Print edition: ISSN 0913-5685
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
ISEC2006-40
A Study of Partial Disclosure Problem in Ramp Schemes Using Polynomial Function
-- A Proposal of Cascaded Ramp Scheme --
Keiichi Hirota (NTT), Kazuo Mogi (NTT Communications)
pp. 1 - 8
ISEC2006-41
Quantum Threshold Scheme Using Two States
Takeshi Okada, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
pp. 9 - 12
ISEC2006-42
Traveling Salesman Problem and Tribonacci Sequence
Kunikatsu Kobayashi, Seiichirou Kokubun (Yamagata Univ.)
pp. 13 - 18
ISEC2006-43
Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols
Hirofumi Muratani (Toshiba)
pp. 19 - 26
ISEC2006-44
Privacy-preserving Scalar Product Comparison Protocol
Jun Sakuma, Shigenobu Kobayashi (TokyoTech)
pp. 27 - 34
ISEC2006-45
Secure optimization for distributed TSP using scalar product comparison protocol
Jun Sakuma, Shigenobu Kobayashi (TokyoTech)
pp. 35 - 42
ISEC2006-46
On the Standardization of Information Security
-- Report on the Madrid Meeting in May, 2006 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba)
pp. 43 - 52
ISEC2006-47
Security Requirements for PIN Authentication in Financial Transactions
Yuko Tamura (BOJ), Masashi Une (BOJ/AIST)
pp. 53 - 60
ISEC2006-48
Proposal and Evaluation on Epidemiological Approach to Computer Virus
Ryoichi Sasaki (Dendai)
pp. 61 - 67
ISEC2006-49
Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet
Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.)
pp. 69 - 74
ISEC2006-50
A study on security technologies for paper documents
Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi)
pp. 75 - 81
ISEC2006-51
Visualization Technologies of nicter Incident Analysis System
Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE)
pp. 83 - 89
ISEC2006-52
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates
Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST)
pp. 91 - 98
ISEC2006-53
Fingerprinting Protocol Equipping Electronic Payment System
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.)
pp. 99 - 106
ISEC2006-54
An Efficient Anonymous Password-Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.)
pp. 107 - 114
ISEC2006-55
Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.)
pp. 115 - 122
ISEC2006-56
Distributed Privacy-preserving Document Clustering
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.)
pp. 123 - 130
ISEC2006-57
Key-Management Scheme for Secure Multicast based on Network Topology
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)
pp. 131 - 135
ISEC2006-58
The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA
Yasutaka Shinzaki, Takeshi Ogino, Shintaro Ueda, Hiroshi Shigeno (Keio Univ.)
pp. 137 - 144
ISEC2006-59
An Implementation of a Privacy Enhancing Questionnaire System for Evaluating Classes
Koji Tanigawa, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)
pp. 145 - 151
ISEC2006-60
Proposal on whistle-blower protection technology to prevent the exposure of accuser from an indictment document
Masataka Tada, Mituyuki Takatuka, Takanobu Masubuchi, Ryoichi Sasaki (Tokyo Den Univ.)
pp. 153 - 158
ISEC2006-61
3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions
Naoki Miyake, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)
pp. 159 - 164
ISEC2006-62
Watermarking Method by Alternative Representation of Document Backgrounds
Takashi Hashimoto, Kurato Maeno, Hiroyuki Hota (Oki Electric Industry Co., Ltd.)
pp. 165 - 172
ISEC2006-63
A User Authentication using Blind Spot and Papillary Light Reflex (part2)
Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ)
pp. 173 - 180
ISEC2006-64
An Improvement of User Authentication Using Schema of Visual Memory
-- An extension of the system using hint --
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ)
pp. 181 - 188
ISEC2006-65
Extracting Contexts From Keystroke Data
Munetoshi Ishikawa, Mizuki Oka, Kazuhiko Kato (Tsukuba Univ.)
pp. 189 - 196
ISEC2006-66
Development of IH-ZIP: A Data Compression Tool for Information Hiding
Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Koji Nakao (NICT), Tsutomu Matsumoto (Yokohama National Univ.)
pp. 197 - 204
ISEC2006-67
A Proposal on Cancelable Biometrics for Image Matching based biometrics
Shinji Hirata, Kenta Takahashi, Masahiro Mimura (Hitachi)
pp. 205 - 210
ISEC2006-68
Comparison of revocation problem between ID based encryption and biometric authentication schemes
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ)
pp. 211 - 215
ISEC2006-69
A Design of DRM systems with hardware-based authentication
Hiromi Fukaya (Pastel Co.), Kouichi Sakurai (Kyushu Univ.)
pp. 217 - 222
ISEC2006-70
A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
pp. 223 - 228
ISEC2006-71
Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security
Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
pp. 229 - 236
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.