|
Chair |
|
Kazuto Ogawa (NHK) |
Vice Chair |
|
Atsushi Fujioka (Kanagawa Univ.), Shiho Moriai (NICT) |
Secretary |
|
Takaaki Mizuki (Tohoku Univ.), Toshihiro Ohigashi (Tokai Univ.) |
Assistant |
|
Keita Emura (NICT), Yuichi Komano (TOSHIBA), Yuuji Suga (IIJ) |
|
|
Chair |
|
Hiro Ito (Univ. of Electro-Comm.) |
Vice Chair |
|
Yushi Uno (Osaka Pref. Univ.) |
Secretary |
|
Kazuhisa Seto (Seikei Univ.), Toshiki Saito (Kyushu Inst. of Tech.) |
|
Conference Date |
Thu, Dec 21, 2017 09:55 - 17:05
Fri, Dec 22, 2017 09:50 - 15:30 |
Topics |
|
Conference Place |
Eikokuji Campus, Kochi University of Technology |
Transportation Guide |
http://www.kochi-tech.ac.jp/kut_E/about/access.html |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, Dec 21 ISEC Chair: Yuuji Suga (IIJ) 09:55 - 10:45 |
(1) |
09:55-10:20 |
Fundamental Study of Classification of Attackers by Multiple Honeypots ISEC2017-72 COMP2017-26 |
Kazuya Yamashita, Okino Koji (Univ. of Toyama) |
(2) |
10:20-10:45 |
Effect on Mix Columns to the Security of Minalpher
-- Experimental Results for 6 Rounds -- ISEC2017-73 COMP2017-27 |
Yuki Kishi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ) |
|
10:45-11:00 |
Break ( 15 min. ) |
Thu, Dec 21 COMP 11:00 - 12:40 |
(3) |
11:00-11:25 |
Space Efficient Algorithms for Maximum (Weight) Independent Set on Circular Arcs ISEC2017-74 COMP2017-28 |
Shohei Urakawa (Kobe Univ.), Tom C. van der Zanden (Utrecht Univ.), Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST) |
(4) |
11:25-11:50 |
O(n^{1/3})-space algorithm for the grid graph reachability problem ISEC2017-75 COMP2017-29 |
Ryo Ashida, Kotaro Nakagawa (Tokyo Tech) |
(5) |
11:50-12:15 |
Maximum k-path Vertex Cover Problem on Graph Classes ISEC2017-76 COMP2017-30 |
Tsuyoshi Yagita, Eiji Miyano, Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST), Tom C. van der Zanden (Utrecht U.) |
(6) |
12:15-12:40 |
An optimal strategy of the second player for the 1-round voronoi game on trees ISEC2017-77 COMP2017-31 |
Akihiro Sugimoto (Kobe Univ.), Toshiki Saitoh (Kyushu Inst. of Tech.) |
|
12:40-14:10 |
Lunch Break ( 90 min. ) |
Thu, Dec 21 ISEC Chair: Kazuto Ogawa (NHK) 14:10 - 15:10 |
(7) |
14:10-15:10 |
[Invited Talk]
Foundations and practical studies of secure computation ISEC2017-78 COMP2017-32 |
Ryo Kikuchi (NTT) |
|
15:10-15:25 |
Break ( 15 min. ) |
Thu, Dec 21 ISEC Chair: Atsushi Fujioka (Kanagawa Univ.) 15:25 - 17:05 |
(8) |
15:25-15:50 |
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols ISEC2017-79 COMP2017-33 |
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) |
(9) |
15:50-16:15 |
Security and Enhancement of a Searchable Public-key Encryption Secure against Keyword Guessing Attack ISEC2017-80 COMP2017-34 |
Takanori Saito, Toru Nakanishi (Hiroshima Univ) |
(10) |
16:15-16:40 |
Blacklistable Anonymous Credential System with Reputation Using Accumulator ISEC2017-81 COMP2017-35 |
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) |
(11) |
16:40-17:05 |
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response ISEC2017-82 COMP2017-36 |
Kazuomi Oishi (SIST) |
Fri, Dec 22 ISEC Chair: Toshihiro Ohigashi (Tokai Univ.) 09:50 - 11:30 |
(12) |
09:50-10:15 |
Reputation System with Confidentiality to Administrator Using Linear Homomorophic Signatures ISEC2017-83 COMP2017-37 |
Daiki Uenoyama, Toru nakanishi (Hiroshima Univ.) |
(13) |
10:15-10:40 |
Optimizing Bleichenbacher's Attack on Schnorr-Type Signatures with Barely Biased Nonces ISEC2017-84 COMP2017-38 |
Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe, Tatsuaki Okamoto (NTT) |
(14) |
10:40-11:05 |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Relationship between LOR security and SW security -- ISEC2017-85 COMP2017-39 |
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) |
(15) |
11:05-11:30 |
A Note on Rearrangement Errors in a Card-Based Protocol ISEC2017-86 COMP2017-40 |
Takaaki Mizuki (Tohoku Univ.), Yuichi Komano (Toshiba) |
|
11:30-13:00 |
Lunch Break ( 90 min. ) |
Fri, Dec 22 COMP 13:00 - 14:00 |
(16) |
13:00-14:00 |
[Invited Talk]
ISEC2017-87 COMP2017-41 |
Ryuhei Mori (Tokyo Tech) |
|
14:00-14:15 |
Break ( 15 min. ) |
Fri, Dec 22 COMP 14:15 - 15:30 |
(17) |
14:15-14:40 |
An ILP Formulation for Maximum Lengh Interval Graph Decomposition Problem ISEC2017-88 COMP2017-42 |
Keisuke Inoue (KTC) |
(18) |
14:40-15:05 |
Efficient Enumeration of Dominating Sets in K-Degenerate graphs ISEC2017-89 COMP2017-43 |
Kazuhiro Kurita (HU), Kunihiro Wasa, Takeaki Uno (NII), Hiroki Arimura (HU) |
(19) |
15:05-15:30 |
Physical Bucket Sort with Restricted take Operations ISEC2017-90 COMP2017-44 |
Atsuki Nagao, Wei Wu (Seikei Univ.), Hiro Ito (UEC) |
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Invited Talk | Each speech will have 50 minutes for presentation and 10 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E- : i c- c![](/ken/images/new/ta.gif) ![](/ken/images/new/liam.gif) (to ISEC secretaries) |
COMP |
Technical Committee on Theoretical Foundations of Computing (COMP) [Latest Schedule]
|
Contact Address |
Toshiki Saitoh
School of Computer Science and Systems Engineering, Kyushu Institute of Technology
Address: 680-4, Kawazu, Iizuka, Fukuoka, 820-8502, Japan.
E- : ![](/ken/images/new/ot.gif) ![](/ken/images/new/1111awed.gif) s ces k![](/ken/images/new/1217uy.bmp) ![](/ken/images/new/0507veqw.gif) |
Last modified: 2017-12-01 12:11:49
|