Thu, Jul 18 AM 10:15 - 11:55 |
(1) |
10:15-10:40 |
|
(2) ISEC |
10:40-11:05 |
Study of CAPTCHA suitable for smartphones ISEC2013-11 SITE2013-6 ICSS2013-16 EMM2013-13 |
Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.) |
(3) ISEC |
11:05-11:30 |
Proposal of the Support System at the Time of Introduction of User Applications in Android OS ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 |
Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.) |
(4) ISEC |
11:30-11:55 |
Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform ISEC2013-13 SITE2013-8 ICSS2013-18 EMM2013-15 |
Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
|
11:55-12:55 |
Break ( 60 min. ) |
Thu, Jul 18 PM 12:55 - 14:35 |
(5) SITE |
12:55-13:20 |
Examination of IDS Log Analysis using Discrete Wavelet Transform ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16 |
Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(6) SITE |
13:20-13:45 |
Engineering Ethics Education with world cafe discussion ISEC2013-15 SITE2013-10 ICSS2013-20 EMM2013-17 |
Michio Nakanishi (Osaka Inst. of Tech.) |
(7) SITE |
13:45-14:10 |
Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools ISEC2013-16 SITE2013-11 ICSS2013-21 EMM2013-18 |
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.) |
(8) SITE |
14:10-14:35 |
The Concept of "Group Privacy" in the Information Age:
-- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? -- ISEC2013-17 SITE2013-12 ICSS2013-22 EMM2013-19 |
Takushi Otani (Kibi International Univ.) |
|
14:35-14:50 |
Break ( 15 min. ) |
Thu, Jul 18 PM 14:50 - 16:30 |
(9) ISEC |
14:50-15:15 |
Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability ISEC2013-18 SITE2013-13 ICSS2013-23 EMM2013-20 |
Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC) |
(10) ISEC |
15:15-15:40 |
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21 |
Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST) |
(11) ISEC |
15:40-16:05 |
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 |
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) |
(12) ISEC |
16:05-16:30 |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 -- ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) |
Thu, Jul 18 AM 10:15 - 11:55 |
(13) |
10:15-10:40 |
|
(14) |
10:40-11:05 |
|
(15) |
11:05-11:30 |
|
(16) |
11:30-11:55 |
|
|
11:55-12:55 |
Break ( 60 min. ) |
Thu, Jul 18 PM 12:55 - 14:10 |
(17) |
12:55-13:20 |
|
(18) |
13:20-13:45 |
|
(19) |
13:45-14:10 |
|
|
14:10-14:25 |
Break ( 15 min. ) |
Thu, Jul 18 PM 14:50 - 16:30 |
(20) |
14:50-15:15 |
|
(21) |
15:15-15:40 |
|
(22) |
15:40-16:05 |
|
(23) |
16:05-16:30 |
|
Thu, Jul 18 AM 09:10 - 10:00 |
(24) EMM |
09:10-09:35 |
An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients ISEC2013-22 SITE2013-17 ICSS2013-27 EMM2013-24 |
Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) |
(25) EMM |
09:35-10:00 |
Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25 |
Toshio Modegi (DNP) |
|
10:00-10:15 |
Break ( 15 min. ) |
Thu, Jul 18 AM 10:15 - 11:55 |
(26) EMM |
10:15-10:40 |
Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface ISEC2013-24 SITE2013-19 ICSS2013-29 EMM2013-26 |
Tomoko Kajiyama (Aoyama Gakuin Univ.) |
(27) EMM |
10:40-11:55 |
[Panel Discussion]
Education for IT Engineers from the Viewpoint of Information Security ISEC2013-25 SITE2013-20 ICSS2013-30 EMM2013-27 |
Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi |
|
11:55-12:55 |
Break ( 60 min. ) |
Thu, Jul 18 PM 12:55 - 14:35 |
(28) EMM |
12:55-13:20 |
A Hierarchical Access Control Method by the Secret Sharing Scheme ISEC2013-26 SITE2013-21 ICSS2013-31 EMM2013-28 |
Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(29) EMM |
13:20-13:45 |
A Content Protection Method Using Secret Sharing and Attribute-Based Encryption ISEC2013-27 SITE2013-22 ICSS2013-32 EMM2013-29 |
Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(30) EMM |
13:45-14:10 |
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30 |
Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) |
(31) EMM |
14:10-14:35 |
Study of an artificial fiber pattern in Augmented Reality system ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 |
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) |
|
14:35-14:50 |
Break ( 15 min. ) |
Thu, Jul 18 PM 14:50 - 16:30 |
(32) EMM |
14:50-15:15 |
Image Restoration Using Embedding of Similar Region Information ISEC2013-30 SITE2013-25 ICSS2013-35 EMM2013-32 |
Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.) |
(33) EMM |
15:15-15:40 |
On a Data-Hiding Technique Based on Complete Complementary Codes ISEC2013-31 SITE2013-26 ICSS2013-36 EMM2013-33 |
Ryusuke Mayuzumi (Univ. of Electro-Comm.), Tetsuya Kojima (Tokyo National College of Tech.) |
(34) EMM |
15:40-16:05 |
Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34 |
Shengbei Wang, Masashi Unoki (JAIST) |
(35) EMM |
16:05-16:30 |
An Approach to Amplitude Scaling Partial Encryption for Compressed Audio ISEC2013-33 SITE2013-28 ICSS2013-38 EMM2013-35 |
Twe Ta Oo, Takao Onoye (Osaka Univ.), Kilho Shin (Univ. of Hyogo) |
Thu, Jul 18 PM 16:40 - 17:40 |
(36) ISEC |
16:40-17:40 |
[Invited Talk]
Research on Information and Physical Security Technologies for Embedded Systems ISEC2013-34 SITE2013-29 ICSS2013-39 EMM2013-36 |
Tsutomu Matsumoto (Yokohama National Univ.) |
Fri, Jul 19 AM 09:10 - 10:00 |
(37) ISEC |
09:10-09:35 |
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37 |
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) |
(38) ISEC |
09:35-10:00 |
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38 |
Daisuke Moriyama (NICT) |
|
10:00-10:15 |
Break ( 15 min. ) |
Fri, Jul 19 AM 10:15 - 11:55 |
(39) ISEC |
10:15-10:40 |
A Knapsack Cryptosystem Using Super-Decreasing Sequence ISEC2013-37 SITE2013-32 ICSS2013-42 EMM2013-39 |
Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.) |
(40) ISEC |
10:40-11:05 |
An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem ISEC2013-38 SITE2013-33 ICSS2013-43 EMM2013-40 |
Yasuyuki Murakami, Shinsuke Hamasho (Osaka Electro-Comm. Univ.) |
(41) ISEC |
11:05-11:30 |
Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further -- ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41 |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(42) ISEC |
11:30-11:55 |
Cryptosystems for Social Organizations Managed by Receiving Administrator
-- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations -- ISEC2013-40 SITE2013-35 ICSS2013-45 EMM2013-42 |
Shigeo Tsujii, Hiroshi Yamaguchi, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.) |
|
11:55-12:55 |
Break ( 60 min. ) |
Fri, Jul 19 PM 12:55 - 14:35 |
(43) ISEC |
12:55-13:20 |
On Identification Methods for Visible-Light Paper Artifact-Metric Systems ISEC2013-41 SITE2013-36 ICSS2013-46 EMM2013-43 |
Ryosuke Suzuki, Tsutomu Matsumoto (Yokohama National Univ.) |
(44) ISEC |
13:20-13:45 |
A proposal of key binding technology using lattice masking ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44 |
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.) |
(45) |
13:45-14:10 |
|
(46) |
14:10-14:35 |
|
|
14:35-14:50 |
Break ( 15 min. ) |
Fri, Jul 19 PM 14:50 - 16:30 |
(47) ISEC |
14:50-15:15 |
TLS with Pre-shared Key Extended by Identity-based Encryption ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45 |
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.) |
(48) ISEC |
15:15-15:40 |
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46 |
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) |
(49) ISEC |
15:40-16:05 |
On Side-Channel Information Using Signal Toggles in AES Circuit ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47 |
Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC) |
(50) ISEC |
16:05-16:30 |
Recovering RSA Secret Keys from Observed Analog Data (I) ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48 |
Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo) |
Fri, Jul 19 AM 09:10 - 10:00 |
(51) |
09:10-09:35 |
|
(52) |
09:35-10:00 |
|
|
10:00-10:15 |
Break ( 15 min. ) |
Fri, Jul 19 AM 10:15 - 11:55 |
(53) |
10:15-10:40 |
|
(54) |
10:40-11:05 |
|
(55) ICSS |
11:05-11:30 |
Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities ISEC2013-47 SITE2013-42 ICSS2013-52 EMM2013-49 |
Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.) |
(56) ICSS |
11:30-11:55 |
Network Observation and Analysis Report on nicter
-- Malware infection to embedded systems -- ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50 |
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
|
11:55-12:55 |
Break ( 60 min. ) |
Fri, Jul 19 PM 12:55 - 14:35 |
(57) |
12:55-13:20 |
|
(58) ISEC |
13:20-13:45 |
Generalization of Noises in Differential Privacy ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51 |
Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT) |
(59) ISEC |
13:45-14:10 |
Attacks on Authenticated Encryption Based on E-MACs ISEC2013-50 SITE2013-45 ICSS2013-55 EMM2013-52 |
Hayato Kobayashi, Hiraku Morita, Tetsu Iwata (Nagoya Univ.) |
(60) |
14:10-14:35 |
|
|
14:35-14:50 |
Break ( 15 min. ) |
Fri, Jul 19 PM 14:50 - 16:05 |
(61) |
14:50-15:15 |
|
(62) |
15:15-15:40 |
|
(63) |
15:40-16:05 |
|