IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Masakatsu Morii
Vice Chair Mitsuru Matsui, Kazuo OtaUEC
Secretary Hiroshi Doi, Shiho Moriai
Assistant Zenmei Shiraishi

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Hironobu Kinoshita
Vice Chair Toshinari Tsuruhara, Hiroyuki Inaba
Secretary Shunichi Amemiya, Masaru Ogawa
Assistant Eizen Kimura

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Conference Date Thu, Jul 20, 2006 09:05 - 17:50
Fri, Jul 21, 2006 09:30 - 17:25
Topics  
Conference Place Tsushima Campus, Okayama University 
Address 3-1-1, Tsushimanaka, Okayama-shi, 700-8530 Japan
Transportation Guide Access http://www.okayama-u.ac.jp/en/access.html, Campus Map http://www.okayama-u.ac.jp/en/tsushima_e.html
Contact
Person
Prof. Toshihiro Tabata
086-251-8188
Announcement Please join us for an opening reception after the sessions of the first day.

Thu, Jul 20 AM  Room A
09:30 - 11:35
(1) 09:30-09:55 A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation Ryo Nanba, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
(2) 09:55-10:20 Square Root Calculation Algorithm over Type-II All One Polynomial Field Hidehiro Kato (Okayama Univ.), Wang Feng, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
(3) 10:20-10:45 Pairing Computation with MNT Curve over All One Polynomial Field Masataka Akane, Takumi Okimoto, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
(4) 10:45-11:10 Efficient Calculation for Tate Pairing Masaaki Shirase, Tsuyoshi Takagi (FUN), Eiji Okamoto (Univ of Tsukuba)
(5) 11:10-11:35 A Survey on Dedicated Factoring Hardware (Relation Finding Step) Tetsuya Izu (FUJITSU), Noboru Kunihiro (UEC), Takeshi Shimoyama (FUJITSU)
Thu, Jul 20 AM  Room B
09:05 - 12:00
(6) 09:05-09:30 A Proposal to Hi-Tech Pollution Based on the Criterion of "Relationism-First"
-- A Principle Experiment of EM Environment around VDT and Its Basics Theory --
Yoshifumi Fujita (Onomichi Univ.), Mitsuo Ohta (Emeritus Prof. of Hiroshima Univ.)
(7) 09:30-09:55 A copyright and proprietary rights protection system with an Information Filter and an Information Capsule Kota Yamada, Hirotsugu Kinoshita (KU), Tetsuya Morizumi (TNSi)
(8) 09:55-10:20 Balance between Security and Privacy Yasutoshi Ishizaki (Chuo Univ.)
(9) 10:20-10:45 A Study on Dynamic Risk Analysis Corresponding to Environmental Changes Hideaki Kawanishi, Koichi Kato, Tatsuaki Takahashi, Ramirez Caceres Guillermo Horacio, Yoshimi Teshigawara (Soka Univ.)
(10) 10:45-11:10 Survey and Analysis on Data Delete in PC for Internet Auction Satsuki Sato, Yuki Ashino (TDU), Tetsutaro Uehara (KU), Ryoichi Sasaki (TDU)
(11) 11:10-11:35 Development of Internet Watchdog Systems for Children Protection Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.)
(12) 11:35-12:00 Genaral Decline in the Literacy of Science Takeshi Shimomura
Thu, Jul 20 PM  Room A
13:00 - 17:50
(13) 13:00-13:25 Secure Exponentiation with High Flexibility Camille Vuillaume, Katsuyuki Okeya (Hitachi)
(14) 13:25-13:50 Double-Size Montgomery Multiplication of a Crypto-Coprocessor Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume (Hitachi)
(15) 13:50-14:15 An Improved Mehtod for the Table Lookup Multiplication Algorithm over GF(2^m) Yoichi Hadama, Daisuke Nakamura (Kobe Univ.), Masanori Hirotomo (Hyogo Inst. of Info. Education Foundation), Masakatu Morii (Kobe Univ.)
(16) 14:15-14:40 Fast Generation of Safe Primes using Deterministic Primality Tests based on Maurer Method Hidehiro Kumakyu, Akito Niwa (Toshiba Solusions Corp.)
(17) 14:40-15:05 A method for generating elliptic curves suitable for implementing an efficient group signature scheme Norikazu Kubotera, Jun Furukawa, Kazue Sako (NEC)
  15:05-15:20 Break ( 15 min. )
(18) 15:20-15:45 Batch Processing of Interactive Proofs Tsuyoshi Yamamoto, Koji Chida (NTT)
(19) 15:45-16:10 Efficient Implementation of Secure Circuit Evaluation Using Batch Processing Koji Chida, Tsuyoshi Yamamoto (NTT)
(20) 16:10-16:35 Inspection of sufficient conditions of MD5 Yuto Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(21) 16:35-17:00 Possibility of the Key Recovery Attack against Py Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(22) 17:00-17:25 Tight theoretical estimation of the security of RC6 against chi-square attack Takatomi Wada, Atsuko Miyaji (JAIST), Tomohiko Hinoue (OMRON)
(23) 17:25-17:50 On the security of Piece In Hand Concept based on Sequential Solution Method Daisuke Ito, Yoshitomo Fukushima, Toshinobu Kaneko (TUS)
Thu, Jul 20 PM  Room B
13:00 - 17:50
(24) 13:00-13:25 A Secure Packet Digesting Algorithm in the Interconnected IP Traceback Systems Seiji Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(25) 13:25-13:50 IDS for SSL Enncrypted Web Traffic Akira Yamada, Yutaka Miyake, Keisuke Takemori (KDDI Labs.)
(26) 13:50-14:15 DHT-based Dynamic VPN Instantiation Mechanism for Secure Home Network Access Ayumu Kubota, Akira Yamada, Yutaka Miyake (KDDI R&D Labs.)
(27) 14:15-14:40 Performance Improvement of Anomaly Detection System by Simplifying Call Stack Inspection Katsuhiro Suzuki (Univ. of Tsukuba), Hirotake Abe (JST), Kazuhiko Kato (Univ. of Tsukuba), Akira Kinno, Yuka Ikebe, Takehiro Nakayama, Atsushi Takeshita (NTT DoCoMo)
  14:40-15:20 Break ( 40 min. )
(28) 15:20-15:45 A Proposal of Response Delay Method for Spam Mail from BOTNET Tomonari Sekiyama, Yoshinori Kobayashi (TDU), Masakazu Takahashi (ISS), Ryoichi Sasaki (TDU)
(29) 15:45-16:10 A Study on Bot Detection using Response Time Yuji Hoshizawa, Motoaki Yamamura (SecureBrain)
(30) 16:10-16:35 A Configuration Parameter Correction for Security Configuration Analyzing System Sumitaka Okajo, Katsushi Matsuda (NEC)
(31) 16:35-17:00 On Enforcement of Noninterference Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech)
(32) 17:00-17:25 Preventing Buffer Overflow Attacks bypassing NXbit Protection Takahiro Shinagawa (TUAT)
(33) 17:25-17:50 Security Enhancement of HTTP-FUSE Knoppix Client by Trusted Computing Megumi Nakamura, Seiji Munetoh (IBM Japan), Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Ichiro Osawa (AIST)
Fri, Jul 21 AM  Room A
09:30 - 12:00
(34) 09:30-09:55 A Study of Partial Disclosure Problem in Ramp Schemes Using Polynomial Function
-- A Proposal of Cascaded Ramp Scheme --
Keiichi Hirota (NTT), Kazuo Mogi (NTT Communications)
(35) 09:55-10:20 Quantum Threshold Scheme Using Two States Takeshi Okada, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
(36) 10:20-10:45 Traveling Salesman Problem and Tribonacci Sequence Kunikatsu Kobayashi, Seiichirou Kokubun (Yamagata Univ.)
(37) 10:45-11:10 Asymptotic Lower Bound on Round Complexity of Bounded Concurrent Black-Box Zero-Knowledge Proof Protocols Hirofumi Muratani (Toshiba)
(38) 11:10-11:35 Privacy-preserving Scalar Product Comparison Protocol Jun Sakuma, Shigenobu Kobayashi (TokyoTech)
(39) 11:35-12:00 Secure optimization for distributed TSP using scalar product comparison protocol Jun Sakuma, Shigenobu Kobayashi (TokyoTech)
Fri, Jul 21 AM  Room B
09:30 - 12:00
(40) 09:30-09:55 On the Standardization of Information Security
-- Report on the Madrid Meeting in May, 2006 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi), Toshio Tatsuta (IISEC), Akira Otsuka (AIST), Kan Yasuda (NTT), Kengo Mori (NEC), Toshiaki Saisho (Toshiba)
(41) 09:55-10:20 Security Requirements for PIN Authentication in Financial Transactions Yuko Tamura (BOJ), Masashi Une (BOJ/AIST)
(42) 10:20-10:45 Proposal and Evaluation on Epidemiological Approach to Computer Virus Ryoichi Sasaki (Dendai)
(43) 10:45-11:10 Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.)
(44) 11:10-11:35 A study on security technologies for paper documents Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi)
(45) 11:35-12:00 Visualization Technologies of nicter Incident Analysis System Koji Nakao, Fumiko Matsumoto, Daisuke Inoue (NICT), Shunsuke Baba, Kazuya Suzuki (YOKOGAWA), Masashi Eto, Katsunari Yoshioka, Kenji Rikitake (NICT), Yoshiaki Hori (ISEE)
Fri, Jul 21 PM  Room A
13:00 - 17:25
(46) 13:00-13:25 Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST)
(47) 13:25-13:50 Fingerprinting Protocol Equipping Electronic Payment System Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.)
(48) 13:50-14:15 An Efficient Anonymous Password-Authenticated Key Exchange Protocol SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (AIST/Chuo Univ.)
(49) 14:15-14:40 Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.)
(50) 14:40-15:05 Distributed Privacy-preserving Document Clustering Chunhua Su (Kyushu Univ.), Jianying Zhou, Feng Bao (Inst. for Infocomm Research, Singapore), Kouichi Sakurai (Kyushu Univ.)
  15:05-15:20 Break ( 15 min. )
(51) 15:20-15:45 Key-Management Scheme for Secure Multicast based on Network Topology Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)
(52) 15:45-16:10 The proposal and evaluation of stream authentication using Merkle Hash Tree and IDA Yasutaka Shinzaki, Takeshi Ogino, Shintaro Ueda, Hiroshi Shigeno (Keio Univ.)
(53) 16:10-16:35 An Implementation of a Privacy Enhancing Questionnaire System for Evaluating Classes Koji Tanigawa, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)
(54) 16:35-17:00 Proposal on whistle-blower protection technology to prevent the exposure of accuser from an indictment document Masataka Tada, Mituyuki Takatuka, Takanobu Masubuchi, Ryoichi Sasaki (Tokyo Den Univ.)
(55) 17:00-17:25 3MN: An Anonymous Communication System Based on Multiple Encryption and Probabilistic Selections of Actions Naoki Miyake, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)
Fri, Jul 21 PM  Room B
13:00 - 17:25
(56) 13:00-13:25 Watermarking Method by Alternative Representation of Document Backgrounds Takashi Hashimoto, Kurato Maeno, Hiroyuki Hota (Oki Electric Industry Co., Ltd.)
(57) 13:25-13:50 A User Authentication using Blind Spot and Papillary Light Reflex (part2) Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ)
(58) 13:50-14:15 An Improvement of User Authentication Using Schema of Visual Memory
-- An extension of the system using hint --
Takumi Yamamoto, Atsushi Harada, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ)
(59) 14:15-14:40 Extracting Contexts From Keystroke Data Munetoshi Ishikawa, Mizuki Oka, Kazuhiko Kato (Tsukuba Univ.)
(60) 14:40-15:05 Development of IH-ZIP: A Data Compression Tool for Information Hiding Katsunari Yoshioka, Kotaro Sonoda, Osamu Takizawa, Koji Nakao (NICT), Tsutomu Matsumoto (Yokohama National Univ.)
  15:05-15:20 Break ( 15 min. )
(61) 15:20-15:45 A Proposal on Cancelable Biometrics for Image Matching based biometrics Shinji Hirata, Kenta Takahashi, Masahiro Mimura (Hitachi)
(62) 15:45-16:10 Comparison of revocation problem between ID based encryption and biometric authentication schemes Akitoshi Izumi (Kyushu Univ), Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ)
(63) 16:10-16:35 A Design of DRM systems with hardware-based authentication Hiromi Fukaya (Pastel Co.), Kouichi Sakurai (Kyushu Univ.)
(64) 16:35-17:00 A Note on Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
(65) 17:00-17:25 Interactive Textured Cube Based Network Traffic Visualization for Network Monitoring and Security Erwan Le Malecot (Inst. of Sys., Inf. Tech. and nanotech.), Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Yoshiaki Shiraishi (Nagoya Inst. of Tech.)
TEL +81-52-735-7240, FAX +81-52-744-1355
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  


Last modified: 2006-07-15 15:43:33


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan