Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2008-12-17 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Measure of failure for the company infrastructure Koichiro Ozasa, Satoshi Ono (Kogakuin Univ.) ISEC2008-89 |
Today ,Dependence degree to IT infrastructure of a company rises, and I consider the reason why fail over of obstacle me... [more] |
ISEC2008-89 pp.1-5 |
ISEC |
2008-12-17 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Web Server Software Struture for Scalability Haruki Mori, Satoshi Ono (Kogakuin Univ.) ISEC2008-90 |
[more] |
ISEC2008-90 pp.7-9 |
ISEC |
2008-12-17 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Access management method for Least Privilege implementation By the identity federation cross-organizations Takahito Motojima, Satoshi Ono (kogakuin univ) ISEC2008-91 |
As for the business infomation system, service construction is performed again between the organizations which used SaaS... [more] |
ISEC2008-91 pp.11-14 |
ISEC |
2008-12-17 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Negotiate the Trust built in The Internet Takashi Hosokawa, Satoshi Ono (Kogakuin Univ.) ISEC2008-92 |
[more] |
ISEC2008-92 pp.15-18 |
ISEC |
2008-12-17 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Self-construction of Home Domain by Using Entry Device List Sho Ikeyama, Yoshihiro Hori, Yoshiaki Shiraishi, Akira Iwata (NIT) ISEC2008-93 |
As digitalized contents increased, contents protection has become natural. However, usability has been sacrificed compar... [more] |
ISEC2008-93 pp.19-26 |
ISEC |
2008-12-17 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Masquerade Detecting Method Based On the TF-IDF Model Geng Dai, Zhou Jian, Haruhiko Shirai, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ) ISEC2008-94 |
Masquerade is someone who impersonates another user and operates computer system with privileged access. Computer securi... [more] |
ISEC2008-94 pp.27-32 |
ISEC |
2008-12-17 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography Mitsuru Hamada (Tamagawa Univ.) ISEC2008-95 |
[more] |
ISEC2008-95 pp.33-40 |
ISEC |
2008-12-17 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Knapsack Cryptosystem Resisting Wellknown Attacks Kunikatsu Kobayashi (Yamagata Univ,) ISEC2008-96 |
We propose a knapsack cryptosystem resisting well-known attacks which use LLL algorithm and Shamir's algorithm. [more] |
ISEC2008-96 pp.41-44 |
ISEC |
2008-12-17 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Cryptosystems on Algebraic Tori
-- Some Efficient Algorithms for Squaring -- Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) ISEC2008-97 |
To construct a efficient algebraic torus-based public key encryption scheme is one of our goals. An efficient scheme is ... [more] |
ISEC2008-97 pp.45-52 |
ISEC |
2008-12-17 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fast Exponentiation Methods for Cryptosystems on Algebraic Tori Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba) ISEC2008-98 |
[more] |
ISEC2008-98 pp.53-60 |
ISEC |
2008-12-17 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Construction of the experiment environment for the CPA attack Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-99 |
SASEBO(Side-channel Attack Standard Evaluation BOard) was developed with the aim of integrating at establishment of the ... [more] |
ISEC2008-99 pp.61-66 |
ISEC |
2008-12-17 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Power Analysis against a FPGA Implementation of the AES with SubBytes in a memory table Hiroyuki Kawakita, Yusei Nishimoto, Kiyohiko Ishikawa, Hiroyuki Imaizumi (NHK) ISEC2008-100 |
[more] |
ISEC2008-100 pp.67-72 |