Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2013/07/11)

Presentation
A Knapsack Cryptosystem Using Super-Decreasing Sequence

Shinsuke HAMASHO,  Yasuyuki MURAKAMI,  

[Date]2013/7/11
[Paper #]ISEC2013-37,SITE2013-32,ICSS2013-42,EMM2013-39
An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem

Yasuyuki MURAKAMI,  Shinsuke HAMASHO,  

[Date]2013/7/11
[Paper #]ISEC2013-38,SITE2013-33,ICSS2013-43,EMM2013-40
Cryptanalysis of Rainbow Signature : Enrico, you should have hacked further

Masahito GOTAISHI,  Shigeo TSUJII,  

[Date]2013/7/11
[Paper #]ISEC2013-39,SITE2013-34,ICSS2013-44,EMM2013-41
Cryptosystems for Social Organizations Managed by Receiving Administrator : TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations

Shigeo TSUJII,  Hiroshi YAMAGUCHI,  Kohtaro TADAKI,  Masahito GOTAISHI,  Ryo FUJITA,  

[Date]2013/7/11
[Paper #]ISEC2013-40,SITE2013-35,ICSS2013-45,EMM2013-42
On Identification Methods for Visible-Light Paper Artifact-Metric Systems

Ryosuke SUZUKI,  Tsutomu MATSUMOTO,  

[Date]2013/7/11
[Paper #]ISEC2013-41,SITE2013-36,ICSS2013-46,EMM2013-43
A proposal of key binding technology using lattice masking

Yuka SUGIMURA,  Masaya YASUDA,  Shigefumi YAMADA,  Narishige ABE,  Takashi SHINZAKI,  

[Date]2013/7/11
[Paper #]ISEC2013-42,SITE2013-37,ICSS2013-47,EMM2013-44
Closest vector problem on triangular lattice and its application to Fuzzy Signature

YUTA YONEYAMA,  KENTA TAKAHASHI,  MASAKATSU NISHIGAKI,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.45,Vol.2013-SPT-6 No.45
Evaluation of Random Number Sequences Generated from Microphone Input

TAIGA KAWAMURA,  TAKEAKI NAKABAYASHI,  TOMOYUKI NAGASE,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.46,Vol.2013-SPT-6 No.46
TLS with Pre-shared Key Extended by Identity-based Encryption

Yumi SAKEMI,  Tetsuya IZU,  Masahiko TAKENAKA,  Akira KANAOKA,  

[Date]2013/7/11
[Paper #]ISEC2013-43,SITE2013-38,ICSS2013-48,EMM2013-45
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings

Takanori YASUDA,  Tsuyoshi TAKAGI,  Kouichi SAKURAI,  

[Date]2013/7/11
[Paper #]ISEC2013-44,SITE2013-39,ICSS2013-49,EMM2013-46
On Side-Channel Information Using Signal Toggles in AES Circuit

Arisa MATSUBARA,  Yunfeng KUAI,  Yang LI,  Toshiki NAKASONE,  Kazuo OHTA,  Kazuo SAKIYAMA,  

[Date]2013/7/11
[Paper #]ISEC2013-45,SITE2013-40,ICSS2013-50,EMM2013-47
Recovering RSA Secret Keys from Observed Analog Data (I)

Noboru KUNIHIRO,  Atsushi TAKAYASU,  

[Date]2013/7/11
[Paper #]ISEC2013-46,SITE2013-41,ICSS2013-51,EMM2013-48
低量DoS攻撃を緩和するTCP再送信タイマ管理の一検討(セキュリティ,一般)

TAKUROU HOSOI,  KANTA MATSUURA,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.51,Vol.2013-SPT-6 No.51
ナイーブベイズを用いた攻撃予測に関する評価・考察(セキュリティ,一般)

,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.52,Vol.2013-SPT-6 No.52
A Detection Method against Activities of Targeted Attack on The Internal Network

Masahiro Yamada,  Masanobu Morinaga,  Yuki Unno,  Satoru Torii,  Masahiko Takenaka,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.53,Vol.2013-SPT-6 No.53
Observing Malicious Activities with DNS Honeypot

DAISUKE MAKITA,  KATSUNARI YOSHIOKA,  TSUTOMU MATSUMOTO,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.54,Vol.2013-SPT-6 No.54
Time Zone Analysis on IIJ Network Traffic for Malicious Botnet Activities

Khamphao SISAAT,  Hiroaki KIKUCHI,  Surin KITTITORNKUN,  Chaxiong YUKONHIATOU,  Masato TERADA,  Hiroshi ISHII,  

[Date]2013/7/11
[Paper #]ISEC2013-47,SITE2013-42,ICSS2013-52,EMM2013-49
Network Observation and Analysis Report on nicter : Malware infection to Embedded Systems

Junji NAKAZATO,  Junpei SHIMAMURA,  Masashi ETO,  Daisuke INOUE,  Koji NAKAO,  

[Date]2013/7/11
[Paper #]ISEC2013-48,SITE2013-43,ICSS2013-53,EMM2013-50
The Case Study of Privacy-Preserving Data Mining without Common Identification from the JPHC Study Data Set

SHIGETA IKUJI,  MAKOTO KAWAMURA,  TAKASHI UOZUMI,  TAKAMI AZUMA,  HIROAKI KIKUCHI,  MANAMI INOUE,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.57,Vol2013-SPT-6 No.57
Generalization of Noises in Differential Privacy

Akihiro YAMANAKA,  Ryo KIKUCHI,  Dai IKARASHI,  

[Date]2013/7/11
[Paper #]ISEC2013-49,SITE2013-44,ICSS2013-54,EMM2013-51
<<1234>> 41-60hit(69hit)