|
Chair |
|
Kazuo Ota (Univ. of Electro-Comm.) |
Vice Chair |
|
Kazuo Takaragi (Hitachi), Toru Fujiwara (Osaka Univ.) |
Secretary |
|
Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Noboru Kunihiro (Univ. of Tokyo) |
Assistant |
|
Katsuyuki Takashima (Mitsubishi Electric) |
|
Conference Date |
Wed, Dec 17, 2008 10:20 - 16:35 |
Topics |
|
Conference Place |
Kikai-Shinko-Kaikan Bldg. |
Address |
3-5-8, Shiba-kouen, Minato-ku, Tokyo, 105-0011 Japan |
Transportation Guide |
8 min. walk from Kamiya-cho Sta. on Subway Hibiya Line or 10 min. walk from Daimon Sta. both on Subway Asakusa Line and on Oedo Line http://www.jspmi.or.jp/kaikan.htm |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Wed, Dec 17 AM 10:20 - 12:00 |
(1) |
10:20-10:45 |
Measure of failure for the company infrastructure ISEC2008-89 |
Koichiro Ozasa, Satoshi Ono (Kogakuin Univ.) |
(2) |
10:45-11:10 |
Web Server Software Struture for Scalability ISEC2008-90 |
Haruki Mori, Satoshi Ono (Kogakuin Univ.) |
(3) |
11:10-11:35 |
Access management method for Least Privilege implementation By the identity federation cross-organizations ISEC2008-91 |
Takahito Motojima, Satoshi Ono (kogakuin univ) |
(4) |
11:35-12:00 |
Negotiate the Trust built in The Internet ISEC2008-92 |
Takashi Hosokawa, Satoshi Ono (Kogakuin Univ.) |
Wed, Dec 17 PM 13:00 - 16:35 |
(5) |
13:00-13:25 |
Self-construction of Home Domain by Using Entry Device List ISEC2008-93 |
Sho Ikeyama, Yoshihiro Hori, Yoshiaki Shiraishi, Akira Iwata (NIT) |
(6) |
13:25-13:50 |
A Masquerade Detecting Method Based On the TF-IDF Model ISEC2008-94 |
Geng Dai, Zhou Jian, Haruhiko Shirai, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ) |
(7) |
13:50-14:15 |
On Security and Constructibility of Linear Quotient Codes for Quantum Cryptography ISEC2008-95 |
Mitsuru Hamada (Tamagawa Univ.) |
(8) |
14:15-14:40 |
A Knapsack Cryptosystem Resisting Wellknown Attacks ISEC2008-96 |
Kunikatsu Kobayashi (Yamagata Univ,) |
|
14:40-14:55 |
Break ( 15 min. ) |
(9) |
14:55-15:20 |
Cryptosystems on Algebraic Tori
-- Some Efficient Algorithms for Squaring -- ISEC2008-97 |
Tomoko Yonemura, Kenichiro Furuta, Yoshikazu Hanatani, Taichi Isogai, Yuichi Komano, Hirofumi Muratani, Hanae Nozaki, Kenji Ohkuma, Atsushi Shimbo (Toshiba Corp.) |
(10) |
15:20-15:45 |
Fast Exponentiation Methods for Cryptosystems on Algebraic Tori ISEC2008-98 |
Taichi Isogai, Kenji Ohkuma, Yuichi Komano, Atsushi Shimbo, Hanae Nozaki, Yoshikazu Hanatani, Kenichiro Furuta, Hirofumi Muratani, Tomoko Yonemura (Toshiba) |
(11) |
15:45-16:10 |
Construction of the experiment environment for the CPA attack ISEC2008-99 |
Daisaku Minamizaki, Keisuke Iwai, Takakazu Kurokawa (NDA) |
(12) |
16:10-16:35 |
Power Analysis against a FPGA Implementation of the AES with SubBytes in a memory table ISEC2008-100 |
Hiroyuki Kawakita, Yusei Nishimoto, Kiyohiko Ishikawa, Hiroyuki Imaizumi (NHK) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-: ic-c (to ISEC secretaries) |
Last modified: 2008-10-21 13:25:39
|