|
Chair |
|
Toshiaki Tanaka (KDDI Labs.) |
Vice Chair |
|
Koichi Sakurai (Kyushu Univ.), Yukiyasu Tsunoo (NEC) |
Secretary |
|
Tetsuya Izu (Fujitsu Labs.), Tetsu Iwata (Nagoya Univ.) |
Assistant |
|
Goichiro Hanaoka (AIST), Yu Miyake (KDDI Labs.) |
|
Conference Date |
Wed, Dec 11, 2013 13:00 - 17:40 |
Topics |
|
Conference Place |
|
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Wed, Dec 11 PM 13:00 - 17:40 |
(1) |
13:00-13:25 |
Presentations of a general augmentation scheme, K(V)Scheme, for strengthening several classes of PKC and a new class of system oriented PKC, K(I)SOPKC ISEC2013-73 |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(2) |
13:25-13:50 |
A novel proposal of $q$-SVD domain for blind watermarking ISEC2013-74 |
Ta Minh Thanh (Tokyo Inst. of Tech.), Ta Minh Tam (VSTV) |
(3) |
13:50-14:15 |
Possibility of the Address Overlap Dos Attack in Live Migration ISEC2013-75 |
Kensuke Kasahara, Satoshi Ono (Kogakuin Univ.) |
(4) |
14:15-14:40 |
Difference of the detection rate of the template in the modified non-overlapping template matching test ISEC2013-76 |
Yuichi Takeda (Kanagawa Inst. of Tech.), Mituaki Huzii, Toshinari Kamakura, Norio Watanabe (Chuo Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
(5) |
14:55-15:20 |
The Process by which Faults are Injected on Smart Cards Attacked by an Electromagnetic Irradiation Experiment ISEC2013-77 |
Yuu Tsuchiya, Hitoshi Ono, Tsutomu Matsumoto (Yokohama National Univ.) |
(6) |
15:20-15:45 |
Education for Practical Hardware Security Based on Information Security Education Program ISEC2013-78 |
Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) |
(7) |
15:45-16:10 |
Another Vulnerability in a Cancelable Biometrics Authentication Scheme ISEC2013-79 |
Tetsuya Izu, Yumi Sakemi, Masahiko Takenaka, Naoya Torii (Fijitsu Labs.) |
|
16:10-16:25 |
Break ( 15 min. ) |
(8) |
16:25-16:50 |
A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2) ISEC2013-80 |
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) |
(9) |
16:50-17:15 |
A Study on An Analysis Prevention Scheme for Embedded System Firmware ISEC2013-81 |
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) |
(10) |
17:15-17:40 |
Report on PQCrypto2013 ISEC2013-82 |
Takanori Yasuda (ISIT) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-: ic-c (to ISEC secretaries) |
Last modified: 2013-11-21 12:37:46
|