Thu, Jul 14 PM Session A-1 EMM 13:00 - 15:05 |
(1) EMM |
13:00-13:25 |
A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise |
Shogo Shigemoto, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(2) EMM |
13:25-13:50 |
Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle |
Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(3) EMM |
13:50-14:15 |
Study of an information extraction method using artificial fiber pattern with a clear ink |
Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) |
(4) EMM |
14:15-14:40 |
Technique for Embedding Information by Constructing Protuberance With Inner Walls of Objects Fabricated With 3-D Printers |
Kousuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.) |
(5) EMM |
14:40-15:05 |
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers |
Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) |
Thu, Jul 14 PM Session B-1 SITE 13:00 - 15:05 |
(6) SITE |
13:00-13:25 |
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing |
Motoi Tanaka, Hiroyuki Inaba (KIT) |
(7) SITE |
13:25-13:50 |
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time |
Hiroaki Kuno, Hiroyuki Inaba (KIT) |
(8) SITE |
13:50-14:15 |
A Study of a Simple Model of Information Safety Education
-- A Departure from Convetional Information Moral Education Model -- |
Takahiro Haga (GSGU), Akiko Igarashi (Uchida), Katsurou Nishioka (UHD) |
(9) SITE |
14:15-14:40 |
Developing rules to transmit our intentions in Computer Mediated Communication |
Nobuyuki Yoshinga (YPU) |
(10) SITE |
14:40-15:05 |
Privacy Problems and Social Relationships
-- Privacy Problems Caused by the Visualization and Manipulation of Social Relationships -- |
Takushi Otani (Kibi International Univ.) |
|
15:05-15:25 |
Break ( 20 min. ) |
Thu, Jul 14 PM Session A-2 ICSS 15:25 - 17:05 |
(11) ICSS |
15:25-15:50 |
On the Conditions for Successful RF Retroreflector Attacks |
Haruka Hoshino (Waseda Univ.), Masahiro Kinugawa (Sendai KOSEN), Yuichi Hayashi (Tohoku Gakuin Univ.), Tatsuya Mori (Waseda Univ.) |
(12) ICSS |
15:50-16:15 |
Evaluation of Clustering Analysis Based on Malware Traffic Model |
Mitsuhiro Hatada (Waseda Univ./NTT Communications), Tatsuya Mori (Waseda Univ.) |
(13) ICSS |
16:15-16:40 |
Cyber security for Industrial control systems(ICS) in IoT era |
Yuma Takayama (IsecG(MFE)), Ichiro Koshijima, Tomomi Aoyama (nitech) |
(14) ICSS |
16:40-17:05 |
Investigation of Android Markets using Static Detector for Packed Applications |
Hiroki Nakano, Zhiyong Yang, Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Thu, Jul 14 PM Session B-2 CSEC(1)/SPT 15:25 - 17:05 |
(15) |
15:25-15:50 |
Major topics in information security research from viewpoints of financial institutions
NAKAMURA KEISUKE, UNE MASASHI (Bank of Japan) |
(16) |
15:50-16:15 |
Proposal of Business Risk Assessment System for Cyber Security Threats
Isobe Yoshiaki, Sugimoto Akihiro, Nakakouji Hirofumi (Hitachi Ltd.) |
(17) |
16:15-16:40 |
Datasets for Anti-Malware Research ~MWS Datasets 2016~
Takata Yuta (NTT Secure Platform Laboratories), Terada Masato (Hitachi Ltd.), Murakami Junichi (FFRI, Inc.), Kasama Takahiro (National Institute of Information and Communications Technology), Yoshioka Katsunari (Yokohama National University), Hatada Mitsuhiro (NTT Communications Corporation) |
(18) |
16:40-17:05 |
Report on the First IEEE European Symposium on Security and Privacy
Matsumoto Shinichi (Institute of Systems, Information Technologies and Nanotechnologies), Matsuura Kanta (Institute of Industrial Science, the University of Tokyo) |
Fri, Jul 15 AM Session A-3 ISEC(1) 09:30 - 11:35 |
(19) ISEC |
09:30-09:55 |
One-time pad chaotic cryptography using augmented Lorenz equations |
Kenichiro Cho, Takaya Miyano (Ritsmeikan Univ) |
(20) ISEC |
09:55-10:20 |
Further improving security of Vector Stream Cipher |
Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) |
(21) ISEC |
10:20-10:45 |
Improvement of Winternitz one time signature and its security proof |
Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST) |
(22) ISEC |
10:45-11:10 |
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption |
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) |
(23) ISEC |
11:10-11:35 |
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation |
Hui Zhao, Kouichi Sakurai (Kyushu Univ.) |
Fri, Jul 15 AM Session B-3 CSEC(2) 09:55 - 11:10 |
(24) |
09:55-10:20 |
|
(25) |
10:20-10:45 |
Evaluation of Memory Access Control to Process Information for Attack Avoidance using Virtual Machine Monitor
○Sato Masaya, Yamauchi Toshihiro, Taniguchi Hideo (Okayama University) |
(26) |
10:45-11:10 |
Study on Filtering Method for the DNS Water Torture Attack Utilizing the Naive Bayes Classifier
○Yoshida Takuro, Takeuchi Yuya, Kobayashi Ryotaro, Kato Masahiko, Kishimoto Hiroyuki |
|
11:10-13:00 |
Lunch Break ( 110 min. ) |
Fri, Jul 15 PM Session A-4 ISEC(2) 13:00 - 14:15 |
(27) ISEC |
13:00-13:25 |
Efficient Discrete Gaussian Sampling on Constrained Devices |
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) |
(28) ISEC |
13:25-13:50 |
Worst Case Short Lattice Point Enumeration on Block Reduced Bases |
Atsushi Takayasu, Noboru Kunihiro (Univ. Tokyo) |
(29) ISEC |
13:50-14:15 |
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem |
Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) |
Fri, Jul 15 PM Session B-4 CSEC(3) 13:00 - 14:15 |
(30) |
13:00-13:25 |
|
(31) |
13:25-13:50 |
Risk Analysis for Data Privacy based on Identifiability Analysis with k-Anonymity
○Yamaoka Yuji, Itoh Kouichi |
(32) |
13:50-14:15 |
|
|
14:15-14:30 |
Break ( 15 min. ) |
Fri, Jul 15 PM Session A-5 ISEC(3) 14:30 - 15:45 |
(33) ISEC |
14:30-14:55 |
Algebraic Surface Cryptosystems using Polynomial Approximate GCD |
Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST) |
(34) ISEC |
14:55-15:20 |
A Faster Hardware for 254-bit Prime-Field Pairing with Dedicated Pipeline Modular Multipliers and Inverters |
Daisuke Fujimoto, Yusuke Nagahama, Tsutomu Matsumoto (YNU) |
(35) ISEC |
15:20-15:45 |
A Durability Evaluation for Metallic-Foil Artifact-Metrics |
Naoki Yoshida, Tsutomu Matsumoto (YNU) |
Fri, Jul 15 PM Session B-5 CSEC(4) 14:30 - 16:10 |
(36) |
14:30-14:55 |
|
(37) |
14:55-15:20 |
|
(38) |
15:20-15:45 |
|
(39) |
15:45-16:10 |
|