Thu, Jul 24 PM 13:00 - 15:05 |
(1) |
13:00-13:25 |
A Note on the Security of KMN PKC and Presentation of Challenge Problems |
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.) |
(2) |
13:25-13:50 |
On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 -- |
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.) |
(3) |
13:50-14:15 |
Design Policy of MPKC based on Piece in Hand Concept |
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) |
(4) |
14:15-14:40 |
Knapsack Cryptosystem on Elliptic Curves of Trace Tow |
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.) |
(5) |
14:40-15:05 |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 -- |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA) |
Thu, Jul 24 PM 13:00 - 14:40 |
(6) |
13:00-13:25 |
An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II) |
Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.) |
(7) |
13:25-13:50 |
Efficiency of a Redactable Signature with Tree Construction |
Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.) |
(8) |
13:50-14:15 |
A System against Leakage though Paper Documents in Multi-Vendor Environment |
Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI) |
(9) |
14:15-14:40 |
Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone |
Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.) |
Thu, Jul 24 PM 15:20 - 17:50 |
(10) |
15:20-15:45 |
Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents |
Haruo Kodama (NIME) |
(11) |
15:45-16:10 |
Basic Study on Designing Navigation Systems for the Blind |
Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal) |
(12) |
16:10-16:35 |
A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First -- |
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.) |
(13) |
16:35-17:00 |
Study on Reputation Systems for Trusty Information Network |
Noriaki Yoshikai (Niohn Univ.) |
(14) |
17:00-17:25 |
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems -- |
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) |
(15) |
17:25-17:50 |
Study of method for expressing context |
Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS) |
Thu, Jul 24 PM 15:20 - 17:00 |
(16) |
15:20-15:45 |
Variable Probabilistic Packet Mareking with TTL for IP Traceback |
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
(17) |
15:45-16:10 |
Information Leakage Prevention Function of host based for P2P File Exchange Environment |
Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
(18) |
16:10-16:35 |
Study of Database for information sharing of P2P File Exchange Environment |
Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi) |
(19) |
16:35-17:00 |
An enhancement of VMM snapshot utility for detcting code injection |
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT) |
Fri, Jul 25 AM 09:55 - 12:00 |
(20) |
09:55-10:20 |
Detecting of Unknown Computer Virus Variants Based on Computer Behavior |
Haruka Mimori, Koki Abe (UEC) |
(21) |
10:20-10:45 |
Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems |
Ryoya Miyazawa, Koki Abe (UEC) |
(22) |
10:45-11:10 |
A Proposal of Intrusion Detection using Third-parties Support |
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) |
(23) |
11:10-11:35 |
Examination of the issues in designing of electronic signature documentation system |
Miyuki Takao, Koichiro Hayashi (IISEC) |
(24) |
11:35-12:00 |
Clone Resistance of Paper Artifact-Metrics with Segmented Matching |
Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU) |
Fri, Jul 25 AM 09:55 - 12:00 |
(25) |
09:55-10:20 |
Architecture Optimization of a Group Signature Circuit |
Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC) |
(26) |
10:20-10:45 |
A Lattice Model of the General Confidentiality Policies |
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.) |
(27) |
10:45-11:10 |
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases |
Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC) |
(28) |
11:10-11:35 |
Proposal of Anonymos Routing Technique with DHT |
Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.) |
(29) |
11:35-12:00 |
Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document |
Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.) |
Fri, Jul 25 PM 13:00 - 15:05 |
(30) |
13:00-13:25 |
Implementation of Block Cipher Camellia with a Configurable and Extensible Processor |
Kazuyoshi Matsuo, Koki Abe (UEC) |
(31) |
13:25-13:50 |
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function |
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) |
(32) |
13:50-14:15 |
Hash Function Using MMO Compression Function and MDP Domain Extension |
Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.) |
(33) |
14:15-14:40 |
Traitor Tracing from ID based Broadcast Encryption |
Ryuichi Sakai (OECU) |
(34) |
14:40-15:05 |
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography |
Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
Fri, Jul 25 PM 13:00 - 15:05 |
(35) |
13:00-13:25 |
Invalidation of a Mailing-list Address against Spam |
Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.) |
(36) |
13:25-13:50 |
Proposal of a Cue & Response Based User Authentication Using Unclear Image |
Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.) |
(37) |
13:50-14:15 |
Self expandable RBAC for distributed systems |
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC) |
(38) |
14:15-14:40 |
Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. -- |
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST) |
(39) |
14:40-15:05 |
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System |
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
Fri, Jul 25 PM 15:20 - 17:25 |
(40) |
15:20-15:45 |
Watermarking Method with a Quasi-One-Way Function |
Kazuo Ohzeki, Engyoku Gi (SIT) |
(41) |
15:45-16:10 |
Ring Authenticated Group Key Establishment with Member Repudiation |
Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo) |
(42) |
16:10-16:35 |
A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack |
Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
(43) |
16:35-17:00 |
Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes |
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) |
(44) |
17:00-17:25 |
A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree |
Chunhua Su, Kouichi Sakurai (Kyushu Univ.) |
Fri, Jul 25 PM 15:20 - 16:35 |
(45) |
15:20-15:45 |
A Study on Detecting Information Leak Virus by Activity Monitoring |
Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.) |
(46) |
15:45-16:10 |
Development of publicity function of the illegitimate activity host by the IP marking |
Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.) |
(47) |
16:10-16:35 |
P2P Node Detection method based on Connection Analysis |
Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.) |