Thu, Dec 21 ISEC Chair: Yuuji Suga (IIJ) 09:55 - 10:45 |
(1) |
09:55-10:20 |
Fundamental Study of Classification of Attackers by Multiple Honeypots |
Kazuya Yamashita, Okino Koji (Univ. of Toyama) |
(2) |
10:20-10:45 |
Effect on Mix Columns to the Security of Minalpher
-- Experimental Results for 6 Rounds -- |
Yuki Kishi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ) |
|
10:45-11:00 |
Break ( 15 min. ) |
Thu, Dec 21 COMP 11:00 - 12:40 |
(3) |
11:00-11:25 |
Space Efficient Algorithms for Maximum (Weight) Independent Set on Circular Arcs |
Shohei Urakawa (Kobe Univ.), Tom C. van der Zanden (Utrecht Univ.), Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST) |
(4) |
11:25-11:50 |
O(n^{1/3})-space algorithm for the grid graph reachability problem |
Ryo Ashida, Kotaro Nakagawa (Tokyo Tech) |
(5) |
11:50-12:15 |
Maximum k-path Vertex Cover Problem on Graph Classes |
Tsuyoshi Yagita, Eiji Miyano, Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST), Tom C. van der Zanden (Utrecht U.) |
(6) |
12:15-12:40 |
An optimal strategy of the second player for the 1-round voronoi game on trees |
Akihiro Sugimoto (Kobe Univ.), Toshiki Saitoh (Kyushu Inst. of Tech.) |
|
12:40-14:10 |
Lunch Break ( 90 min. ) |
Thu, Dec 21 ISEC Chair: Kazuto Ogawa (NHK) 14:10 - 15:10 |
(7) |
14:10-15:10 |
[Invited Talk]
Foundations and practical studies of secure computation |
Ryo Kikuchi (NTT) |
|
15:10-15:25 |
Break ( 15 min. ) |
Thu, Dec 21 ISEC Chair: Atsushi Fujioka (Kanagawa Univ.) 15:25 - 17:05 |
(8) |
15:25-15:50 |
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols |
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) |
(9) |
15:50-16:15 |
Security and Enhancement of a Searchable Public-key Encryption Secure against Keyword Guessing Attack |
Takanori Saito, Toru Nakanishi (Hiroshima Univ) |
(10) |
16:15-16:40 |
Blacklistable Anonymous Credential System with Reputation Using Accumulator |
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) |
(11) |
16:40-17:05 |
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response |
Kazuomi Oishi (SIST) |
Fri, Dec 22 ISEC Chair: Toshihiro Ohigashi (Tokai Univ.) 09:50 - 11:30 |
(12) |
09:50-10:15 |
Reputation System with Confidentiality to Administrator Using Linear Homomorophic Signatures |
Daiki Uenoyama, Toru nakanishi (Hiroshima Univ.) |
(13) |
10:15-10:40 |
Optimizing Bleichenbacher's Attack on Schnorr-Type Signatures with Barely Biased Nonces |
Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe, Tatsuaki Okamoto (NTT) |
(14) |
10:40-11:05 |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Relationship between LOR security and SW security -- |
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
(15) |
11:05-11:30 |
A Note on Rearrangement Errors in a Card-Based Protocol |
Takaaki Mizuki (Tohoku Univ.), Yuichi Komano (Toshiba) |
|
11:30-13:00 |
Lunch Break ( 90 min. ) |
Fri, Dec 22 COMP 13:00 - 14:00 |
(16) |
13:00-14:00 |
[Invited Talk]
|
Ryuhei Mori (Tokyo Tech) |
|
14:00-14:15 |
Break ( 15 min. ) |
Fri, Dec 22 COMP 14:15 - 15:30 |
(17) |
14:15-14:40 |
An ILP Formulation for Maximum Lengh Interval Graph Decomposition Problem |
Keisuke Inoue (KTC) |
(18) |
14:40-15:05 |
Efficient Enumeration of Dominating Sets in K-Degenerate graphs |
Kazuhiro Kurita (HU), Kunihiro Wasa, Takeaki Uno (NII), Hiroki Arimura (HU) |
(19) |
15:05-15:30 |
Physical Bucket Sort with Restricted take Operations |
Atsuki Nagao, Wei Wu (Seikei Univ.), Hiro Ito (UEC) |