Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
ISEC2008-16
A Note on the Security of KMN PKC and Presentation of Challenge Problems
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.)
pp. 1 - 8
ISEC2008-17
On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 --
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.)
pp. 9 - 14
ISEC2008-18
Design Policy of MPKC based on Piece in Hand Concept
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.)
pp. 15 - 22
ISEC2008-19
Knapsack Cryptosystem on Elliptic Curves of Trace Tow
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.)
pp. 23 - 26
ISEC2008-20
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA)
pp. 27 - 36
ISEC2008-21
An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II)
Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.)
pp. 37 - 44
ISEC2008-22
Efficiency of a Redactable Signature with Tree Construction
Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.)
pp. 45 - 50
ISEC2008-23
A System against Leakage though Paper Documents in Multi-Vendor Environment
Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI)
pp. 51 - 58
ISEC2008-24
Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone
Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)
pp. 59 - 66
ISEC2008-25
Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents
Haruo Kodama (NIME)
pp. 67 - 72
ISEC2008-26
Basic Study on Designing Navigation Systems for the Blind
Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal)
pp. 73 - 80
ISEC2008-27
A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.)
pp. 81 - 88
ISEC2008-28
Study on Reputation Systems for Trusty Information Network
Noriaki Yoshikai (Niohn Univ.)
pp. 89 - 96
ISEC2008-29
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC)
pp. 97 - 102
ISEC2008-30
Study of method for expressing context
Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS)
pp. 103 - 108
ISEC2008-31
Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
pp. 109 - 114
ISEC2008-32
Information Leakage Prevention Function of host based for P2P File Exchange Environment
Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
pp. 115 - 122
ISEC2008-33
Study of Database for information sharing of P2P File Exchange Environment
Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi)
pp. 123 - 128
ISEC2008-34
An enhancement of VMM snapshot utility for detcting code injection
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT)
pp. 129 - 134
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.