|
Chair |
|
Kazuo Takaragi (Hitachi) |
Vice Chair |
|
Toru Fujiwara (Osaka Univ.), Naoya Torii (Fujitsu Labs.) |
Secretary |
|
Noboru Kunihiro (Univ. of Tokyo), Katsuyuki Takashima (Mitsubishi Electric) |
Assistant |
|
Toru Nakanishi (Okayama Univ.) |
|
Technical Committee on Social Implications of Technology and Information Ethics (SITE) |
[schedule] [select]
|
|
Chair |
|
Toshinari Tsuruhara (DT) |
Vice Chair |
|
Hiroyuki Inaba (Kyoto Inst. of Tech.), Michio Nakanishi (Osaka Inst. of Tech.) |
Secretary |
|
Yukiko Kawaguchi (Uekusa), Soichiro Morishita (Univ. of Tokyo) |
Assistant |
|
Kazuhiro Suzuki (Kanagawa Univ.), Norimasa Sugiyama (Osaka Inst. of Tech.) |
|
Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Koji Nakao (KDDI/NICT) |
Vice Chair |
|
Hiroaki Kikuchi (Tokai Univ.), Koichi Sakurai (Kyushu Univ.) |
Secretary |
|
Yuu Miyake (KDDI R&D Labs.), Naoto Sone (Naruto Univ.) |
Assistant |
|
Shiho Moriai (Sony) |
|
Conference Date |
Thu, Jul 2, 2009 13:00 - 17:25
Fri, Jul 3, 2009 09:30 - 17:00 |
Topics |
|
Conference Place |
Tegata Campus, Akita University |
Address |
1-1 Tegata Gakuen-cho, Akita-shi, 010-8502 Japan |
Transportation Guide |
http://www.akita-u.ac.jp/english/02/02_2.htm |
Contact Person |
Prof. Akihiro Yamamura |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, Jul 2 PM ISEC 13:00 - 14:15 |
(1) ISEC |
13:00-13:25 |
Simplified Proof for Small Secret Key Attack on RSA and its Extension ISEC2009-15 SITE2009-7 ICSS2009-29 |
Noboru Kunihiro (Univ. of Tokyo), Kaoru Kurosawa (Ibaragi Univ.) |
(2) ISEC |
13:25-13:50 |
Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack (Part2) ISEC2009-16 SITE2009-8 ICSS2009-30 |
Takeshi Nasako, Yasuyuki Murakami (OECU), Masao Kasahara (OGU) |
(3) ISEC |
13:50-14:15 |
Relationship between Weight of Plaintext and Successful Attacks in Knapsack Cryptosystems ISEC2009-17 SITE2009-9 ICSS2009-31 |
Tatsuo Douzono, Takeshi Nasako, Yasuyuki Murakami (Osaka Electoro-Communication Univ.) |
Thu, Jul 2 PM SITE 14:30 - 17:25 |
(4) SITE |
14:30-14:55 |
Proposal on Password Authentication Against Iterative Shoulder Surfing ISEC2009-18 SITE2009-10 ICSS2009-32 |
Ryota Kitabayashi, Hiroyuki Inaba (KIT) |
(5) SITE |
14:55-15:20 |
Problems between Disclosure of Technical Information and Restriction of Intellectual Property Protection ISEC2009-19 SITE2009-11 ICSS2009-33 |
Haruo Kodama (OUJ/SOKENDAI) |
(6) SITE |
15:20-15:45 |
An analysis of Copyright Laws Through Informatics ISEC2009-20 SITE2009-12 ICSS2009-34 |
Naonori Kato (SOKENDAI) |
(7) SITE |
15:45-16:10 |
Current situation and issues of health information exchange
-- the national database of health insurance claim and health check information -- ISEC2009-21 SITE2009-13 ICSS2009-35 |
Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD) |
(8) SITE |
16:10-16:35 |
About the Security Model built in the Search Engine ISEC2009-22 SITE2009-14 ICSS2009-36 |
Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) |
(9) SITE |
16:35-17:00 |
Logical Structure of the Cloud Which Projects Various Values onto Oneself
-- From the Aspect of the Agent of Self-Referred Social Systems -- ISEC2009-23 SITE2009-15 ICSS2009-37 |
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) |
(10) SITE |
17:00-17:25 |
A Model for JSL Emergency Message System for the Deaf ISEC2009-24 SITE2009-16 ICSS2009-38 |
Kazuo Kamata (Utsunomiya Univ.), Shunichi Yonemura (NTT) |
Thu, Jul 2 PM CSEC 13:00 - 14:15 |
(11) |
13:00-13:25 |
|
(12) |
13:25-13:50 |
|
(13) |
13:50-14:15 |
|
Thu, Jul 2 PM CSEC 14:30 - 16:35 |
(14) |
14:30-14:55 |
|
(15) |
14:55-15:20 |
|
(16) |
15:20-15:45 |
|
(17) |
15:45-16:10 |
|
(18) |
16:10-16:35 |
|
Fri, Jul 3 AM ISEC 09:30 - 12:00 |
(19) ISEC |
09:30-09:55 |
Accelerating Cross Twisted Ate Pairing with Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors ISEC2009-25 SITE2009-17 ICSS2009-39 |
Yumi Sakemi, Kazushi Nishii, Tetsuya Izuta, Tatsuya Yuasa, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(20) ISEC |
09:55-10:20 |
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models ISEC2009-26 SITE2009-18 ICSS2009-40 |
Yusuke Naito (Mitsubishi Electric), Lei Wang, Kazuo Ohta (Univ. of Electro-Comm.) |
(21) ISEC |
10:20-10:45 |
Proposal of Integrated MPKC: PPS
-- STS Enhanced by Perturbed Piece In Hand Method -- ISEC2009-27 SITE2009-19 ICSS2009-41 |
Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.), Masao Kasahara (OGU) |
(22) ISEC |
10:45-11:10 |
On the strength evaluation of Lesamnta against differential cryptanalysis ISEC2009-28 SITE2009-20 ICSS2009-42 |
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) |
(23) ISEC |
11:10-11:35 |
A Study on Stream-Cipher-Based Hash Functions ISEC2009-29 SITE2009-21 ICSS2009-43 |
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) |
(24) ISEC |
11:35-12:00 |
Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness ISEC2009-30 SITE2009-22 ICSS2009-44 |
Bagus Santoso (AIST), Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.), Goichiro Hanaoka (AIST) |
Fri, Jul 3 PM ICSS 13:00 - 14:40 |
(25) ICSS |
13:00-13:25 |
Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks ISEC2009-31 SITE2009-23 ICSS2009-45 |
Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) |
(26) ICSS |
13:25-13:50 |
Investigation about Malware Distribution to Websites ISEC2009-32 SITE2009-24 ICSS2009-46 |
Takeshi Yagi, Naoto Tanimoto, Masaki Hamada, Mitsutaka Itoh (NTT) |
(27) ICSS |
13:50-14:15 |
A Study on the Log Getting Process for Detection of the Remaining Files Copied from Removable Storage Medium ISEC2009-33 SITE2009-25 ICSS2009-47 |
Chikako Ishizawa, Makoto Nishida (Akita Univ.) |
(28) ICSS |
14:15-14:40 |
Risk Assessment Method for Networked Systems using CVSS ISEC2009-34 SITE2009-26 ICSS2009-48 |
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) |
Fri, Jul 3 PM ISEC 14:55 - 17:00 |
(29) ISEC |
14:55-15:20 |
Clone Resistance Evaluation Based on Attacker's Resources in Artifact-metric Systems ISEC2009-35 SITE2009-27 ICSS2009-49 |
Masashi Une (BOJ) |
(30) ISEC |
15:20-15:45 |
Development of FMC Authentication Technique with Mobile Terminal ISEC2009-36 SITE2009-28 ICSS2009-50 |
Katsuyuki Umezawa, Takatoshi Kato (Hitachi), Satoru Tezuka (Tech. of Tokyo Univ.) |
(31) ISEC |
15:45-16:10 |
Certification Seal
-- Random Pattern of Polarized Film Pieces -- ISEC2009-37 SITE2009-29 ICSS2009-51 |
Yoshihiro Tsukamura |
(32) ISEC |
16:10-16:35 |
Software Protection Mechanism Using Tamper-Proof Module ISEC2009-38 SITE2009-30 ICSS2009-52 |
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) |
(33) ISEC |
16:35-17:00 |
A Tamper Resistant Software Construction Method Based on Self Integrity Verification and Self-Modifying ISEC2009-39 SITE2009-31 ICSS2009-53 |
Kazuomi Oishi, Tsutomu Matsumoto (Yokohama National Univ.) |
Fri, Jul 3 AM CSEC 09:55 - 11:35 |
(34) |
09:55-10:20 |
|
(35) |
10:20-10:45 |
|
(36) |
10:45-11:10 |
|
(37) |
11:10-11:35 |
|
Fri, Jul 3 PM SPT 13:00 - 14:40 |
(38) |
13:00-13:25 |
|
(39) |
13:25-13:50 |
|
(40) |
13:50-14:15 |
|
(41) |
14:15-14:40 |
|
Fri, Jul 3 PM CSEC 14:55 - 16:10 |
(42) |
14:55-15:20 |
|
(43) |
15:20-15:45 |
|
(44) |
15:45-16:10 |
|
Contact Address and Latest Schedule Information |
IPSJ-CSEC |
Special Interest Group on Computer Security (IPSJ-CSEC) [Latest Schedule]
|
Contact Address |
|
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E-: ic-c (to ISEC secretaries) |
SITE |
Technical Committee on Social Implications of Technology and Information Ethics (SITE) [Latest Schedule]
|
Contact Address |
|
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: s |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
Last modified: 2009-06-30 12:18:48
|