Thu, Jul 19 AM Room A 10:20 - 12:00 |
(1) |
10:20-10:45 |
The study for the position authentication and the security of location information |
Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC) |
(2) |
10:45-11:10 |
A preference transmission method with information security database systems on the Internet |
Yasuyoshi Okada, Naoshi Sato (I.I.S.) |
(3) |
11:10-11:35 |
On the Security and Complexity of Shared Attribute Certification Systems |
Makiko Ueyama, Junji Shikata, Tsutomu Matsumoto (Yokohama Nat'l Univ.) |
(4) |
11:35-12:00 |
User Authentication Method Based On Statistical Analysis of Keystrokes |
Yoshihiro Kataoka, Takao Miyamoto, Shigeki Aoki, Masao Izumi, Kunio Fukunaga (Osaka Pref Univ) |
Thu, Jul 19 AM Room B 09:55 - 12:00 |
(5) |
09:55-10:20 |
A random number generation method with a variable degree of safety and its analysis |
Yasuyuki Tanaka, Harutaka Ishizu, Naohiko Mori (NTT Communications) |
(6) |
10:20-10:45 |
Electronic Voting Scheme to Maintain Anonymity in Small Scale Election by Hiding the Number of Votes |
Tsukasa Endo (UEC), Isao Echizen (NII), Hiroshi Yoshiura (UEC) |
(7) |
10:45-11:10 |
Consideration on effectiveness of CC V3.1 Function Specific Assurance ST |
Masue Shiba, Naokazu Sasaki, Takahisa Ishida, Hiroshi Iguchi, Tsuyoshi Shimada (Toshiba Solusions Corp.) |
(8) |
11:10-11:35 |
Japan-U.S. comparisons of information security survey |
Kentarou Yamaguchi, Katsuya Uchida (IISEC) |
(9) |
11:35-12:00 |
Analyzing Social Engineering & Managing Access Control against an Information Disclosure Demand |
Seiichiro Yatake, Katsuya Uchida (IISEC) |
Thu, Jul 19 PM Room A 13:00 - 15:30 |
(10) |
13:00-13:25 |
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels" |
Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) |
(11) |
13:25-13:50 |
Monetary Value of Security Damages Based on the Subjective Evaluation by Internet Users |
Naoko Sakurai, Tokio Otsuka, Hitoshi Mitomo (Waseda Univ.) |
(12) |
13:50-14:15 |
Technological and Social Studies for Emergency Message Services |
Shunichi Yonemura (NTT), Kazuo Kamata (Utsunomiya Univ.), Masakatsu Aoki (NTT), Akinori Yonekura (Utsunomiya Univ.) |
(13) |
14:15-14:40 |
Study on Information Transparency and Trust from the view point of Web innovation |
Noriaki Yoshikai (Nihon Univ.), Toshio Yamagishi (Hokkaido Univ.) |
(14) |
14:40-15:05 |
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow. |
Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT) |
(15) |
15:05-15:30 |
Beginning of Broadcast over the Internet in Japan |
Masataka Ohta (TIT) |
|
15:30-15:45 |
Break ( 15 min. ) |
Thu, Jul 19 PM Room B 13:25 - 15:30 |
(16) |
13:25-13:50 |
A Mutual Authentication System for Web Server Access by Using Cellar Phone |
Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.) |
(17) |
13:50-14:15 |
A Method to Limit Appriciation of Content |
Takehisa Kato (Toshiba Solutions Corp.) |
(18) |
14:15-14:40 |
A method of excluding disapproval connection on authentication network |
Takeshi Miyake (NIT), Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Akira Iwata (NIT) |
(19) |
14:40-15:05 |
An authentication network system using virtual authenticatior module |
Shunyo Suzuki, Fumiaki Kitano (Chuden CTI), Takeshi Miyake, Akira Iwata (NIT) |
(20) |
15:05-15:30 |
Human communication security to adapt to ever-expanding media environment |
Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC) |
|
15:30-15:45 |
Break ( 15 min. ) |
Thu, Jul 19 PM Room A 15:45 - 17:50 |
(21) |
15:45-16:10 |
Privacy-Preserving Assocaition Rules Mining Scheme Revisited |
Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (I2R), Tsuyoshi Takagi (Future Univ. Hakodate), Kouichi Sakurai (Kyushu Univ.) |
(22) |
16:10-16:35 |
Group Key Based Revocation Schemes with Shorter Message Header |
Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu) |
(23) |
16:35-17:00 |
On Anonymous Password-Authenticated Key Exchange |
SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.) |
(24) |
17:00-17:25 |
A Proposal of Key Management Scheme Using Anonymous Biometrics on Public Key Infrastructure |
Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (Nagasaki Univ), Kouichi Sakurai (Kyushu Univ) |
(25) |
17:25-17:50 |
On the Standardization of Information Security
-- Report on the Moscow Meeting in May, 2007 -- |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA) |
Thu, Jul 19 PM Room B 15:45 - 17:50 |
(26) |
15:45-16:10 |
A composition method of network-independent dynamic authentication VLAN |
Kazutoshi Sakamoto (NIT), Shunyo Suzuki (Chuden CTI), Akira Iwata (NIT) |
(27) |
16:10-16:35 |
Evaluation of a library against injection attacks |
Takao Okubo (Fujitsu Labs./IISEC), Hidehiko Tanaka (IISEC) |
(28) |
16:35-17:00 |
A Proposal of User Authentication using Convergence Reflex and Eyeball Shape |
Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.) |
(29) |
17:00-17:25 |
A study on information content of biometrics |
Kenta Takahashi, Hideitsu Hino, Takao Murakami (Hitachi Ltd.) |
(30) |
17:25-17:50 |
Advantage of User Authentication Using Unclear Images
-- Automatic Generation of Decoy Images -- |
Takumi Yamamoto (Shizuoka Univ.), Atsushi Harada (Mitsubishi Electric), Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.) |
Fri, Jul 20 AM Room A 09:55 - 12:00 |
(31) |
09:55-10:20 |
A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device |
Janghoon Song, Koki Abe (UEC) |
(32) |
10:20-10:45 |
Analysis on the Key-Scheduling Algorithm of MICKEY |
Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(33) |
10:45-11:10 |
A Study on the Tews-Weinmann-Pyshkin Attack against WEP |
Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(34) |
11:10-11:35 |
On Construction of Block Cipher with Variable Security Parameter |
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.) |
(35) |
11:35-12:00 |
Hardware Implementations of the 128-bit Blockcipher CLEFIA |
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai (Sony), Tetsu Iwata (Nagoya Univ.) |
Fri, Jul 20 AM Room B 09:55 - 12:00 |
(36) |
09:55-10:20 |
Proposal for the quantitative method of searching characteristics of node |
Hirofumi Nakakoji, Masato Terada, Seiichi Susaki (Hitachi) |
(37) |
10:20-10:45 |
Orthogonal expansion of port-scan packets |
Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi) |
(38) |
10:45-11:10 |
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet |
Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai) |
(39) |
11:10-11:35 |
Exploring the required condtions for malware to run for behavior analysis |
Yuji Hoshizawa, Kouichirou Okada, Motoaki Yamamura (SecureBrain Corp.), Takayoshi Shiigi (JPCERT) |
(40) |
11:35-12:00 |
Automatic malware classification |
Yuji Hoshizawa, Tsuyoshi Tachikawa, Motoaki Yamamura (SecureBrain Corp.) |
Fri, Jul 20 PM Room A 13:00 - 15:05 |
(41) |
13:00-13:25 |
A Factoring Algorithm Searching Squares |
Kunikatsu Kobayashi (Yamagata Univ.) |
(42) |
13:25-13:50 |
A Construction Method of Nonlinear Piece In Hand Matrix for Universally Enhancing the Security of Various Multivariate Public Key Cryptosystems |
Shigeo Tsujii (iisec), Kohtaro Tadaki (Chuo Univ.), Ryou Fujita (iisec) |
(43) |
13:50-14:15 |
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography |
Erik Dahmen (TUDarmstadt), Katsuyuki Okeya (Hitachi), Daniel Schepers (TUDarmstadt) |
(44) |
14:15-14:40 |
A Generalized Merkle Signature Scheme |
Erik Dahmen (TU Darmstadt), Camille Vuillaume, Katsuyuki Okeya (Hitachi), Elena Klintsevich, Johannes Buchmann (TU Darmstadt) |
(45) |
14:40-15:05 |
* |
Kunio Miyamoto, Hidehiko Tanaka (IISEC) |
|
15:05-15:20 |
Break ( 15 min. ) |
Fri, Jul 20 PM Room B 13:00 - 15:05 |
(46) |
13:00-13:25 |
A Design and Evaluation of Filtering Method of Image Spam in Bayesian Filter |
Masahiro Uemura, Toshihiro Tabata (Okayama Univ.) |
(47) |
13:25-13:50 |
A Study for Characteristics Transition of SPAM |
Yosuke Aragane, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT) |
(48) |
13:50-14:15 |
A Study of Spam Mail Combined with Social Engineering |
Kensuke Shibata, Itaru Kamiya, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT) |
(49) |
14:15-14:40 |
A study of outward features of Spam mails |
Itaru Kamiya, Kensuke Shibata, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT) |
(50) |
14:40-15:05 |
Partial Integrity Assurance Technology PIAT: An Application to Sender Domain Authentication |
Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka (FUJITSU Lab.) |
|
15:05-15:20 |
Break ( 15 min. ) |
Fri, Jul 20 PM Room A 15:20 - 17:00 |
(51) |
15:20-15:45 |
Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service |
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) |
(52) |
15:45-16:10 |
Efficient Group Signature Scheme based on the DDH Problem |
Takuya Yoshida, Koji Okada (Toshiba Solutions) |
(53) |
16:10-16:35 |
An Extension of Sanitizable and Deletable Signature |
Masami Izumi (UEC), Tetsuya Izu (FUJITSU Lab.), Noboru Kunihiro, Kazuo Ohta (UEC) |
(54) |
16:35-17:00 |
(TBA) |
Masahiko Takenaka, Takeshi Shimoyama, Tetsuya Izu (Fujitsu Labs.) |
Fri, Jul 20 PM Room B 15:20 - 17:25 |
(55) |
15:20-15:45 |
A Consideration for Detecting Virus Email by Using Mail Form Information |
Daisuke Miyamoto, Takuji Iimura, Youki Kadobayashi (NAIST) |
(56) |
15:45-16:10 |
An extension of secure OS on virtual machine monitor using split device driver |
Ruo Ando, Youki Kadobayashi (NICT) |
(57) |
16:10-16:35 |
Preliminary studies of secure OS as application platform |
Hidenori Tsuji (IISEC/Institute of Information Tech.), Masaki Hashimoto, Mira Kim, Hidehiko Tanaka (IISEC) |
(58) |
16:35-17:00 |
Phishing detection based on features of mimic content. |
Shinta Nakayama, Hiroshi Yoshiura (UEC) |
(59) |
17:00-17:25 |
Capability-Based System for Distributed Environment |
Masaki Hashimoto, Kazuki Fujisawa, Kunio Miyamoto, Mira Kim, Hidenori Tsuji, Hidehiko Tanaka (IISEC) |