IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 109, Number 114

Social Implications of Technology and Information Ethics

Workshop Date : 2009-07-02 - 2009-07-03 / Issue Date : 2009-06-25

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2009-7
Simplified Proof for Small Secret Key Attack on RSA and its Extension
Noboru Kunihiro (Univ. of Tokyo), Kaoru Kurosawa (Ibaragi Univ.)
pp. 1 - 6

SITE2009-8
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack (Part2)
Takeshi Nasako, Yasuyuki Murakami (OECU), Masao Kasahara (OGU)
pp. 7 - 13

SITE2009-9
Relationship between Weight of Plaintext and Successful Attacks in Knapsack Cryptosystems
Tatsuo Douzono, Takeshi Nasako, Yasuyuki Murakami (Osaka Electoro-Communication Univ.)
pp. 15 - 19

SITE2009-10
Proposal on Password Authentication Against Iterative Shoulder Surfing
Ryota Kitabayashi, Hiroyuki Inaba (KIT)
pp. 21 - 26

SITE2009-11
Problems between Disclosure of Technical Information and Restriction of Intellectual Property Protection
Haruo Kodama (OUJ/SOKENDAI)
pp. 27 - 32

SITE2009-12
An analysis of Copyright Laws Through Informatics
Naonori Kato (SOKENDAI)
pp. 33 - 38

SITE2009-13
Current situation and issues of health information exchange -- the national database of health insurance claim and health check information --
Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD)
pp. 39 - 44

SITE2009-14
About the Security Model built in the Search Engine
Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU)
pp. 45 - 49

SITE2009-15
Logical Structure of the Cloud Which Projects Various Values onto Oneself -- From the Aspect of the Agent of Self-Referred Social Systems --
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.)
pp. 51 - 56

SITE2009-16
A Model for JSL Emergency Message System for the Deaf
Kazuo Kamata (Utsunomiya Univ.), Shunichi Yonemura (NTT)
pp. 57 - 64

SITE2009-17
Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors
Yumi Sakemi, Kazushi Nishii, Tetsuya Izuta, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 125 - 129

SITE2009-18
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Yusuke Naito (Mitsubishi Electric), Lei Wang, Kazuo Ohta (Univ. of Electro-Comm.)
pp. 131 - 138

SITE2009-19
Proposal of Integrated MPKC: PPS -- STS Enhanced by Perturbed Piece In Hand Method --
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU)
pp. 139 - 146

SITE2009-20
On the strength evaluation of Lesamnta against differential cryptanalysis
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 147 - 152

SITE2009-21
A Study on Stream-Cipher-Based Hash Functions
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs)
pp. 153 - 159

SITE2009-22
Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness
Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST)
pp. 161 - 168

SITE2009-23
Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks
Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.)
pp. 169 - 174

SITE2009-24
Investigation about Malware Distribution to Websites
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT)
pp. 175 - 180

SITE2009-25
A Study on the Log Getting Process for Detection of the Remaining Files Copied from Removable Storage Medium
Chikako Ishizawa, Makoto Nishida (Akita Univ.)
pp. 181 - 187

SITE2009-26
Risk Assessment Method for Networked Systems using CVSS
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology)
pp. 189 - 194

SITE2009-27
Clone Resistance Evaluation Based on Attacker's Resources in Artifact-metric Systems
Masashi Une (BOJ)
pp. 195 - 202

SITE2009-28
Development of FMC Authentication Technique with Mobile Terminal
Katsuyuki Umezawa, Takatoshi Kato (Hitachi), Satoru Tezuka (Tech. of Tokyo Univ.)
pp. 203 - 208

SITE2009-29
Certification Seal -- Random Pattern of Polarized Film Pieces --
Yoshihiro Tsukamura
pp. 209 - 211

SITE2009-30
Software Protection Mechanism Using Tamper-Proof Module
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.)
pp. 213 - 219

SITE2009-31
A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying
Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 221 - 228

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan