Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 10:30 |
Aomori |
Hirosaki University |
Correlation Problems between Security Protection and Intellectual Property Protection of Information Haruo Kodama (Open Univ. of Japan/SOKENDAI) ISEC2010-10 SITE2010-6 ICSS2010-16 |
The right of information covered by security protection is discussed in terms of privacy. On the other hand, when it is ... [more] |
ISEC2010-10 SITE2010-6 ICSS2010-16 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 10:55 |
Aomori |
Hirosaki University |
A Study on Log Analysis Based on Tendency of IDS Alert Events Tsuyoshi Toda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2010-11 SITE2010-7 ICSS2010-17 |
With the spread of computer network, important information have been exchanged and managed on a network. However, worm d... [more] |
ISEC2010-11 SITE2010-7 ICSS2010-17 pp.7-12 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 11:20 |
Aomori |
Hirosaki University |
Limit of "Control Theory" of Privacy
-- Presentation of Identity and Context Dependency of Privacy -- Takushi Otani (Kibi International Univ.) ISEC2010-12 SITE2010-8 ICSS2010-18 |
The concept of Privacy has enlarged with changes in technology and society. After the 1960s, when modern information tec... [more] |
ISEC2010-12 SITE2010-8 ICSS2010-18 pp.13-19 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:25 |
Aomori |
Hirosaki University |
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2010-13 SITE2010-9 ICSS2010-19 |
We study a Viterbi search for the maximum differential characteristic
probability ($DCP_{max}$) of a block cipher wit... [more] |
ISEC2010-13 SITE2010-9 ICSS2010-19 pp.21-25 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:50 |
Aomori |
Hirosaki University |
Protection Mode Against Cache Attack (HYRAL) Kouzou Hirata (LIS) ISEC2010-14 SITE2010-10 ICSS2010-20 |
It is known that the Prime+probe method of Dag Arne Osuik, Adi shamir, and Eran Tromer[1] is the most efficient methods ... [more] |
ISEC2010-14 SITE2010-10 ICSS2010-20 pp.27-33 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 14:15 |
Aomori |
Hirosaki University |
An Optimization of AES Decryption Using the Bitslice Technique Fumihiko Sano (Toshiba Solutions Corporation) ISEC2010-15 SITE2010-11 ICSS2010-21 |
We implemented a decryption process of AES with new bitslice technique by K\"{a}sper et al. for encryption. In conventio... [more] |
ISEC2010-15 SITE2010-11 ICSS2010-21 pp.35-39 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 14:40 |
Aomori |
Hirosaki University |
An Artifact-Metric System which Extracts Values Unique to Individual Paper Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2010-16 SITE2010-12 ICSS2010-22 |
Artifact-metrics is an automated method of authenticating physical object based on a measurable intrinsic characteristic... [more] |
ISEC2010-16 SITE2010-12 ICSS2010-22 pp.41-46 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 15:05 |
Aomori |
Hirosaki University |
Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.) ISEC2010-17 SITE2010-13 ICSS2010-23 |
Recently, the cellular phone penetration rate increased. One person came to own two or more cellular phones. On the othe... [more] |
ISEC2010-17 SITE2010-13 ICSS2010-23 pp.47-53 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:25 |
Aomori |
Hirosaki University |
Evaluating Destination Hosts of Malware Based on Search Engine Results Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) ISEC2010-18 SITE2010-14 ICSS2010-24 |
Malware dynamic analysis using isolated environment couldn't obtain enough results because existing malwares (e.g., Bots... [more] |
ISEC2010-18 SITE2010-14 ICSS2010-24 pp.75-80 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:50 |
Aomori |
Hirosaki University |
Image Authentication with Access Control Based on Reversible Data Hiding Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2010-19 SITE2010-15 ICSS2010-25 |
This paper proposes an image authentication with access control based on reversible data hiding. The proposed method gen... [more] |
ISEC2010-19 SITE2010-15 ICSS2010-25 pp.81-86 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 14:15 |
Aomori |
Hirosaki University |
Building Ontology of Cybersecurity Operational Information Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) ISEC2010-20 SITE2010-16 ICSS2010-26 |
Cyber threats come beyond the border of countries. However, most organizations are currently coping with them individual... [more] |
ISEC2010-20 SITE2010-16 ICSS2010-26 pp.87-91 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 14:40 |
Aomori |
Hirosaki University |
Access policy management architecture for virtual server consolidation systems Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC) ISEC2010-21 SITE2010-17 ICSS2010-27 |
Recently virtual-machine based server consolidation systems have been rapidly adopted in the market. With these systems ... [more] |
ISEC2010-21 SITE2010-17 ICSS2010-27 pp.93-100 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 15:05 |
Aomori |
Hirosaki University |
On the use and misuse of E-mail sender authentication mechanisms Tatsuya Mori (NTT) ISEC2010-22 SITE2010-18 ICSS2010-28 |
E-mail sender authentication is a promising way of verifying the sources of e-mail messages. Since to- day’s primary e-m... [more] |
ISEC2010-22 SITE2010-18 ICSS2010-28 pp.101-106 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:25 |
Aomori |
Hirosaki University |
Improvement of Rainbow MPKC Signature system Masahito Gotaishi (Chuo Univ.) ISEC2010-24 SITE2010-20 ICSS2010-30 |
Rainbow signature system is making effective use of the advantage of
multivariate public key cryptosystem (MPKC) and o... [more] |
ISEC2010-24 SITE2010-20 ICSS2010-30 pp.113-117 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:50 |
Aomori |
Hirosaki University |
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) ISEC2010-25 SITE2010-21 ICSS2010-31 |
[more] |
ISEC2010-25 SITE2010-21 ICSS2010-31 pp.119-122 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 10:30 |
Aomori |
Hirosaki University |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2010-26 SITE2010-22 ICSS2010-32 pp.123-132 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 10:55 |
Aomori |
Hirosaki University |
Implementation of Key Generation Center for Identity-based Encryption Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) ISEC2010-27 SITE2010-23 ICSS2010-33 |
Identity-based Encryption (IBE) is approaching to practical use recently,
but several significant points to be solved r... [more] |
ISEC2010-27 SITE2010-23 ICSS2010-33 pp.133-139 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:20 |
Aomori |
Hirosaki University |
A note for secure information sharing systems Gembu Morohashi, Akira Nagai (NTT Corp.) ISEC2010-28 SITE2010-24 ICSS2010-34 |
[more] |
ISEC2010-28 SITE2010-24 ICSS2010-34 pp.141-145 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 11:45 |
Aomori |
Hirosaki University |
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35 |
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] |
ISEC2010-29 SITE2010-25 ICSS2010-35 pp.147-152 |