IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 115

Information and Communication System Security

Workshop Date : 2010-07-01 - 2010-07-02 / Issue Date : 2010-06-24

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ICSS2010-16
Correlation Problems between Security Protection and Intellectual Property Protection of Information
Haruo Kodama (Open Univ. of Japan/SOKENDAI)
pp. 1 - 6

ICSS2010-17
A Study on Log Analysis Based on Tendency of IDS Alert Events
Tsuyoshi Toda, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 7 - 12

ICSS2010-18
Limit of "Control Theory" of Privacy -- Presentation of Identity and Context Dependency of Privacy --
Takushi Otani (Kibi International Univ.)
pp. 13 - 19

ICSS2010-19
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 21 - 25

ICSS2010-20
Protection Mode Against Cache Attack (HYRAL)
Kouzou Hirata (LIS)
pp. 27 - 33

ICSS2010-21
An Optimization of AES Decryption Using the Bitslice Technique
Fumihiko Sano (Toshiba Solutions Corporation)
pp. 35 - 39

ICSS2010-22
An Artifact-Metric System which Extracts Values Unique to Individual Paper
Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 41 - 46

ICSS2010-23
Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol
Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.)
pp. 47 - 53

ICSS2010-24
Evaluating Destination Hosts of Malware Based on Search Engine Results
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT)
pp. 75 - 80

ICSS2010-25
Image Authentication with Access Control Based on Reversible Data Hiding
Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.)
pp. 81 - 86

ICSS2010-26
Building Ontology of Cybersecurity Operational Information
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW)
pp. 87 - 91

ICSS2010-27
Access policy management architecture for virtual server consolidation systems
Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC)
pp. 93 - 100

ICSS2010-28
On the use and misuse of E-mail sender authentication mechanisms
Tatsuya Mori (NTT)
pp. 101 - 106

ICSS2010-29
Proposal on MPKC Signature Scheme with Check Equations
Shigeo Tsujii, Masahito Gotaishi (Chuo University)
pp. 107 - 112

ICSS2010-30
Improvement of Rainbow MPKC Signature system
Masahito Gotaishi (Chuo Univ.)
pp. 113 - 117

ICSS2010-31
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions
Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.)
pp. 119 - 122

ICSS2010-32
On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST)
pp. 123 - 132

ICSS2010-33
Implementation of Key Generation Center for Identity-based Encryption
Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba)
pp. 133 - 139

ICSS2010-34
A note for secure information sharing systems
Gembu Morohashi, Akira Nagai (NTT Corp.)
pp. 141 - 145

ICSS2010-35
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.)
pp. 147 - 152

ICSS2010-36
Attribute-based encryption with arbitrary number of authorities
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC)
pp. 153 - 158

ICSS2010-37
An Efficient Broadcast Encryption with Personalized Messages
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK)
pp. 159 - 166

ICSS2010-38
Efficient Augmented PAK Protocols
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 167 - 172

ICSS2010-39
On the examination on speeding Cheon's algorithm
Masaya Yasuda, Tetsuya Izu, Masahiko Takenaka (Fujitsu Lab.)
pp. 173 - 180

ICSS2010-40
On the proportion of the curves constructed by Brezing-Weng in the pairing-friendly curves
Takanori Yasuda (Kyushu Univ.), Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (Fujitsu Labo.)
pp. 181 - 187

ICSS2010-41
DLP with Auxiliary Input and the Security of Cryptographic Protocols
Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,)
pp. 189 - 194

ICSS2010-42
Cost Estimates of CNTW Attack against EMV Signatures
Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 195 - 201

ICSS2010-43
On the Relationship between Recognizing Languages and Computing Functions
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya (Tohoku Univ.)
pp. 202 - 208

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan