Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Koji Nakao (KDDI/NICT) |
Vice Chair |
|
Masakatsu Morii (Kobe Univ.), Yuu Miyake (KDDI Labs.) |
Secretary |
|
Naoto Sone (Naruto Univ.), Shiho Moriai (Sony) |
Assistant |
|
Daisuke Inoue (NICT) |
|
Conference Date |
Fri, Nov 5, 2010 10:30 - 17:15 |
Topics |
General |
Conference Place |
Auditorium, Hiroshima City University |
Address |
Hiroshima City University, 3-4-1 Ozuka-Higashi, Asa-Minami-Ku, Hiroshima, 731-3194, JAPAN |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Fri, Nov 5 AM 10:30 - 17:15 |
(1) |
10:30-10:55 |
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application ICSS2010-44 |
Masakazu Soshi (Hiroshima City Univ.) |
(2) |
10:55-11:20 |
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks ICSS2010-45 |
Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.) |
(3) |
11:20-11:45 |
Proposal of Time-limited Key Management Scheme Using One-way Functions ICSS2010-46 |
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) |
|
11:45-13:00 |
Break ( 75 min. ) |
(4) |
13:00-13:25 |
An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications ICSS2010-47 |
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) |
(5) |
13:25-13:50 |
A Timed-Release Proxy Re-Encryption Scheme and its Applications ICSS2010-48 |
Keita Emura, Atsuko Miyaji, Kazumasa Omote (JAIST) |
(6) |
13:50-14:15 |
Ontological Approach toward Cybersecurity in Cloud Computing ICSS2010-49 |
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) |
|
14:15-14:30 |
Break ( 15 min. ) |
(7) |
14:30-14:55 |
Network Topology Analysys for Web Malware Risk Assesment ICSS2010-50 |
Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) |
(8) |
14:55-15:20 |
A Document Access Control Model Based on Role and Security Policy ICSS2010-51 |
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) |
(9) |
15:20-15:45 |
Development of Multifactor Authentication Platform with a Single Sign-On Function ICSS2010-52 |
Jiro Yamada, Satoshi Yagi, Isoo Ueno, Takeshi Kitagawa, Hidetoshi Takasugi (NTT Communications) |
|
15:45-16:00 |
Break ( 15 min. ) |
(10) |
16:00-16:25 |
Determining granularity of URL filtering based on tree structure of malicious website URL ICSS2010-53 |
Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh (NTT) |
(11) |
16:25-16:50 |
A Shellcode Analysis Method using CPU emulator and Dynamic Binary Instrumentation ICSS2010-54 |
Chiaki Jimbo, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) |
(12) |
16:50-17:15 |
A Method of Sandbox Analysis of Malware Acting with Use of Online Services ICSS2010-55 |
Kousuke Murakami, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
Last modified: 2010-10-10 22:37:21
|