IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2008)

Search Results: Keywords 'from:2008-12-17 to:2008-12-17'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2008-12-17
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. Measure of failure for the company infrastructure
Koichiro Ozasa, Satoshi Ono (Kogakuin Univ.) ISEC2008-89
Today ,Dependence degree to IT infrastructure of a company rises, and I consider the reason why fail over of obstacle me... [more] ISEC2008-89
pp.1-5
ISEC 2008-12-17
10:45
Tokyo Kikai-Shinko-Kaikan Bldg. Web Server Software Struture for Scalability
Haruki Mori, Satoshi Ono (Kogakuin Univ.) ISEC2008-90
 [more] ISEC2008-90
pp.7-9
ISEC 2008-12-17
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Access management method for Least Privilege implementation By the identity federation cross-organizations
Takahito Motojima, Satoshi Ono (kogakuin univ) ISEC2008-91
As for the business infomation system, service construction is performed again between the organizations which used SaaS... [more] ISEC2008-91
pp.11-14
ISEC 2008-12-17
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. Negotiate the Trust built in The Internet
Takashi Hosokawa, Satoshi Ono (Kogakuin Univ.) ISEC2008-92
 [more] ISEC2008-92
pp.15-18
ISEC 2008-12-17
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Self-construction of Home Domain by Using Entry Device List
Sho Ikeyama, Yoshihiro Hori, Yoshiaki Shiraishi, Akira Iwata (NIT) ISEC2008-93
As digitalized contents increased, contents protection has become natural. However, usability has been sacrificed compar... [more] ISEC2008-93
pp.19-26
ISEC 2008-12-17
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Masquerade Detecting Method Based On the TF-IDF Model
Geng Dai, Zhou Jian, Haruhiko Shirai, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ) ISEC2008-94
Masquerade is someone who impersonates another user and operates computer system with privileged access. Computer securi... [more] ISEC2008-94
pp.27-32
ISEC 2008-12-17
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography
Mitsuru Hamada (Tamagawa Univ.) ISEC2008-95
 [more] ISEC2008-95
pp.33-40
ISEC 2008-12-17
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Knapsack Cryptosystem Resisting Wellknown Attacks
Kunikatsu Kobayashi (Yamagata Univ,) ISEC2008-96
We propose a knapsack cryptosystem resisting well-known attacks which use LLL algorithm and Shamir's algorithm. [more] ISEC2008-96
pp.41-44
ISEC 2008-12-17
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Cryptosystems on Algebraic Tori -- Some Efficient Algorithms for Squaring --
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) ISEC2008-97
To construct a efficient algebraic torus-based public key encryption scheme is one of our goals. An efficient scheme is ... [more] ISEC2008-97
pp.45-52
ISEC 2008-12-17
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Fast Exponentiation Methods for Cryptosystems on Algebraic Tori
Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba) ISEC2008-98
 [more] ISEC2008-98
pp.53-60
ISEC 2008-12-17
15:45
Tokyo Kikai-Shinko-Kaikan Bldg. Construction of the experiment environment for the CPA attack
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) ISEC2008-99
SASEBO(Side-channel Attack Standard Evaluation BOard) was developed with the aim of integrating at establishment of the ... [more] ISEC2008-99
pp.61-66
ISEC 2008-12-17
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Power Analysis against a FPGA Implementation of the AES with SubBytes in a memory table
Hiroyuki Kawakita, Yusei Nishimoto, Kiyohiko Ishikawa, Hiroyuki Imaizumi (NHK) ISEC2008-100
 [more] ISEC2008-100
pp.67-72
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan