===============================================
Technical Committee on Information Security (ISEC)
Chair: Naoya Torii (Fujitsu Labs.)
Vice Chair: Tsutomu Matsumoto (Yokohama National Univ.), Toshiaki Tanaka (KDDI Labs.)
Secretary: Toru Nakanishi (Okayama Univ.), Junji Shikata (Yokohama National Univ.)
Assistant: Tetsuya Izu (Fujitsu Labs.)
===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Hiroyuki Inaba (Kyoto Inst. of Tech.)
Vice Chair: Michio Nakanishi (Osaka Inst. of Tech.), Noriaki Yoshikai (Nihon Univ.)
Secretary: Soichiro Morishita (Univ. of Tokyo), Kazuhiro Suzuki (Kanagawa Univ.)
Assistant: Norimasa Sugiyama (Osaka Inst. of Tech.), Daisuke Yamakata (Kagawa Univ.)
===============================================
Technical Committee on Information and Communication System Security (ICSS)
Chair: Masakatsu Morii (Kobe Univ.) Vice Chair: Yuu Miyake (KDDI Labs.), Hiroaki Kikuchi (Tokai Univ.)
Secretary: Shiho Moriai (Sony), Daisuke Inoue (NICT)
Assistant: Takashi Nishide (Kyushu Univ.)
===============================================
Technical Committee on Enriched MultiMedia (EMM)
Chair: Noboru Babaguchi (Osaka Univ.)
Vice Chair: Isao Echizen (NII), Akira Nishimura (Tokyo Univ. Info. Sci.)
Secretary: Michiharu Niimi (Kyushu Inst. of Tech.), Ryouichi Nishimura (NICT)
Assistant: Naofumi Aoki (Hokkaido Univ.), Hirohisa Hioki (Kyoto Univ.)
===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)
===============================================
Special Interest Group on Security Psychology and Trust (IPSJ-SPT)
DATE:
Tue, Jul 12, 2011 13:30 - 17:30
Wed, Jul 13, 2011 09:00 - 15:45
PLACE:
Samei Kaikan, Hamamatsu Campus, Shizuoka University
TOPICS:
----------------------------------------
Tue, Jul 12 PM EMM (13:30 - 14:45)
----------------------------------------
(1)/EMM 13:30 - 13:55
Carrier Screen Images Decoding with an Ordinary Digital Camera
Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.)
(2)/EMM 13:55 - 14:20
Recovery of Tampered Pixels for Statistical Fragile Watermarking
Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.)
(3)/EMM 14:20 - 14:45
Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes
Minoru Kuribayashi (Kobe Univ.)
----- Break ( 15 min. ) -----
----------------------------------------
Tue, Jul 12 PM SITE (15:00 - 16:15)
----------------------------------------
(4)/SITE 15:00 - 15:25
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses
Shunichi Mizoguchi, Hiroyuki Inaba (KIT)
(5)/SITE 15:25 - 15:50
Study on person profile about coping behavior under virus infected situation
Hiroaki Kanda, Noriaki Yoshikai, Shun-ichi Kurino (Nihon University)
(6)/SITE 15:50 - 16:15
Cloud Computing Market Expansion and Risk management in U.S. and an analysis of the consensus building factors
-- from the perspective of networking incentive of actors --
Ema Tanaka (FMMC)
----- Break ( 15 min. ) -----
----------------------------------------
Tue, Jul 12 PM Invited Talk (16:30 - 17:30)
----------------------------------------
(7) 16:30 - 17:30
[Invited Talk]
----------------------------------------
Tue, Jul 12 PM SPT (13:30 - 14:45)
----------------------------------------
(8) 13:30 - 13:55
(9) 13:55 - 14:20
(10) 14:20 - 14:45
----- Break ( 15 min. ) -----
----------------------------------------
Tue, Jul 12 PM CSEC (15:00 - 15:50)
----------------------------------------
(11) 15:00 - 15:25
(12) 15:25 - 15:50
----- Break ( 40 min. ) -----
----------------------------------------
Wed, Jul 13 AM ISEC (09:00 - 10:40)
----------------------------------------
(13)/ISEC 09:00 - 09:25
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
(14)/ISEC 09:25 - 09:50
A Note on Security of (u|u+v) Σ PKC against Low-Density Attack
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
(15)/ISEC 09:50 - 10:15
A Low Density Multiple Choice Knapsack Cryptosystem
Akira Hayashi, Toshihiro Koike (KIT)
(16)/ISEC 10:15 - 10:40
The proposal of the evaluation for decryption failure about GGH series
Yosuke Todo, Masakatu Morii (Kobe Univ.)
----- Break ( 15 min. ) -----
----------------------------------------
Wed, Jul 13 AM ISEC (10:55 - 12:10)
----------------------------------------
(17)/ISEC 10:55 - 11:20
Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
(18)/ISEC 11:20 - 11:45
Strongly Asymmetric Public Key Agreement Algorithms
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
(19)/ISEC 11:45 - 12:10
Strongly Asymmetric PKD Cryptographic Algorithms
-- an implementation using the matrix model --
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
----- Lunch ( 75 min. ) -----
----------------------------------------
Wed, Jul 13 PM ISEC&ICSS (13:25 - 14:15)
----------------------------------------
(20)/ICSS 13:25 - 13:50
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ)
(21)/ISEC 13:50 - 14:15
Memory saving implementation of Cyclic Vector Multiplication Algorithm
Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL)
----- Break ( 15 min. ) -----
----------------------------------------
Wed, Jul 13 PM ISEC (14:30 - 15:45)
----------------------------------------
(22)/ISEC 14:30 - 14:55
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC
Masao Kasahara (Osaka Gakuin Univ.)
(23)/ISEC 14:55 - 15:20
Construction of New Classes of Product-Sum Type Public Key Cryptosystem, K(IV)ΣPKC and K(I)ΣΠPKC
Masao Kasahara (Osaka Gakuin Univ)
(24)/ISEC 15:20 - 15:45
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II)
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs)
----------------------------------------
Wed, Jul 13 AM (09:00 - 10:40)
----------------------------------------
(25) 09:00 - 09:25
(26) 09:25 - 09:50
(27) 09:50 - 10:15
(28) 10:15 - 10:40
----- Break ( 15 min. ) -----
----------------------------------------
Wed, Jul 13 AM (10:55 - 12:10)
----------------------------------------
(29) 10:55 - 11:20
(30) 11:20 - 11:45
(31) 11:45 - 12:10
----- Lunch ( 75 min. ) -----
----------------------------------------
Wed, Jul 13 PM (13:25 - 14:15)
----------------------------------------
(32) 13:25 - 13:50
(33) 13:50 - 14:15
----- Break ( 15 min. ) -----
----------------------------------------
Wed, Jul 13 PM (14:30 - 15:45)
----------------------------------------
(34) 14:30 - 14:55
(35) 14:55 - 15:20
(36) 15:20 - 15:45
# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Fri, Sep 9, 2011: Kikai-Shinko-Kaikan Bldg. [Fri, Jul 15]
# SECRETARY:
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-mail: ic-c (to ISEC secretaries)
=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===
# FUTURE SCHEDULE:
Tue, Oct 18, 2011: [Mon, Aug 22]
=== Technical Committee on Information and Communication System Security (ICSS) ===
# SECRETARY:
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-mail: is-qst
# ANNOUNCEMENT:
# Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html
=== Technical Committee on Enriched MultiMedia (EMM) ===
# FUTURE SCHEDULE:
Tue, Sep 20, 2011 - Wed, Sep 21, 2011: [Tue, Jul 19]
=== Special Interest Group on Computer Security (IPSJ-CSEC) ===
=== Special Interest Group on Security Psychology and Trust (IPSJ-SPT) ===
Last modified: 2011-06-20 14:27:30
|
Notification: Mail addresses are partially hidden against SPAM.
|