Thu, Jul 18 AM 10:15 - 11:55 |
(1) |
10:15-10:40 |
|
(2) ISEC |
10:40-11:05 |
Study of CAPTCHA suitable for smartphones |
Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.) |
(3) ISEC |
11:05-11:30 |
Proposal of the Support System at the Time of Introduction of User Applications in Android OS |
Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.) |
(4) ISEC |
11:30-11:55 |
Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform |
Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) |
|
11:55-12:55 |
Break ( 60 min. ) |
Thu, Jul 18 PM 12:55 - 14:35 |
(5) SITE |
12:55-13:20 |
Examination of IDS Log Analysis using Discrete Wavelet Transform |
Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(6) SITE |
13:20-13:45 |
Engineering Ethics Education with world cafe discussion |
Michio Nakanishi (Osaka Inst. of Tech.) |
(7) SITE |
13:45-14:10 |
Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools |
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.) |
(8) SITE |
14:10-14:35 |
The Concept of "Group Privacy" in the Information Age:
-- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? -- |
Takushi Otani (Kibi International Univ.) |
|
14:35-14:50 |
Break ( 15 min. ) |
Thu, Jul 18 PM 14:50 - 16:30 |
(9) ISEC |
14:50-15:15 |
Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability |
Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC) |
(10) ISEC |
15:15-15:40 |
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 |
Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST) |
(11) ISEC |
15:40-16:05 |
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform |
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) |
(12) ISEC |
16:05-16:30 |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 -- |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) |
Thu, Jul 18 AM 10:15 - 11:55 |
(13) |
10:15-10:40 |
|
(14) |
10:40-11:05 |
|
(15) |
11:05-11:30 |
|
(16) |
11:30-11:55 |
|
|
11:55-12:55 |
Break ( 60 min. ) |
Thu, Jul 18 PM 12:55 - 14:10 |
(17) |
12:55-13:20 |
|
(18) |
13:20-13:45 |
|
(19) |
13:45-14:10 |
|
|
14:10-14:25 |
Break ( 15 min. ) |
Thu, Jul 18 PM 14:50 - 16:30 |
(20) |
14:50-15:15 |
|
(21) |
15:15-15:40 |
|
(22) |
15:40-16:05 |
|
(23) |
16:05-16:30 |
|
Thu, Jul 18 AM 09:10 - 10:00 |
(24) EMM |
09:10-09:35 |
An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients |
Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) |
(25) EMM |
09:35-10:00 |
Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices |
Toshio Modegi (DNP) |
|
10:00-10:15 |
Break ( 15 min. ) |
Thu, Jul 18 AM 10:15 - 11:55 |
(26) EMM |
10:15-10:40 |
Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface |
Tomoko Kajiyama (Aoyama Gakuin Univ.) |
(27) EMM |
10:40-11:55 |
[Panel Discussion]
Education for IT Engineers from the Viewpoint of Information Security |
Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi |
|
11:55-12:55 |
Break ( 60 min. ) |
Thu, Jul 18 PM 12:55 - 14:35 |
(28) EMM |
12:55-13:20 |
A Hierarchical Access Control Method by the Secret Sharing Scheme |
Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(29) EMM |
13:20-13:45 |
A Content Protection Method Using Secret Sharing and Attribute-Based Encryption |
Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) |
(30) EMM |
13:45-14:10 |
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method |
Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) |
(31) EMM |
14:10-14:35 |
Study of an artificial fiber pattern in Augmented Reality system |
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) |
|
14:35-14:50 |
Break ( 15 min. ) |
Thu, Jul 18 PM 14:50 - 16:30 |
(32) EMM |
14:50-15:15 |
Image Restoration Using Embedding of Similar Region Information |
Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.) |
(33) EMM |
15:15-15:40 |
On a Data-Hiding Technique Based on Complete Complementary Codes |
Ryusuke Mayuzumi (Univ. of Electro-Comm.), Tetsuya Kojima (Tokyo National College of Tech.) |
(34) EMM |
15:40-16:05 |
Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection |
Shengbei Wang, Masashi Unoki (JAIST) |
(35) EMM |
16:05-16:30 |
An Approach to Amplitude Scaling Partial Encryption for Compressed Audio |
Twe Ta Oo, Takao Onoye (Osaka Univ.), Kilho Shin (Univ. of Hyogo) |
Thu, Jul 18 PM 16:40 - 17:40 |
(36) ISEC |
16:40-17:40 |
[Invited Talk]
Research on Information and Physical Security Technologies for Embedded Systems |
Tsutomu Matsumoto (Yokohama National Univ.) |
Fri, Jul 19 AM 09:10 - 10:00 |
(37) ISEC |
09:10-09:35 |
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange |
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) |
(38) ISEC |
09:35-10:00 |
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol |
Daisuke Moriyama (NICT) |
|
10:00-10:15 |
Break ( 15 min. ) |
Fri, Jul 19 AM 10:15 - 11:55 |
(39) ISEC |
10:15-10:40 |
A Knapsack Cryptosystem Using Super-Decreasing Sequence |
Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.) |
(40) ISEC |
10:40-11:05 |
An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem |
Yasuyuki Murakami, Shinsuke Hamasho (Osaka Electro-Comm. Univ.) |
(41) ISEC |
11:05-11:30 |
Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further -- |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(42) ISEC |
11:30-11:55 |
Cryptosystems for Social Organizations Managed by Receiving Administrator
-- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations -- |
Shigeo Tsujii, Hiroshi Yamaguchi, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.) |
|
11:55-12:55 |
Break ( 60 min. ) |
Fri, Jul 19 PM 12:55 - 14:35 |
(43) ISEC |
12:55-13:20 |
On Identification Methods for Visible-Light Paper Artifact-Metric Systems |
Ryosuke Suzuki, Tsutomu Matsumoto (Yokohama National Univ.) |
(44) ISEC |
13:20-13:45 |
A proposal of key binding technology using lattice masking |
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.) |
(45) |
13:45-14:10 |
|
(46) |
14:10-14:35 |
|
|
14:35-14:50 |
Break ( 15 min. ) |
Fri, Jul 19 PM 14:50 - 16:30 |
(47) ISEC |
14:50-15:15 |
TLS with Pre-shared Key Extended by Identity-based Encryption |
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.) |
(48) ISEC |
15:15-15:40 |
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings |
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) |
(49) ISEC |
15:40-16:05 |
On Side-Channel Information Using Signal Toggles in AES Circuit |
Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC) |
(50) ISEC |
16:05-16:30 |
Recovering RSA Secret Keys from Observed Analog Data (I) |
Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo) |
Fri, Jul 19 AM 09:10 - 10:00 |
(51) |
09:10-09:35 |
|
(52) |
09:35-10:00 |
|
|
10:00-10:15 |
Break ( 15 min. ) |
Fri, Jul 19 AM 10:15 - 11:55 |
(53) |
10:15-10:40 |
|
(54) |
10:40-11:05 |
|
(55) ICSS |
11:05-11:30 |
Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities |
Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.) |
(56) ICSS |
11:30-11:55 |
Network Observation and Analysis Report on nicter
-- Malware infection to embedded systems -- |
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
|
11:55-12:55 |
Break ( 60 min. ) |
Fri, Jul 19 PM 12:55 - 14:35 |
(57) |
12:55-13:20 |
|
(58) ISEC |
13:20-13:45 |
Generalization of Noises in Differential Privacy |
Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT) |
(59) ISEC |
13:45-14:10 |
Attacks on Authenticated Encryption Based on E-MACs |
Hayato Kobayashi, Hiraku Morita, Tetsu Iwata (Nagoya Univ.) |
(60) |
14:10-14:35 |
|
|
14:35-14:50 |
Break ( 15 min. ) |
Fri, Jul 19 PM 14:50 - 16:05 |
(61) |
14:50-15:15 |
|
(62) |
15:15-15:40 |
|
(63) |
15:40-16:05 |
|