===============================================
Technical Committee on Information Security (ISEC)
Chair: Kazuo Ota (Univ. of Electro-Comm.) Vice Chair: Kazuo Takaragi (Hitachi), Toru Fujiwara (Osaka Univ.)
Secretary: Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Noboru Kunihiro (Univ. of Tokyo)
Assistant: Katsuyuki Takashima (Mitsubishi Electric)
===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Toshinari Tsuruhara (DT)
Vice Chair: Hiroyuki Inaba (Kyoto Inst. of Tech.), Michio Nakanishi (Osaka Inst. of Tech.)
Secretary: Tetsuya Morizumi (Toyo Networks & System Integration), Eizen Kimura (Ehime Univ.)
Assistant: Yukiko Kawaguchi (Uekusa), Soichiro Morishita (Univ. of Tokyo)
===============================================
Special Interest Group on Computer Security (IPSJ-CSEC)
DATE:
Thu, Jul 24, 2008 13:00 - 17:50
Fri, Jul 25, 2008 09:55 - 17:25
PLACE:
Fukuoka Institute of System LSI Design Industry(http://www.ist.or.jp/lsi/pg03_01.html. Prof. Toshihiko Shimokawa)
TOPICS:
----------------------------------------
Thu, Jul 24 PM (13:00 - 15:05)
----------------------------------------
(1) 13:00 - 13:25
A Note on the Security of KMN PKC and Presentation of Challenge Problems
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami, Takeshi Nasako (Osaka Electro-Comm. Univ.)
(2) 13:25 - 13:50
On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 --
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.)
(3) 13:50 - 14:15
Design Policy of MPKC based on Piece in Hand Concept
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.)
(4) 14:15 - 14:40
Knapsack Cryptosystem on Elliptic Curves of Trace Tow
Koichiro Noro, Kunikatsu Kobayashi (Yamagata Univ.)
(5) 14:40 - 15:05
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA)
----------------------------------------
Thu, Jul 24 PM (13:00 - 14:40)
----------------------------------------
(6) 13:00 - 13:25
An Implementation of Partial Integrity Assurance Technology:PIAT for Audio and Video Data (II)
Takashi Yoshioka, Masahiko Takenaka (Fujitsu Labs.)
(7) 13:25 - 13:50
Efficiency of a Redactable Signature with Tree Construction
Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.)
(8) 13:50 - 14:15
A System against Leakage though Paper Documents in Multi-Vendor Environment
Yasuhiro Fujii, Ryu Ebisawa, Yoshinori Honda, Seiichi Susaki (HITACHI)
(9) 14:15 - 14:40
Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone
Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)
----------------------------------------
Thu, Jul 24 PM (15:20 - 17:50)
----------------------------------------
(10) 15:20 - 15:45
Consistency between Moral Rights and Economic Rights in Digital Rights Management of Webcasting Contents
Haruo Kodama (NIME)
(11) 15:45 - 16:10
Basic Study on Designing Navigation Systems for the Blind
Kazuo Kamata (Utusnomiya Univ.), Tatsufumi Imai (Nippon Signal)
(12) 16:10 - 16:35
A Study on Some Direct and Inverse Problems Related to Utility and Risk Based on the Introduction of Higher Order Correlations between Sound and Electromagnetic Waves around an ICT Environment
-- Under a Viewpoint of Relationism First --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Peviously, with Hiroshima Univ.)
(13) 16:35 - 17:00
Study on Reputation Systems for Trusty Information Network
Noriaki Yoshikai (Niohn Univ.)
(14) 17:00 - 17:25
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC)
(15) 17:25 - 17:50
Study of method for expressing context
Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS)
----------------------------------------
Thu, Jul 24 PM (15:20 - 17:00)
----------------------------------------
(16) 15:20 - 15:45
Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
(17) 15:45 - 16:10
Information Leakage Prevention Function of host based for P2P File Exchange Environment
Masaaki Matsuoka, Takahiro Matsuki (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
(18) 16:10 - 16:35
Study of Database for information sharing of P2P File Exchange Environment
Masato Terada (Hitachi), Yuichi Miyagawa (CROSSWARP), Masaaki Matsuoka, Takahiro Matsuki (LAC), Tetsuro Kito, Hirofumi Nakakoji (Hitachi)
(19) 16:35 - 17:00
An enhancement of VMM snapshot utility for detcting code injection
Ruo Ando, Youki Kadobayashi, Yoichi Shinoda (NICT)
----------------------------------------
Fri, Jul 25 AM (09:55 - 12:00)
----------------------------------------
(20) 09:55 - 10:20
Detecting of Unknown Computer Virus Variants Based on Computer Behavior
Haruka Mimori, Koki Abe (UEC)
(21) 10:20 - 10:45
Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems
Ryoya Miyazawa, Koki Abe (UEC)
(22) 10:45 - 11:10
A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT)
(23) 11:10 - 11:35
Examination of the issues in designing of electronic signature documentation system
Miyuki Takao, Koichiro Hayashi (IISEC)
(24) 11:35 - 12:00
Clone Resistance of Paper Artifact-Metrics with Segmented Matching
Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU)
----------------------------------------
Fri, Jul 25 AM (09:55 - 12:00)
----------------------------------------
(25) 09:55 - 10:20
Architecture Optimization of a Group Signature Circuit
Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC)
(26) 10:20 - 10:45
A Lattice Model of the General Confidentiality Policies
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
(27) 10:45 - 11:10
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases
Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)
(28) 11:10 - 11:35
Proposal of Anonymos Routing Technique with DHT
Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.)
(29) 11:35 - 12:00
Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document
Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.)
----------------------------------------
Fri, Jul 25 PM (13:00 - 15:05)
----------------------------------------
(30) 13:00 - 13:25
Implementation of Block Cipher Camellia with a Configurable and Extensible Processor
Kazuyoshi Matsuo, Koki Abe (UEC)
(31) 13:25 - 13:50
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
(32) 13:50 - 14:15
Hash Function Using MMO Compression Function and MDP Domain Extension
Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.)
(33) 14:15 - 14:40
Traitor Tracing from ID based Broadcast Encryption
Ryuichi Sakai (OECU)
(34) 14:40 - 15:05
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography
Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
----------------------------------------
Fri, Jul 25 PM (13:00 - 15:05)
----------------------------------------
(35) 13:00 - 13:25
Invalidation of a Mailing-list Address against Spam
Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)
(36) 13:25 - 13:50
Proposal of a Cue & Response Based User Authentication Using Unclear Image
Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
(37) 13:50 - 14:15
Self expandable RBAC for distributed systems
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)
(38) 14:15 - 14:40
Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)
(39) 14:40 - 15:05
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
----------------------------------------
Fri, Jul 25 PM (15:20 - 17:25)
----------------------------------------
(40) 15:20 - 15:45
Watermarking Method with a Quasi-One-Way Function
Kazuo Ohzeki, Engyoku Gi (SIT)
(41) 15:45 - 16:10
Ring Authenticated Group Key Establishment with Member Repudiation
Elliot T. Taniguchi, Hirosuke Yamamoto (Univ. of Tokyo)
(42) 16:10 - 16:35
A Coding Scheme using Matched Filter to protect IEEE802.11i 4-Way Handshake against DoS attack
Ryuzou Nishi (PCC), Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
(43) 16:35 - 17:00
Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.)
(44) 17:00 - 17:25
A Secure Association Rules Mining Scheme Based on Frequent-Pattern Tree
Chunhua Su, Kouichi Sakurai (Kyushu Univ.)
----------------------------------------
Fri, Jul 25 PM (15:20 - 16:35)
----------------------------------------
(45) 15:20 - 15:45
A Study on Detecting Information Leak Virus by Activity Monitoring
Tetsuro Kito (Hitachi, Ltd.), Takahiro Matsuki, Masaaki Matsuoka (LAC), Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.)
(46) 15:45 - 16:10
Development of publicity function of the illegitimate activity host by the IP marking
Takahiro Matsuki, Masaaki Matsuoka (LAC Co., Ltd), Masato Terada, Tetsuro Kito, Hirofumi Nakakoji (Hitachi Ltd.)
(47) 16:10 - 16:35
P2P Node Detection method based on Connection Analysis
Tomohiro Shigemoto, Kazuya Okochi, Masato Terada (Hitachi Ltd.)
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Fri, Sep 12, 2008: Kikai-Shinko-Kaikan Bldg. [Thu, Jul 17]
# SECRETARY:
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-mail: ic-c (to ISEC secretaries)
=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===
# FUTURE SCHEDULE:
Fri, Oct 17, 2008: [Thu, Aug 14]
=== Special Interest Group on Computer Security (IPSJ-CSEC) ===
Last modified: 2008-07-02 23:09:55
|
Notification: Mail addresses are partially hidden against SPAM.
|