IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2009)

Search Results: Keywords 'from:2009-11-12 to:2009-11-12'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, LOIS 2009-11-12
13:30
Gifu Gifu Univ. Constructing New Differential Path and Algebraic Cryptanalysis for Full-SHA-1
Makoto Sugita (NTT/AIST), Mitsuru Kawazoe (Osaka Prefecture Univ.), Hideki Imai (AIST/ Chuo Univ.) ISEC2009-51 LOIS2009-40
Since the cryptanalysis for SHA-1 was proposed [19], many improvements have been proposed. Recently a new result was pro... [more] ISEC2009-51 LOIS2009-40
pp.1-8
ISEC, LOIS 2009-11-12
13:55
Gifu Gifu Univ. A Hierarchical Multisignature Based on the Gap Diffie-Hellman Signature Scheme
Masaki Inamura, Ryu Watanabe, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-52 LOIS2009-41
We first propose a hierarchical structured multisignature scheme based on the Gap Diffie-Hellman(GDH) problem. We have e... [more] ISEC2009-52 LOIS2009-41
pp.9-14
ISEC, LOIS 2009-11-12
14:20
Gifu Gifu Univ. A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings
Hiroki Fujii, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) ISEC2009-53 LOIS2009-42
Group signature scheme is the digital signature scheme enhancing the privacy of the user,and efficient pairing-based sch... [more] ISEC2009-53 LOIS2009-42
pp.15-22
ISEC, LOIS 2009-11-12
14:45
Gifu Gifu Univ. A Construction of A New Class of Non-Linear Product-Sum-Type Public-Key Cryptosystem
Masao Kasahara (Osaka Gakuin Univ.) ISEC2009-54 LOIS2009-43
In this paper we propose a new class of PKC, referred to as K(V)PKC. In K(V)PKC, the ciphertext in a polynomial form is ... [more] ISEC2009-54 LOIS2009-43
pp.23-27
ISEC, LOIS 2009-11-12
15:25
Gifu Gifu Univ. A Looking Back Service for Power Consumption Logs in Home Network System
Masayuki Fukuda, Hideharu Seto, Hiroyuki Sakamoto, Hiroshi Igaki, Masahide Nakamura (Kobe Univ.) ISEC2009-55 LOIS2009-44
Recently, resource monitoring systems to visualize energy consumptions such as electricity and gas for home users, are d... [more] ISEC2009-55 LOIS2009-44
pp.29-34
ISEC, LOIS 2009-11-12
15:55
Gifu Gifu Univ. Considering Common Data Model to Mash-up Life Logs
Masahide Nakamura, Akira Shimojo, Hiroshi Igaki (Kobe Univ.) ISEC2009-56 LOIS2009-45
In order to support the data mash-up of different kinds of
life logs, this paper discusses a common data model and gen... [more]
ISEC2009-56 LOIS2009-45
pp.35-40
ISEC, LOIS 2009-11-12
16:25
Gifu Gifu Univ. Possibility of the Life Log Service in the House
Kazuko Katase (The Inst. for Future Tech.) ISEC2009-57 LOIS2009-46
The history of user's real daily life is included as for the life log, and providing with service to contribute to the i... [more] ISEC2009-57 LOIS2009-46
pp.41-46
ISEC, LOIS 2009-11-12
16:55
Gifu Gifu Univ. Consciousness Survey of Personal Health Information Management based on the e-P.O.Box
Naoko Taira, Joong Sun Lee, Hiroyuki Suzuki, Kouichi Kita, Takashi Obi, Masuyoshi Yachida, Yuuji Homma, Hiroshige Yamamoto, Kazuhisa Uryu, Masahiro Yamaguchi, Nagaaki Ohyama (Tokyo Inst. of Tech) ISEC2009-58 LOIS2009-47
The Priority Policy Program 2008 of Japanese government specifies measures of informatization in the medical field, whic... [more] ISEC2009-58 LOIS2009-47
pp.47-53
ISEC, LOIS 2009-11-13
09:00
Gifu Gifu Univ. Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) ISEC2009-59 LOIS2009-48
New signature scheme based on Stepwise Triangular Scheme (STS), which is one of the basic trapdoors of Multivariate Publ... [more] ISEC2009-59 LOIS2009-48
pp.55-60
ISEC, LOIS 2009-11-13
09:25
Gifu Gifu Univ. Matsumoto-Imai Signature by Dual Perturbation -- Two new Modifiers --
Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) ISEC2009-60 LOIS2009-49
A new signature scheme of MPKC is proposed.
It is created by perturbing a traditional encryption scheme in two ways.
... [more]
ISEC2009-60 LOIS2009-49
pp.61-68
ISEC, LOIS 2009-11-13
09:50
Gifu Gifu Univ. Anonymous Query Language Retrieval
Hiroshi Yamaguchi, Shigeo Tsujii (Chuo Univ) ISEC2009-61 LOIS2009-50
 [more] ISEC2009-61 LOIS2009-50
pp.69-74
ISEC, LOIS 2009-11-13
10:30
Gifu Gifu Univ. Javas Crypto
Satoshi Oda, Gembu Morohashi (NTT Corp.) ISEC2009-62 LOIS2009-51
The information security in Web 1.0, represented by SSL/PKI,
is the security for communication channels. As computing
... [more]
ISEC2009-62 LOIS2009-51
pp.75-80
ISEC, LOIS 2009-11-13
11:00
Gifu Gifu Univ. Modeling and Verification of Serendipitous Recommender System
Takayuki Akiyama, Kiyohiro Obara, Masaaki Tanizaki (Hitachi, Ltd.,) ISEC2009-63 LOIS2009-52
The recommender systems have the problem that more and more accurate it recommends and the recommended items does not ha... [more] ISEC2009-63 LOIS2009-52
pp.81-87
ISEC, LOIS 2009-11-13
11:30
Gifu Gifu Univ. Identifying Purchase Behavior on Web Access Log
Hisaharu Ishii, Yusuke Ichikawa, Hiroyuki Sato, Toru Kobayashi (NTT Corp.) ISEC2009-64 LOIS2009-53
There are many studies of recommender systems, which provide users with suited items to their preferences. Besides it is... [more] ISEC2009-64 LOIS2009-53
pp.89-94
ISEC, LOIS 2009-11-13
13:00
Gifu Gifu Univ. State Recovery of RC4 PRGA by Using Nonzero Bit Differences
Mitsuki Ajiro, Atsuko Miyaji (JAIST) ISEC2009-65 LOIS2009-54
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$, ... [more]
ISEC2009-65 LOIS2009-54
pp.95-100
ISEC, LOIS 2009-11-13
13:25
Gifu Gifu Univ. Efficient Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST) ISEC2009-66 LOIS2009-55
Wireless sensor network (WSN) is a network composed of a lot of
wireless sensors with a little calculation resource. Th... [more]
ISEC2009-66 LOIS2009-55
pp.101-106
ISEC, LOIS 2009-11-13
13:50
Gifu Gifu Univ. Speeding Up of a Message Falsification Attack on WPA-TKIP
Toshihiro Ohigashi (Hiroshima Univ.), Yuki Ozawa, Masakatu Morii (Kobe Univ.) ISEC2009-67 LOIS2009-56
 [more] ISEC2009-67 LOIS2009-56
pp.107-112
ISEC, LOIS 2009-11-13
14:15
Gifu Gifu Univ. Secure Biometric Authentication Using 2-DNF Homomorphic Encryption
Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda (Mitsubishi Electric) ISEC2009-68 LOIS2009-57
In this paper, a secure biometric authentication protocol is proposed which can authenticate users using encrypted biome... [more] ISEC2009-68 LOIS2009-57
pp.113-120
ISEC, LOIS 2009-11-13
14:55
Gifu Gifu Univ. A Study of the user modeling method for personal life assistance service
Koji Ito, Kyoji Iiduka, Takahiko Murayama, Toru Kobayashi (NTT) ISEC2009-69 LOIS2009-58
We proposed user modeling method for personal life assistance service by estimating user preference from age, sex, logs... [more] ISEC2009-69 LOIS2009-58
pp.121-128
ISEC, LOIS 2009-11-13
15:25
Gifu Gifu Univ. Development of User Recognition System using Lifelogs
Hirohisa Tezuka, Yukihiro Nakamura, Manabu Motegi, Shin-ichiro Eitoku, Shunichi Seko, Masaaki Nishino, Shin-yo Muto, Masanobu Abe (NTT Corp.) ISEC2009-70 LOIS2009-59
In this paper, we propose a system architecture with disclosure control for aggregating multi-user life logs. The miniat... [more] ISEC2009-70 LOIS2009-59
pp.129-133
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan