Conference Date |
Thu, Jul 14, 2016 13:00 - 17:05
Fri, Jul 15, 2016 09:30 - 16:10 |
Topics |
security, etc |
Conference Place |
Nakaichi Community Hall Nac |
Address |
3-13, Nakaichi-chou, Yamaguchi-shi, Yamaguchi, 753-0086, Japan |
Transportation Guide |
about 15 minutes walk from Yamaguchi station (JR Yamaguchi line) http://www.yamaguchi-machinaka.com/mtx/archives/1233079473/1233793907.html |
Contact Person |
Masaki Kawamura
+81-83-933-5701 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, Jul 14 PM Session A-1 EMM 13:00 - 15:05 |
(1) EMM |
13:00-13:25 |
A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise ISEC2016-13 SITE2016-7 ICSS2016-13 EMM2016-21 |
Shogo Shigemoto, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(2) EMM |
13:25-13:50 |
Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle ISEC2016-14 SITE2016-8 ICSS2016-14 EMM2016-22 |
Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) |
(3) EMM |
13:50-14:15 |
Study of an information extraction method using artificial fiber pattern with a clear ink ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23 |
Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) |
(4) EMM |
14:15-14:40 |
Technique for Embedding Information by Constructing Protuberance With Inner Walls of Objects Fabricated With 3-D Printers ISEC2016-16 SITE2016-10 ICSS2016-16 EMM2016-24 |
Kousuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.) |
(5) EMM |
14:40-15:05 |
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 |
Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) |
Thu, Jul 14 PM Session B-1 SITE 13:00 - 15:05 |
(6) SITE |
13:00-13:25 |
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 |
Motoi Tanaka, Hiroyuki Inaba (KIT) |
(7) SITE |
13:25-13:50 |
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27 |
Hiroaki Kuno, Hiroyuki Inaba (KIT) |
(8) SITE |
13:50-14:15 |
A Study of a Simple Model of Information Safety Education
-- A Departure from Convetional Information Moral Education Model -- ISEC2016-20 SITE2016-14 ICSS2016-20 EMM2016-28 |
Takahiro Haga (GSGU), Akiko Igarashi (Uchida), Katsurou Nishioka (UHD) |
(9) SITE |
14:15-14:40 |
Developing rules to transmit our intentions in Computer Mediated Communication ISEC2016-21 SITE2016-15 ICSS2016-21 EMM2016-29 |
Nobuyuki Yoshinga (YPU) |
(10) SITE |
14:40-15:05 |
Privacy Problems and Social Relationships
-- Privacy Problems Caused by the Visualization and Manipulation of Social Relationships -- ISEC2016-22 SITE2016-16 ICSS2016-22 EMM2016-30 |
Takushi Otani (Kibi International Univ.) |
|
15:05-15:25 |
Break ( 20 min. ) |
Thu, Jul 14 PM Session A-2 ICSS 15:25 - 17:05 |
(11) ICSS |
15:25-15:50 |
On the Conditions for Successful RF Retroreflector Attacks ISEC2016-23 SITE2016-17 ICSS2016-23 EMM2016-31 |
Haruka Hoshino (Waseda Univ.), Masahiro Kinugawa (Sendai KOSEN), Yuichi Hayashi (Tohoku Gakuin Univ.), Tatsuya Mori (Waseda Univ.) |
(12) ICSS |
15:50-16:15 |
Evaluation of Clustering Analysis Based on Malware Traffic Model ISEC2016-24 SITE2016-18 ICSS2016-24 EMM2016-32 |
Mitsuhiro Hatada (Waseda Univ./NTT Communications), Tatsuya Mori (Waseda Univ.) |
(13) ICSS |
16:15-16:40 |
Cyber security for Industrial control systems(ICS) in IoT era ISEC2016-25 SITE2016-19 ICSS2016-25 EMM2016-33 |
Yuma Takayama (IsecG(MFE)), Ichiro Koshijima, Tomomi Aoyama (nitech) |
(14) ICSS |
16:40-17:05 |
Investigation of Android Markets using Static Detector for Packed Applications ISEC2016-26 SITE2016-20 ICSS2016-26 EMM2016-34 |
Hiroki Nakano, Zhiyong Yang, Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Thu, Jul 14 PM Session B-2 CSEC(1)/SPT 15:25 - 17:05 |
(15) |
15:25-15:50 |
Major topics in information security research from viewpoints of financial institutions
NAKAMURA KEISUKE, UNE MASASHI (Bank of Japan) |
(16) |
15:50-16:15 |
Proposal of Business Risk Assessment System for Cyber Security Threats
Isobe Yoshiaki, Sugimoto Akihiro, Nakakouji Hirofumi (Hitachi Ltd.) |
(17) |
16:15-16:40 |
Datasets for Anti-Malware Research ~MWS Datasets 2016~
Takata Yuta (NTT Secure Platform Laboratories), Terada Masato (Hitachi Ltd.), Murakami Junichi (FFRI, Inc.), Kasama Takahiro (National Institute of Information and Communications Technology), Yoshioka Katsunari (Yokohama National University), Hatada Mitsuhiro (NTT Communications Corporation) |
(18) |
16:40-17:05 |
Report on the First IEEE European Symposium on Security and Privacy
Matsumoto Shinichi (Institute of Systems, Information Technologies and Nanotechnologies), Matsuura Kanta (Institute of Industrial Science, the University of Tokyo) |
Fri, Jul 15 AM Session A-3 ISEC(1) 09:30 - 11:35 |
(19) ISEC |
09:30-09:55 |
One-time pad chaotic cryptography using augmented Lorenz equations ISEC2016-27 SITE2016-21 ICSS2016-27 EMM2016-35 |
Kenichiro Cho, Takaya Miyano (Ritsmeikan Univ) |
(20) ISEC |
09:55-10:20 |
Further improving security of Vector Stream Cipher ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36 |
Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) |
(21) ISEC |
10:20-10:45 |
Improvement of Winternitz one time signature and its security proof ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37 |
Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST) |
(22) ISEC |
10:45-11:10 |
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 |
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) |
(23) ISEC |
11:10-11:35 |
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
Hui Zhao, Kouichi Sakurai (Kyushu Univ.) |
Fri, Jul 15 AM Session B-3 CSEC(2) 09:55 - 11:10 |
(24) |
09:55-10:20 |
|
(25) |
10:20-10:45 |
Evaluation of Memory Access Control to Process Information for Attack Avoidance using Virtual Machine Monitor
○Sato Masaya, Yamauchi Toshihiro, Taniguchi Hideo (Okayama University) |
(26) |
10:45-11:10 |
Study on Filtering Method for the DNS Water Torture Attack Utilizing the Naive Bayes Classifier
○Yoshida Takuro, Takeuchi Yuya, Kobayashi Ryotaro, Kato Masahiko, Kishimoto Hiroyuki |
|
11:10-13:00 |
Lunch Break ( 110 min. ) |
Fri, Jul 15 PM Session A-4 ISEC(2) 13:00 - 14:15 |
(27) ISEC |
13:00-13:25 |
Efficient Discrete Gaussian Sampling on Constrained Devices ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 |
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) |
(28) ISEC |
13:25-13:50 |
Worst Case Short Lattice Point Enumeration on Block Reduced Bases ISEC2016-33 SITE2016-27 ICSS2016-33 EMM2016-41 |
Atsushi Takayasu, Noboru Kunihiro (Univ. Tokyo) |
(29) ISEC |
13:50-14:15 |
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem ISEC2016-34 SITE2016-28 ICSS2016-34 EMM2016-42 |
Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.) |
Fri, Jul 15 PM Session B-4 CSEC(3) 13:00 - 14:15 |
(30) |
13:00-13:25 |
|
(31) |
13:25-13:50 |
Risk Analysis for Data Privacy based on Identifiability Analysis with k-Anonymity
○Yamaoka Yuji, Itoh Kouichi |
(32) |
13:50-14:15 |
|
|
14:15-14:30 |
Break ( 15 min. ) |
Fri, Jul 15 PM Session A-5 ISEC(3) 14:30 - 15:45 |
(33) ISEC |
14:30-14:55 |
Algebraic Surface Cryptosystems using Polynomial Approximate GCD ISEC2016-35 SITE2016-29 ICSS2016-35 EMM2016-43 |
Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST) |
(34) ISEC |
14:55-15:20 |
A Faster Hardware for 254-bit Prime-Field Pairing with Dedicated Pipeline Modular Multipliers and Inverters ISEC2016-36 SITE2016-30 ICSS2016-36 EMM2016-44 |
Daisuke Fujimoto, Yusuke Nagahama, Tsutomu Matsumoto (YNU) |
(35) ISEC |
15:20-15:45 |
A Durability Evaluation for Metallic-Foil Artifact-Metrics ISEC2016-37 SITE2016-31 ICSS2016-37 EMM2016-45 |
Naoki Yoshida, Tsutomu Matsumoto (YNU) |
Fri, Jul 15 PM Session B-5 CSEC(4) 14:30 - 16:10 |
(36) |
14:30-14:55 |
|
(37) |
14:55-15:20 |
|
(38) |
15:20-15:45 |
|
(39) |
15:45-16:10 |
|
Contact Address and Latest Schedule Information |
IPSJ-CSEC |
Special Interest Group on Computer Security (IPSJ-CSEC) [Latest Schedule]
|
Contact Address |
|
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E-: ic-c (to ISEC secretaries) |
SITE |
Technical Committee on Social Implications of Technology and Information Ethics (SITE) [Latest Schedule]
|
Contact Address |
|
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
EMM |
Technical Committee on Enriched MultiMedia (EMM) [Latest Schedule]
|
Contact Address |
Masaki Kawamura (Yamaguchi University)
TEL/FAX: +81-83-933-5701
E-: scigu-u |
Announcement |
Official website: http://www.ieice.org/iss/emm/ |
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|