Thu, Nov 12 PM ISEC 13:30 - 15:10 |
(1) |
13:30-13:55 |
Constructing New Differential Path and Algebraic Cryptanalysis for Full-SHA-1 |
Makoto Sugita (NTT/AIST), Mitsuru Kawazoe (Osaka Prefecture Univ.), Hideki Imai (AIST/ Chuo Univ.) |
(2) |
13:55-14:20 |
A Hierarchical Multisignature Based on the Gap Diffie-Hellman Signature Scheme |
Masaki Inamura, Ryu Watanabe, Toshiaki Tanaka (KDDI R&D Labs.) |
(3) |
14:20-14:45 |
A Proposal of Efficient Attribute-Based Group Signature Schemes Using Pairings |
Hiroki Fujii, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.) |
(4) |
14:45-15:10 |
A Construction of A New Class of Non-Linear Product-Sum-Type Public-Key Cryptosystem |
Masao Kasahara (Osaka Gakuin Univ.) |
Thu, Nov 12 PM LOIS 15:25 - 17:25 |
(5) |
15:25-15:55 |
A Looking Back Service for Power Consumption Logs in Home Network System |
Masayuki Fukuda, Hideharu Seto, Hiroyuki Sakamoto, Hiroshi Igaki, Masahide Nakamura (Kobe Univ.) |
(6) |
15:55-16:25 |
Considering Common Data Model to Mash-up Life Logs |
Masahide Nakamura, Akira Shimojo, Hiroshi Igaki (Kobe Univ.) |
(7) |
16:25-16:55 |
Possibility of the Life Log Service in the House |
Kazuko Katase (The Inst. for Future Tech.) |
(8) |
16:55-17:25 |
Consciousness Survey of Personal Health Information Management based on the e-P.O.Box |
Naoko Taira, Joong Sun Lee, Hiroyuki Suzuki, Kouichi Kita, Takashi Obi, Masuyoshi Yachida, Yuuji Homma, Hiroshige Yamamoto, Kazuhisa Uryu, Masahiro Yamaguchi, Nagaaki Ohyama (Tokyo Inst. of Tech) |
Fri, Nov 13 AM ISEC 09:00 - 10:15 |
(9) |
09:00-09:25 |
Proposal on Multivariate Public Key Signature Scheme Applying the STS cryptosystem |
Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki (Chuo Univ.) |
(10) |
09:25-09:50 |
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers -- |
Masahito Gotaishi, Kohtaro Tadaki, Ryo Fujita, Shigeo Tsujii (Chuo Univ.) |
(11) |
09:50-10:15 |
Anonymous Query Language Retrieval |
Hiroshi Yamaguchi, Shigeo Tsujii (Chuo Univ) |
Fri, Nov 13 AM LOIS 10:30 - 12:00 |
(12) |
10:30-11:00 |
Javas Crypto |
Satoshi Oda, Gembu Morohashi (NTT Corp.) |
(13) |
11:00-11:30 |
Modeling and Verification of Serendipitous Recommender System |
Takayuki Akiyama, Kiyohiro Obara, Masaaki Tanizaki (Hitachi, Ltd.,) |
(14) |
11:30-12:00 |
Identifying Purchase Behavior on Web Access Log |
Hisaharu Ishii, Yusuke Ichikawa, Hiroyuki Sato, Toru Kobayashi (NTT Corp.) |
Fri, Nov 13 PM ISEC 13:00 - 14:40 |
(15) |
13:00-13:25 |
State Recovery of RC4 PRGA by Using Nonzero Bit Differences |
Mitsuki Ajiro, Atsuko Miyaji (JAIST) |
(16) |
13:25-13:50 |
Efficient Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks |
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST) |
(17) |
13:50-14:15 |
Speeding Up of a Message Falsification Attack on WPA-TKIP |
Toshihiro Ohigashi (Hiroshima Univ.), Yuki Ozawa, Masakatu Morii (Kobe Univ.) |
(18) |
14:15-14:40 |
Secure Biometric Authentication Using 2-DNF Homomorphic Encryption |
Mitsuhiro Hattori, Yoichi Shibata, Takashi Ito, Nori Matsuda, Katsuyuki Takashima, Takeshi Yoneda (Mitsubishi Electric) |
Fri, Nov 13 PM LOIS 14:55 - 15:55 |
(19) |
14:55-15:25 |
A Study of the user modeling method for personal life assistance service |
Koji Ito, Kyoji Iiduka, Takahiko Murayama, Toru Kobayashi (NTT) |
(20) |
15:25-15:55 |
Development of User Recognition System using Lifelogs |
Hirohisa Tezuka, Yukihiro Nakamura, Manabu Motegi, Shin-ichiro Eitoku, Shunichi Seko, Masaaki Nishino, Shin-yo Muto, Masanobu Abe (NTT Corp.) |