|
Chair |
|
Shinichi Kawamura |
Vice Chair |
|
Masakatsu Morii, Mitsuru Matsui |
Secretary |
|
Shoichi Hirose, Hiroshi Doi |
Assistant |
|
Shiho Moriai |
|
Technical Committee on Office Information System (OIS) |
|
|
Chair |
|
Masakatsu Morii |
Secretary |
|
Naoki Mizutani, Ko Fujimura |
Assistant |
|
Masami Mohri |
|
Conference Date |
Mon, Nov 14, 2005 13:00 - 17:00
Tue, Nov 15, 2005 09:15 - 16:00 |
Topics |
|
Conference Place |
Collaboration Center, Kitakyushu Science and Research Park |
Address |
2-1 Hibikino, Wakamatsu-ku Kitakyushu City 808-0135 |
Transportation Guide |
http://www.ksrp.or.jp/e/09access/index.html |
Contact Person |
Prof. Takashi Satoh
093-695-3262 |
Announcement |
Please join us for a social gathering. |
Mon, Nov 14 PM 13:00 - 17:00 |
(1) |
13:00-13:25 |
A Study on Coordination Assistance of the Clothes Using Picture Search |
Shunsuke Sakazaki, Toshihiko Wakahara (Fkuoka Institute of Technology) |
(2) |
13:25-13:50 |
Investigation of retrieval method reflecting user's feeling |
Kaoru Sugita, Masao Yokota (FIT), Akihiro Miyakawa (Nanao City, Ishikawa Pref.), Giuseppe De Marco, Leonard Barolli (FIT), Yoshitaka Shibata (Iwate Prefectural Univ.) |
(3) |
13:50-14:15 |
Some Expansions of Universal Digital Talking Book Authoring System "HIMAWARI" |
Reiko Shinohara, Takanori Takeuchi, Yukio Rikiso (U. of Hyogo) |
(4) |
14:15-14:40 |
A Study on the Configuration of the Community System |
Toshihiko Wakahara, Yuuya Hiwatashi (FIT), Hirofumi Iori, Jiriki Tei, Munehisa Shibata (Kyusyu Keiso) |
(5) |
14:40-15:05 |
Development of Multimedia Use in Distant Education of Alice Springs School of Air |
Shiro Uesugi (Matsuyama Univ.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(6) |
15:20-15:45 |
A Proposal of Three Term Public-Key Cryptosystem, KM(3)-PKC
-- Along with Challenge Problems on KM(3)-PKC of Very Small Key-Size -- |
Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami (Osaka Electro-Comm. Univ.) |
(7) |
15:45-16:10 |
A Digital Signature Suitable for XTR |
Masaaki Shirase, Yasushi Hibino (JAIST) |
(8) |
16:10-16:35 |
Study of System Application for MUGI Hardware |
Takashi Matsumoto, Toru Owada, Shigeki Taira (Hitachi), Yoshifumi Kawamura (Renesas) |
(9) |
16:35-17:00 |
A study of the reconstruction of display image on a PC's monitor by unintiontional electromagnetic emanation
-- Emanated electromagnetic signal measurement method and reconstructed display image using measured signal emanation -- |
Hidenori Sekiguchi, Hidema Tanaka, Shinji Seto, Akihiro Yamamura (NICT) |
Tue, Nov 15 AM 09:15 - 12:00 |
(10) |
09:15-09:40 |
A Study on Wartermark for Texture Images on 3D Virtual Space |
Shunsuke Araki (Kyushu Institute of Tech.) |
(11) |
09:40-10:05 |
Dynamic Access Control Method for Ad-Hoc Information Sharing |
Yoichiro Morita, Masayuki Nakae, Ryuichi Ogawa (NEC) |
(12) |
10:05-10:30 |
An Information Leakage Risk Evaluation Method Based n ecurity Configuration |
Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa, Itaru Hosomi (NEC) |
(13) |
10:30-10:55 |
Examination and implementation of network security against distributed denial of service attacks
-- Design and introduction of DTI hub -- |
Kentarou Nagayama, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ.) |
|
10:55-11:10 |
Break ( 15 min. ) |
(14) |
11:10-11:35 |
On Construction of Periodic Sequence on Algebraic Curve over Finite Field |
Takayasu Kaida (Kinki Univ.) |
(15) |
11:35-12:00 |
Some Results of Brute Force Attack for a Random Seed and Security Evaluation of Pseudo Random Number Generator using Logistic-Mapping |
Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Kyoki Imamura (Kyushu Inst. of Tech.) |
Tue, Nov 15 PM 13:15 - 16:00 |
(16) |
13:15-13:40 |
Improved Collision Attack on MD5 |
Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.) |
(17) |
13:40-14:05 |
Efficient Algorithm for Computing Linear Probability of constant addition (2) |
Kazunori Sumikawa (TUS), Hirotaka Ittogi (Canon), Toshinobu Kaneko (TUS) |
(18) |
14:05-14:30 |
On Reference Positions and Bits in Differential Power Analysis Attack against DES |
Yousuke Kakuishi, Akihiko Sasaki, Koki Abe (UEC) |
|
14:30-14:45 |
Break ( 15 min. ) |
(19) |
14:45-15:10 |
A Universally Composable Commitment Protocol based on KEA1 and Revocable DDH Assumptions |
Yosuke Iwasaki, Seiko Arita (IISEC) |
(20) |
15:10-15:35 |
Asymmetric 3-party Password Authenticated Kay Exchange |
Toru Iino, Shin'ichiro Matsuo (NTT DATA), Hiroto Matsuoka, Wakaha Ogata (Tokyo Inst. of Tech.) |
(21) |
15:35-16:00 |
A Encryption Scheme with Recording Decryption Evidence |
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Shoichi Hirose(School of Engineering, The University of Fukui)
TEL0776-27-9738,FAX0776-27-9738
E-: ic-c (to ISEC secretaries) |
OIS |
Technical Committee on Office Information System (OIS) |
Contact Address |
Naoki Mizutani
Nara Sangyo University, Faculty of Business Administration
Tateno-kita, Sango, Ikoma-gun, Nara 636-8503
TEL0745-73-7800,FAX0745-72-0822
_m |
Last modified: 2005-11-16 14:45:44
|
Notification: Mail addresses are partially hidden against SPAM.
|