IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 107, Number 140

Information Security

Workshop Date : 2007-07-19 / Issue Date : 2007-07-12

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2007-16
The study for the position authentication and the security of location information
Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC)
pp. 1 - 6

ISEC2007-17
A preference transmission method with information security database systems on the Internet
Yasuyoshi Okada, Naoshi Sato (I.I.S.)
pp. 7 - 14

ISEC2007-18
On the Security and Complexity of Shared Attribute Certification Systems
Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.)
pp. 15 - 22

ISEC2007-19
User Authentication Method Based On Statistical Analysis of Keystrokes
Yoshihiro Kataoka, Takao Miyamoto, Shigeki Aoki, Masao Izumi, Kunio Fukunaga (Osaka Pref Univ)
pp. 23 - 30

ISEC2007-20
A random number generation method with a variable degree of safety and its analysis
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications)
pp. 31 - 36

ISEC2007-21
Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes
Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC)
pp. 37 - 44

ISEC2007-22
Consideration on effectiveness of CC V3.1 Function Specific Assurance ST
Masue Shiba, Naokazu Sasaki, Takahisa Ishida, Hiroshi Iguchi, Tsuyoshi Shimada (Toshiba Solusions Corp.)
pp. 45 - 50

ISEC2007-23
Japan-U.S. comparisons of information security survey
Kentarou Yamaguchi, Katsuya Uchida (IISEC)
pp. 51 - 57

ISEC2007-24
Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand
Seiichiro Yatake, Katsuya Uchida (IISEC)
pp. 59 - 64

ISEC2007-25
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels"
Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS)
pp. 65 - 70

ISEC2007-26
Technological and Social Studies for Emergency Message Services
Shunichi Yonemura (NTT), Kazuo Kamata (Utsunomiya Univ.), Masakatsu Aoki (NTT), Akinori Yonekura (Utsunomiya Univ.)
pp. 71 - 78

ISEC2007-27
Study on Information Transparency and Trust from the view point of Web innovation
Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.)
pp. 79 - 86

ISEC2007-28
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow.
Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT)
pp. 87 - 94

ISEC2007-29
Beginning of Broadcast over the Internet in Japan
Masataka Ohta (TIT)
pp. 95 - 98

ISEC2007-30
A Mutual Authentication System for Web Server Access by Using Cellar Phone
Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.)
pp. 99 - 105

ISEC2007-31
A Method to Limit Appriciation of Content
Takehisa Kato (Toshiba Solutions Corp.)
pp. 107 - 112

ISEC2007-32
A method of excluding disapproval connection on authentication network
Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT)
pp. 113 - 118

ISEC2007-33
An authentication network system using virtual authenticatior module
Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT)
pp. 119 - 124

ISEC2007-34
Human communication security to adapt to ever-expanding media environment
Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC)
pp. 125 - 131

ISEC2007-35
Privacy-Preserving Assocaition Rules Mining Scheme Revisited
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.)
pp. 133 - 138

ISEC2007-36
Group Key Based Revocation Schemes with Shorter Message Header
Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu)
pp. 139 - 143

ISEC2007-37
On Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.)
pp. 145 - 151

ISEC2007-38
A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ)
pp. 153 - 158

ISEC2007-39
On the Standardization of Information Security -- Report on the Moscow Meeting in May, 2007 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA)
pp. 159 - 169

ISEC2007-40
A composition method of network-independent dynamic authentication VLAN
Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT)
pp. 171 - 176

ISEC2007-41
Evaluation of a library against injection attacks
Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC)
pp. 177 - 184

ISEC2007-42
A Proposal of User Authentication using Convergence Reflex and Eyeball Shape
Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 185 - 191

ISEC2007-43
A study on information content of biometrics
Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.)
pp. 193 - 200

ISEC2007-44
Advantage of User Authentication Using Unclear Images -- Automatic Generation of Decoy Images --
Takumi Yamamoto (Shizuoka Univ.), Atsushi Harada (Mitsubishi Electric), Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 201 - 208

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan