IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 109, Number 271

Information Security

Workshop Date : 2009-11-12 - 2009-11-13 / Issue Date : 2009-11-05

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2009-51
Constructing New Differential Path and Algebraic Cryptanalysis for Full-SHA-1
Makoto Sugita (NTT/AIST), Mitsuru Kawazoe (Osaka Prefecture Univ.), Hideki Imai (AIST/ Chuo Univ.)
pp. 1 - 8

ISEC2009-52
A Hierarchical Multisignature Based on the Gap Diffie-Hellman Signature Scheme
Masaki Inamura, Ryu Watanabe, Toshiaki Tanaka (KDDI R&D Labs.)
pp. 9 - 14

ISEC2009-53
A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings
Hiroki Fujii, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)
pp. 15 - 22

ISEC2009-54
A Construction of A New Class of Non-Linear Product-Sum-Type Public-Key Cryptosystem
Masao Kasahara (Osaka Gakuin Univ.)
pp. 23 - 27

ISEC2009-55
A Looking Back Service for Power Consumption Logs in Home Network System
Masayuki Fukuda, Hideharu Seto, Hiroyuki Sakamoto, Hiroshi Igaki, Masahide Nakamura (Kobe Univ.)
pp. 29 - 34

ISEC2009-56
Considering Common Data Model to Mash-up Life Logs
Masahide Nakamura, Akira Shimojo, Hiroshi Igaki (Kobe Univ.)
pp. 35 - 40

ISEC2009-57
Possibility of the Life Log Service in the House
Kazuko Katase (The Inst. for Future Tech.)
pp. 41 - 46

ISEC2009-58
Consciousness Survey of Personal Health Information Management based on the e-P.O.Box
Naoko Taira, Joong Sun Lee, Hiroyuki Suzuki, Kouichi Kita, Takashi Obi, Masuyoshi Yachida, Yuuji Homma, Hiroshige Yamamoto, Kazuhisa Uryu, Masahiro Yamaguchi, Nagaaki Ohyama (Tokyo Inst. of Tech)
pp. 47 - 53

ISEC2009-59
Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.)
pp. 55 - 60

ISEC2009-60
Matsumoto-Imai Signature by Dual Perturbation -- Two new Modifiers --
Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.)
pp. 61 - 68

ISEC2009-61
Anonymous Query Language Retrieval
Hiroshi Yamaguchi, Shigeo Tsujii (Chuo Univ)
pp. 69 - 74

ISEC2009-62
Javas Crypto
Satoshi Oda, Gembu Morohashi (NTT Corp.)
pp. 75 - 80

ISEC2009-63
Modeling and Verification of Serendipitous Recommender System
Takayuki Akiyama, Kiyohiro Obara, Masaaki Tanizaki (Hitachi, Ltd.,)
pp. 81 - 87

ISEC2009-64
Identifying Purchase Behavior on Web Access Log
Hisaharu Ishii, Yusuke Ichikawa, Hiroyuki Sato, Toru Kobayashi (NTT Corp.)
pp. 89 - 94

ISEC2009-65
State Recovery of RC4 PRGA by Using Nonzero Bit Differences
Mitsuki Ajiro, Atsuko Miyaji (JAIST)
pp. 95 - 100

ISEC2009-66
Efficient Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST)
pp. 101 - 106

ISEC2009-67
Speeding Up of a Message Falsification Attack on WPA-TKIP
Toshihiro Ohigashi (Hiroshima Univ.), Yuki Ozawa, Masakatu Morii (Kobe Univ.)
pp. 107 - 112

ISEC2009-68
Secure Biometric Authentication Using 2-DNF Homomorphic Encryption
Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda (Mitsubishi Electric)
pp. 113 - 120

ISEC2009-69
A Study of the user modeling method for personal life assistance service
Koji Ito, Kyoji Iiduka, Takahiko Murayama, Toru Kobayashi (NTT)
pp. 121 - 128

ISEC2009-70
Development of User Recognition System using Lifelogs
Hirohisa Tezuka, Yukihiro Nakamura, Manabu Motegi, Shin-ichiro Eitoku, Shunichi Seko, Masaaki Nishino, Shin-yo Muto, Masanobu Abe (NTT Corp.)
pp. 129 - 133

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan