IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 110, Number 281

Information Security

Workshop Date : 2010-11-17 - 2010-11-18 / Issue Date : 2010-11-10

[PREV] [NEXT]

[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2010-50
Proposal and Verification on Universal Profiler System Based on Basic Desires
Takayuki Akiyama, Yaemi Teramoto, Kiyohiro Obara, Masaaki Tanizaki (Hitachi)
pp. 1 - 8

ISEC2010-51
Gait Monitoring with a Cellular Phone
Tatsuaki Ito, Tatsuya Ishihara, Yukihiro Nakamura, Shinyo Muto (NTT), Masanobu Abe (Okayama Univ.)
pp. 9 - 14

ISEC2010-52
Demonstrative experiment of personal health record system using public account for personal information management
Hiroyuki Suzuki (Tokyo Inst. of Tech.), Kouichi Kita (HISPRO), Joong Sun Lee, Naoko Taira, Takashi Obi, Masahiro Yamaguchi, Masuyoshi Yachida, Hiroshige Yamamoto, Kazuhisa Uryu, Takahiro Yokoyama, Nagaaki Ohyama (Tokyo Inst. of Tech.), Fumito Tsuchiya (Tokyo Med. & Dent. Univ. Hosp. Faculty of Dentistry), Masataka Inokuchi (Minamimachida Hosp.)
pp. 15 - 21

ISEC2010-53
Study on the requirement of the medication history information management
Naoko Taira, Joong Sun Lee, Hiroyuki Suzuki (Tokyo Inst. technology), Kouichi Kita (HISPRO), Fumito Tsuchiya (Tokyo Med. & Den.Univ.), Takashi Obi, Takahiro Yokoyama, Nagaaki Ohyama (Tokyo Inst. technology)
pp. 23 - 29

ISEC2010-54
Similarity Hashing resistant to file modifications
Susumu Serita, Yasuhiro Fujii, Satoshi Kai, Takao Murakami, Yoshinori Honda (Hitachi, Ltd.)
pp. 31 - 36

ISEC2010-55
A Visible-Light Artifact-Metric System which Extracts Values Unique to Individual Paper
Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 37 - 43

ISEC2010-56
Improved Broadcast Encryption by Secret Sharing Scheme
Kyota Miwa, Wataru Kishimoto (Chiba Univ.)
pp. 45 - 50

ISEC2010-57
Study of Tolerability in Defacing of Y-00 Quantum Stream Cipher
Takehisa Iwakoshi, Osamu Hirota (Tamagawa Univ.)
pp. 51 - 55

ISEC2010-58
Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system
Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.)
pp. 57 - 64

ISEC2010-59
Sample Investigation and the Consideration to Compromising Cryptosystems in SSL
Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT)
pp. 65 - 72

ISEC2010-60
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols -- A Countermeasure against Compromising of Cryptosystems in SSL --
Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT)
pp. 73 - 80

ISEC2010-61
A Method for Protecting User Passwords at Agent Server Node
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo)
pp. 81 - 86

ISEC2010-62
Evaluation of information provision methods for website audience on a life log collection system
Iori Osada, Takashi Yoshino (Wakayama Univ.)
pp. 87 - 94

ISEC2010-63
Recording receipts for consumer-oriented lifelog services
Seiki Tokunaga, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.)
pp. 95 - 100

ISEC2010-64
Implementing Database and Web Services for Life-Log Mashup APIs
Akira Shimojo, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.)
pp. 101 - 106

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan