Thu, Jul 2 PM ISEC 13:00 - 14:15 |
(1) ISEC |
13:00-13:25 |
Simplified Proof for Small Secret Key Attack on RSA and its Extension |
Noboru Kunihiro (Univ. of Tokyo), Kaoru Kurosawa (Ibaragi Univ.) |
(2) ISEC |
13:25-13:50 |
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack (Part2) |
Takeshi Nasako, Yasuyuki Murakami (OECU), Masao Kasahara (OGU) |
(3) ISEC |
13:50-14:15 |
Relationship between Weight of Plaintext and Successful Attacks in Knapsack Cryptosystems |
Tatsuo Douzono, Takeshi Nasako, Yasuyuki Murakami (Osaka Electoro-Communication Univ.) |
Thu, Jul 2 PM SITE 14:30 - 17:25 |
(4) SITE |
14:30-14:55 |
Proposal on Password Authentication Against Iterative Shoulder Surfing |
Ryota Kitabayashi, Hiroyuki Inaba (KIT) |
(5) SITE |
14:55-15:20 |
Problems between Disclosure of Technical Information and Restriction of Intellectual Property Protection |
Haruo Kodama (OUJ/SOKENDAI) |
(6) SITE |
15:20-15:45 |
An analysis of Copyright Laws Through Informatics |
Naonori Kato (SOKENDAI) |
(7) SITE |
15:45-16:10 |
Current situation and issues of health information exchange
-- the national database of health insurance claim and health check information -- |
Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD) |
(8) SITE |
16:10-16:35 |
About the Security Model built in the Search Engine |
Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) |
(9) SITE |
16:35-17:00 |
Logical Structure of the Cloud Which Projects Various Values onto Oneself
-- From the Aspect of the Agent of Self-Referred Social Systems -- |
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) |
(10) SITE |
17:00-17:25 |
A Model for JSL Emergency Message System for the Deaf |
Kazuo Kamata (Utsunomiya Univ.), Shunichi Yonemura (NTT) |
Thu, Jul 2 PM CSEC 13:00 - 14:15 |
(11) |
13:00-13:25 |
|
(12) |
13:25-13:50 |
|
(13) |
13:50-14:15 |
|
Thu, Jul 2 PM CSEC 14:30 - 16:35 |
(14) |
14:30-14:55 |
|
(15) |
14:55-15:20 |
|
(16) |
15:20-15:45 |
|
(17) |
15:45-16:10 |
|
(18) |
16:10-16:35 |
|
Fri, Jul 3 AM ISEC 09:30 - 12:00 |
(19) ISEC |
09:30-09:55 |
Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors |
Yumi Sakemi, Kazushi Nishii, Tetsuya Izuta, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(20) ISEC |
09:55-10:20 |
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models |
Yusuke Naito (Mitsubishi Electric), Lei Wang, Kazuo Ohta (Univ. of Electro-Comm.) |
(21) ISEC |
10:20-10:45 |
Proposal of Integrated MPKC: PPS
-- STS Enhanced by Perturbed Piece In Hand Method -- |
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) |
(22) ISEC |
10:45-11:10 |
On the strength evaluation of Lesamnta against differential cryptanalysis |
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
(23) ISEC |
11:10-11:35 |
A Study on Stream-Cipher-Based Hash Functions |
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) |
(24) ISEC |
11:35-12:00 |
Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness |
Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) |
Fri, Jul 3 PM ICSS 13:00 - 14:40 |
(25) ICSS |
13:00-13:25 |
Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks |
Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) |
(26) ICSS |
13:25-13:50 |
Investigation about Malware Distribution to Websites |
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) |
(27) ICSS |
13:50-14:15 |
A Study on the Log Getting Process for Detection of the Remaining Files Copied from Removable Storage Medium |
Chikako Ishizawa, Makoto Nishida (Akita Univ.) |
(28) ICSS |
14:15-14:40 |
Risk Assessment Method for Networked Systems using CVSS |
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) |
Fri, Jul 3 PM ISEC 14:55 - 17:00 |
(29) ISEC |
14:55-15:20 |
Clone Resistance Evaluation Based on Attacker's Resources in Artifact-metric Systems |
Masashi Une (BOJ) |
(30) ISEC |
15:20-15:45 |
Development of FMC Authentication Technique with Mobile Terminal |
Katsuyuki Umezawa, Takatoshi Kato (Hitachi), Satoru Tezuka (Tech. of Tokyo Univ.) |
(31) ISEC |
15:45-16:10 |
Certification Seal
-- Random Pattern of Polarized Film Pieces -- |
Yoshihiro Tsukamura |
(32) ISEC |
16:10-16:35 |
Software Protection Mechanism Using Tamper-Proof Module |
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) |
(33) ISEC |
16:35-17:00 |
A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying |
Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.) |
Fri, Jul 3 AM CSEC 09:55 - 11:35 |
(34) |
09:55-10:20 |
|
(35) |
10:20-10:45 |
|
(36) |
10:45-11:10 |
|
(37) |
11:10-11:35 |
|
Fri, Jul 3 PM SPT 13:00 - 14:40 |
(38) |
13:00-13:25 |
|
(39) |
13:25-13:50 |
|
(40) |
13:50-14:15 |
|
(41) |
14:15-14:40 |
|
Fri, Jul 3 PM CSEC 14:55 - 16:10 |
(42) |
14:55-15:20 |
|
(43) |
15:20-15:45 |
|
(44) |
15:45-16:10 |
|