Thu, Jul 1 AM 10:30 - 11:45 |
(1) SITE |
10:30-10:55 |
Correlation Problems between Security Protection and Intellectual Property Protection of Information ISEC2010-10 SITE2010-6 ICSS2010-16 |
Haruo Kodama (Open Univ. of Japan/SOKENDAI) |
(2) SITE |
10:55-11:20 |
A Study on Log Analysis Based on Tendency of IDS Alert Events ISEC2010-11 SITE2010-7 ICSS2010-17 |
Tsuyoshi Toda, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(3) SITE |
11:20-11:45 |
Limit of "Control Theory" of Privacy
-- Presentation of Identity and Context Dependency of Privacy -- ISEC2010-12 SITE2010-8 ICSS2010-18 |
Takushi Otani (Kibi International Univ.) |
Thu, Jul 1 PM 13:25 - 15:30 |
(4) ISEC |
13:25-13:50 |
On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher ISEC2010-13 SITE2010-9 ICSS2010-19 |
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
(5) ISEC |
13:50-14:15 |
Protection Mode Against Cache Attack (HYRAL) ISEC2010-14 SITE2010-10 ICSS2010-20 |
Kouzou Hirata (LIS) |
(6) ISEC |
14:15-14:40 |
An Optimization of AES Decryption Using the Bitslice Technique ISEC2010-15 SITE2010-11 ICSS2010-21 |
Fumihiko Sano (Toshiba Solutions Corporation) |
(7) ISEC |
14:40-15:05 |
An Artifact-Metric System which Extracts Values Unique to Individual Paper ISEC2010-16 SITE2010-12 ICSS2010-22 |
Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.) |
(8) ISEC |
15:05-15:30 |
Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol ISEC2010-17 SITE2010-13 ICSS2010-23 |
Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.) |
Thu, Jul 1 AM 10:30 - 12:10 |
(9) |
10:30-10:55 |
|
(10) |
10:55-11:20 |
|
(11) |
11:20-11:45 |
|
(12) |
11:45-12:10 |
|
Thu, Jul 1 PM 13:25 - 15:30 |
(13) ICSS |
13:25-13:50 |
Evaluating Destination Hosts of Malware Based on Search Engine Results ISEC2010-18 SITE2010-14 ICSS2010-24 |
Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT) |
(14) ICSS |
13:50-14:15 |
Image Authentication with Access Control Based on Reversible Data Hiding ISEC2010-19 SITE2010-15 ICSS2010-25 |
Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.) |
(15) ICSS |
14:15-14:40 |
Building Ontology of Cybersecurity Operational Information ISEC2010-20 SITE2010-16 ICSS2010-26 |
Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW) |
(16) ICSS |
14:40-15:05 |
Access policy management architecture for virtual server consolidation systems ISEC2010-21 SITE2010-17 ICSS2010-27 |
Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC) |
(17) ICSS |
15:05-15:30 |
On the use and misuse of E-mail sender authentication mechanisms ISEC2010-22 SITE2010-18 ICSS2010-28 |
Tatsuya Mori (NTT) |
Thu, Jul 1 PM 15:45 - 17:00 |
(18) |
15:45-17:00 |
|
Fri, Jul 2 AM 09:00 - 10:15 |
(19) ISEC |
09:00-09:25 |
Proposal on MPKC Signature Scheme with Check Equations ISEC2010-23 SITE2010-19 ICSS2010-29 |
Shigeo Tsujii, Masahito Gotaishi (Chuo University) |
(20) ISEC |
09:25-09:50 |
Improvement of Rainbow MPKC Signature system ISEC2010-24 SITE2010-20 ICSS2010-30 |
Masahito Gotaishi (Chuo Univ.) |
(21) ISEC |
09:50-10:15 |
Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions ISEC2010-25 SITE2010-21 ICSS2010-31 |
Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.) |
Fri, Jul 2 AM 10:30 - 12:10 |
(22) ISEC |
10:30-10:55 |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 -- ISEC2010-26 SITE2010-22 ICSS2010-32 |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) |
(23) ISEC |
10:55-11:20 |
Implementation of Key Generation Center for Identity-based Encryption ISEC2010-27 SITE2010-23 ICSS2010-33 |
Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) |
(24) ISEC |
11:20-11:45 |
A note for secure information sharing systems ISEC2010-28 SITE2010-24 ICSS2010-34 |
Gembu Morohashi, Akira Nagai (NTT Corp.) |
(25) ISEC |
11:45-12:10 |
On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption ISEC2010-29 SITE2010-25 ICSS2010-35 |
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) |
Fri, Jul 2 PM 13:25 - 15:05 |
(26) ISEC |
13:25-13:50 |
Attribute-based encryption with arbitrary number of authorities ISEC2010-30 SITE2010-26 ICSS2010-36 |
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) |
(27) ISEC |
13:50-14:15 |
An Efficient Broadcast Encryption with Personalized Messages ISEC2010-31 SITE2010-27 ICSS2010-37 |
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) |
(28) ISEC |
14:15-14:40 |
Efficient Augmented PAK Protocols ISEC2010-32 SITE2010-28 ICSS2010-38 |
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) |
(29) ISEC |
14:40-15:05 |
On the Relationship between Recognizing Languages and Computing Functions ISEC2010-37 SITE2010-33 ICSS2010-43 |
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya (Tohoku Univ.) |
Fri, Jul 2 PM 15:20 - 17:00 |
(30) ISEC |
15:20-15:45 |
On the examination on speeding Cheon's algorithm ISEC2010-33 SITE2010-29 ICSS2010-39 |
Masaya Yasuda, Tetsuya Izu, Masahiko Takenaka (Fujitsu Lab.) |
(31) ISEC |
15:45-16:10 |
On the proportion of the curves constructed by Brezing-Weng in the pairing-friendly curves ISEC2010-34 SITE2010-30 ICSS2010-40 |
Takanori Yasuda (Kyushu Univ.), Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (Fujitsu Labo.) |
(32) ISEC |
16:10-16:35 |
DLP with Auxiliary Input and the Security of Cryptographic Protocols ISEC2010-35 SITE2010-31 ICSS2010-41 |
Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,) |
(33) ISEC |
16:35-17:00 |
Cost Estimates of CNTW Attack against EMV Signatures ISEC2010-36 SITE2010-32 ICSS2010-42 |
Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
Fri, Jul 2 AM 09:00 - 10:15 |
(34) |
09:00-09:25 |
|
(35) |
09:25-09:50 |
|
(36) |
09:50-10:15 |
|
Fri, Jul 2 AM 10:30 - 12:10 |
(37) |
10:30-10:55 |
|
(38) |
10:55-11:20 |
|
(39) |
11:20-11:45 |
|
(40) |
11:45-12:10 |
|
Fri, Jul 2 PM 13:25 - 15:05 |
(41) |
13:25-13:50 |
|
(42) |
13:50-14:15 |
|
(43) |
14:15-14:40 |
|
(44) |
14:40-15:05 |
|
Fri, Jul 2 PM 15:20 - 17:25 |
(45) |
15:20-15:45 |
|
(46) |
15:45-16:10 |
|
(47) |
16:10-16:35 |
|
(48) |
16:35-17:00 |
|
(49) |
17:00-17:25 |
|
Contact Address and Latest Schedule Information |
IPSJ-CSEC |
Special Interest Group on Computer Security (IPSJ-CSEC) [Latest Schedule]
|
Contact Address |
|
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-: ic-c (to ISEC secretaries) |
SITE |
Technical Committee on Social Implications of Technology and Information Ethics (SITE) [Latest Schedule]
|
Contact Address |
|
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |