IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2012)

Search Results: Keywords 'from:2012-11-21 to:2012-11-21'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, LOIS 2012-11-21
14:15
Shizuoka Shizuoka City Industry-University Exchange Center How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion
Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU) ISEC2012-57 LOIS2012-32
Fault injection attack, inducing partial fault in a cryptographic module and extracting the inside key, has been conside... [more] ISEC2012-57 LOIS2012-32
pp.1-8
ISEC, LOIS 2012-11-21
14:40
Shizuoka Shizuoka City Industry-University Exchange Center Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension
Asraf Akhimullah, Shoichi Hirose (Fukui Univ.), Emi Matsuyama (SAKAI ELCOM) ISEC2012-58 LOIS2012-33
This paper presents a block-cipher-based hashing scheme suitable for
resource constrained devices.
It uses the Lesamnt... [more]
ISEC2012-58 LOIS2012-33
pp.9-14
ISEC, LOIS 2012-11-21
15:05
Shizuoka Shizuoka City Industry-University Exchange Center Secure multiplication algorithm based on secret sharing
Ryota Nakada, Takayuki Nakachi (NTT) ISEC2012-59 LOIS2012-34
In this paper, we propose secure multiplication algorithm based on the secret sharing scheme.
Secret sharing scheme can... [more]
ISEC2012-59 LOIS2012-34
pp.15-20
ISEC, LOIS 2012-11-21
15:45
Shizuoka Shizuoka City Industry-University Exchange Center Implementation and Evaluation of MashMap Framework for Visualizing Location-based Lifelog
Kohei Takahashi, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) ISEC2012-60 LOIS2012-35
This paper presents the implementation and evaluation of Mashmap framework.
It treats location-based lifelogs in genera... [more]
ISEC2012-60 LOIS2012-35
pp.21-26
ISEC, LOIS 2012-11-21
16:10
Shizuoka Shizuoka City Industry-University Exchange Center Implementing API of Large-scale House Log Data Platform in Smart City
Shintaro Yamamoto, Kohei Takahashi, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) ISEC2012-61 LOIS2012-36
Smart city is a next-generation city planning. In the smart city, some value-added services are provided using wide vari... [more] ISEC2012-61 LOIS2012-36
pp.27-32
ISEC, LOIS 2012-11-21
16:35
Shizuoka Shizuoka City Industry-University Exchange Center A study of the human resource allocation on the cooperation system of life support services
Mizue Hayashi (NTT), Yoshiyuki Mihara (NTT WEST), Atsushi Nakadaira, Manabu Okamoto, Takefumi Yamazaki, Atsushi Sato (NTT) ISEC2012-62 LOIS2012-37
ICT is being used, but not effectively, in various life support services as health consultation and observation in home-... [more] ISEC2012-62 LOIS2012-37
pp.33-40
ISEC, LOIS 2012-11-22
10:45
Shizuoka Shizuoka City Industry-University Exchange Center A Web Service Implementation of Anonymous Attributes Authentication System for CNF Formulas
Yuji Hamada, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.) ISEC2012-63 LOIS2012-38
Our research group has proposed the anonymous authentication scheme using user's attributes. In this scheme, the user ca... [more] ISEC2012-63 LOIS2012-38
pp.41-46
ISEC, LOIS 2012-11-22
11:10
Shizuoka Shizuoka City Industry-University Exchange Center A classification method of application traffic in encrypted tunnel using SVM
Nguyen Thanh Tuan, Yasuhiro Nakamura (NDA) ISEC2012-64 LOIS2012-39
Curently, research on classification of application traffic which use the result of monitoring network traffic with encr... [more] ISEC2012-64 LOIS2012-39
pp.47-51
ISEC, LOIS 2012-11-22
11:35
Shizuoka Shizuoka City Industry-University Exchange Center Proposal on Concept of Encrypted State Processing at Semantic Layerbased on Logic -- Toward Realization of Confidentiality Preserving Retrieval and Creation of Answer by Natural Language --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo- U), Tetsuya Morizumi (Nettsu) ISEC2012-65 LOIS2012-40
 [more] ISEC2012-65 LOIS2012-40
pp.53-60
ISEC, LOIS 2012-11-22
13:15
Shizuoka Shizuoka City Industry-University Exchange Center Secret sharing using the Chinese remainder theorem and its application
Toshio Tsuji, Masao Kasahara (Osaka Gakuin Univ.) ISEC2012-66 LOIS2012-41
This paper presents a method of secret sharing using Chinese remainder theorem. In particular, we develop a system whic... [more] ISEC2012-66 LOIS2012-41
pp.61-68
ISEC, LOIS 2012-11-22
13:40
Shizuoka Shizuoka City Industry-University Exchange Center A Study on Visualization of Business Process Flow of Information Transfer Network System (My Number System) Using BPMN
Chikahiro Miyokawa, Takashi Obi, Kazushige Fujita, Masuyoshi Yachida, Joong Sun Lee, Tetsuya Natsume, Naoko Taira, Eikazu Niwano, Makoto Kumakura, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Tech) ISEC2012-67 LOIS2012-42
(To be available after the conference date) [more] ISEC2012-67 LOIS2012-42
pp.69-74
ISEC, LOIS 2012-11-22
14:20
Shizuoka Shizuoka City Industry-University Exchange Center Efficient elliptic curve exponentiation using DBNS with improved the Greedy algorithm for DBNS
Yoshio Kawamo, Atsuko Miyaji (JAIST) ISEC2012-68 LOIS2012-43
 [more] ISEC2012-68 LOIS2012-43
pp.75-81
ISEC, LOIS 2012-11-22
14:45
Shizuoka Shizuoka City Industry-University Exchange Center A New Explicit Relation between Trace, Definition Field, and Embedding Degree
Atsuko Miyaji, Xiaonan Shi (JAIST) ISEC2012-69 LOIS2012-44
For pairing based cryptography we need elliptic curves de fined over extension nite elds Fpm with
moderate embedding ... [more]
ISEC2012-69 LOIS2012-44
pp.83-88
ISEC, LOIS 2012-11-22
15:10
Shizuoka Shizuoka City Industry-University Exchange Center A note on subgroup decision problem and pairing inversion problem
Naoki Kanayama (Univ. of Tsukuba), Shigenori Uchiyama (Tokyo Metro. Univ.), Eiji Okamoto (Univ. of Tsukuba) ISEC2012-70 LOIS2012-45
 [more] ISEC2012-70 LOIS2012-45
pp.89-92
ISEC, LOIS 2012-11-22
15:35
Shizuoka Shizuoka City Industry-University Exchange Center Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) ISEC2012-71 LOIS2012-46
Security of lattice-based cryptosystems is based on the hardness of the Shortest Vector Problem (SVP) in lattices.
Micc... [more]
ISEC2012-71 LOIS2012-46
pp.93-99
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan