Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
ISEC2007-16
The study for the position authentication and the security of location information
Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC)
pp. 1 - 6
ISEC2007-17
A preference transmission method with information security database systems on the Internet
Yasuyoshi Okada, Naoshi Sato (I.I.S.)
pp. 7 - 14
ISEC2007-18
On the Security and Complexity of Shared Attribute Certification Systems
Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.)
pp. 15 - 22
ISEC2007-19
User Authentication Method Based On Statistical Analysis of Keystrokes
Yoshihiro Kataoka, Takao Miyamoto, Shigeki Aoki, Masao Izumi, Kunio Fukunaga (Osaka Pref Univ)
pp. 23 - 30
ISEC2007-20
A random number generation method with a variable degree of safety and its analysis
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications)
pp. 31 - 36
ISEC2007-21
Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes
Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC)
pp. 37 - 44
ISEC2007-22
Consideration on effectiveness of CC V3.1 Function Specific Assurance ST
Masue Shiba, Naokazu Sasaki, Takahisa Ishida, Hiroshi Iguchi, Tsuyoshi Shimada (Toshiba Solusions Corp.)
pp. 45 - 50
ISEC2007-23
Japan-U.S. comparisons of information security survey
Kentarou Yamaguchi, Katsuya Uchida (IISEC)
pp. 51 - 57
ISEC2007-24
Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand
Seiichiro Yatake, Katsuya Uchida (IISEC)
pp. 59 - 64
ISEC2007-25
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels"
Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS)
pp. 65 - 70
ISEC2007-26
Technological and Social Studies for Emergency Message Services
Shunichi Yonemura (NTT), Kazuo Kamata (Utsunomiya Univ.), Masakatsu Aoki (NTT), Akinori Yonekura (Utsunomiya Univ.)
pp. 71 - 78
ISEC2007-27
Study on Information Transparency and Trust from the view point of Web innovation
Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.)
pp. 79 - 86
ISEC2007-28
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow.
Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT)
pp. 87 - 94
ISEC2007-29
Beginning of Broadcast over the Internet in Japan
Masataka Ohta (TIT)
pp. 95 - 98
ISEC2007-30
A Mutual Authentication System for Web Server Access by Using Cellar Phone
Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.)
pp. 99 - 105
ISEC2007-31
A Method to Limit Appriciation of Content
Takehisa Kato (Toshiba Solutions Corp.)
pp. 107 - 112
ISEC2007-32
A method of excluding disapproval connection on authentication network
Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT)
pp. 113 - 118
ISEC2007-33
An authentication network system using virtual authenticatior module
Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT)
pp. 119 - 124
ISEC2007-34
Human communication security to adapt to ever-expanding media environment
Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC)
pp. 125 - 131
ISEC2007-35
Privacy-Preserving Assocaition Rules Mining Scheme Revisited
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.)
pp. 133 - 138
ISEC2007-36
Group Key Based Revocation Schemes with Shorter Message Header
Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu)
pp. 139 - 143
ISEC2007-37
On Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.)
pp. 145 - 151
ISEC2007-38
A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ)
pp. 153 - 158
ISEC2007-39
On the Standardization of Information Security
-- Report on the Moscow Meeting in May, 2007 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA)
pp. 159 - 169
ISEC2007-40
A composition method of network-independent dynamic authentication VLAN
Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT)
pp. 171 - 176
ISEC2007-41
Evaluation of a library against injection attacks
Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC)
pp. 177 - 184
ISEC2007-42
A Proposal of User Authentication using Convergence Reflex and Eyeball Shape
Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 185 - 191
ISEC2007-43
A study on information content of biometrics
Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.)
pp. 193 - 200
ISEC2007-44
Advantage of User Authentication Using Unclear Images
-- Automatic Generation of Decoy Images --
Takumi Yamamoto (Shizuoka Univ.), Atsushi Harada (Mitsubishi Electric), Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
pp. 201 - 208
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.