IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 114

Social Implications of Technology and Information Ethics

Workshop Date : 2010-07-01 - 2010-07-02 / Issue Date : 2010-06-24

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2010-6
Correlation Problems between Security Protection and Intellectual Property Protection of Information
Haruo Kodama (Open Univ. of Japan/SOKENDAI)
pp. 1 - 6

SITE2010-7
A Study on Log Analysis Based on Tendency of IDS Alert Events
Tsuyoshi Toda, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 7 - 12

SITE2010-8
Limit of "Control Theory" of Privacy -- Presentation of Identity and Context Dependency of Privacy --
Takushi Otani (Kibi International Univ.)
pp. 13 - 19

SITE2010-9
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 21 - 25

SITE2010-10
Protection Mode Against Cache Attack (HYRAL)
Kouzou Hirata (LIS)
pp. 27 - 33

SITE2010-11
An Optimization of AES Decryption Using the Bitslice Technique
Fumihiko Sano (Toshiba Solutions Corporation)
pp. 35 - 39

SITE2010-12
An Artifact-Metric System which Extracts Values Unique to Individual Paper
Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 41 - 46

SITE2010-13
Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol
Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.)
pp. 47 - 53

SITE2010-14
Evaluating Destination Hosts of Malware Based on Search Engine Results
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT)
pp. 75 - 80

SITE2010-15
Image Authentication with Access Control Based on Reversible Data Hiding
Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.)
pp. 81 - 86

SITE2010-16
Building Ontology of Cybersecurity Operational Information
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW)
pp. 87 - 91

SITE2010-17
Access policy management architecture for virtual server consolidation systems
Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC)
pp. 93 - 100

SITE2010-18
On the use and misuse of E-mail sender authentication mechanisms
Tatsuya Mori (NTT)
pp. 101 - 106

SITE2010-19
Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University)
pp. 107 - 112

SITE2010-20
Improvement of Rainbow MPKC Signature system
Masahito Gotaishi (Chuo Univ.)
pp. 113 - 117

SITE2010-21
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions
Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.)
pp. 119 - 122

SITE2010-22
On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST)
pp. 123 - 132

SITE2010-23
Implementation of Key Generation Center for Identity-based Encryption
Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba)
pp. 133 - 139

SITE2010-24
A note for secure information sharing systems
Gembu Morohashi, Akira Nagai (NTT Corp.)
pp. 141 - 145

SITE2010-25
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.)
pp. 147 - 152

SITE2010-26
Attribute-based encryption with arbitrary number of authorities
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC)
pp. 153 - 158

SITE2010-27
An Efficient Broadcast Encryption with Personalized Messages
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK)
pp. 159 - 166

SITE2010-28
Efficient Augmented PAK Protocols
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 167 - 172

SITE2010-29
On the examination on speeding Cheon's algorithm
Masaya Yasuda, Tetsuya Izu, Masahiko Takenaka (Fujitsu Lab.)
pp. 173 - 180

SITE2010-30
On the proportion of the curves constructed by Brezing-Weng in the pairing-friendly curves
Takanori Yasuda (Kyushu Univ.), Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (Fujitsu Labo.)
pp. 181 - 187

SITE2010-31
DLP with Auxiliary Input and the Security of Cryptographic Protocols
Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,)
pp. 189 - 194

SITE2010-32
Cost Estimates of CNTW Attack against EMV Signatures
Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 195 - 201

SITE2010-33
On the Relationship between Recognizing Languages and Computing Functions
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya (Tohoku Univ.)
pp. 202 - 208

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan