graduate School of Info Sec.) IA2008-64 |
The packet network based on the internet protocol is infrastructure of highly-networked information society, but there a... [more] |
IA2008-64 pp.95-100 |
ITE-BCT, IE, CS, IPSJ-AVM |
2008-12-11 15:15 |
Aichi |
Nagoya University |
Kalman Filter Based Restoration Algorithm for Degraded Image Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (nstitute of Information Security) CS2008-44 IE2008-108 |
We propose a Kalman filter based restoration algorithm for degraded images.The algorithm aims to achieve high quality im... [more] |
CS2008-44 IE2008-108 pp.29-34 |
SITE |
2008-12-05 15:30 |
Tokyo |
|
[Invited Talk]
Comprehensive Science on Information Security
-- from the Viewpoint of Contradiction in Information Society -- Shigeo Tsujii (Institute of Infotmation Security) SITE2008-41 |
[more] |
SITE2008-41 pp.31-36 |
EA |
2008-11-21 11:15 |
Oita |
|
Kalman filter based fast noise suppression algorithm Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (Institute of Information Security) EA2008-94 |
[more] |
EA2008-94 pp.57-62 |
ICM, CQ, NS (Joint) |
2008-11-13 18:00 |
Fukushima |
Nihon University |
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] |
CQ2008-51 pp.33-38 |
SITE |
2008-10-17 14:20 |
Kanagawa |
|
About the access rule of the integrated security model based on the intuitionistic logic
-- The case of combining a conflict of interest attribute with a hierarchical attribute -- Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) SITE2008-31 |
[more] |
SITE2008-31 pp.9-14 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Design Policy of MPKC based on Piece in Hand Concept Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12 |
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] |
ISEC2008-18 SITE2008-12 pp.15-22 |