|
Chair |
|
Yukiyasu Tsunoo (NEC) |
Vice Chair |
|
Masahiro Mambo (Kanazawa Univ.), Kazuto Ogawa (NHK) |
Secretary |
|
Goichiro Hanaoka (AIST), Yuichi Komano (Toshiba) |
Assistant |
|
Tetsuya Izu (Fujitsu Lab.), Takaaki Mizuki (Tohoku Univ.), Noritaka Yamashita (NEC) |
|
Technical Committee on Social Implications of Technology and Information Ethics (SITE) |
[schedule] [select]
|
|
Chair |
|
Noriaki Yoshikai (Nihon Univ.) |
Vice Chair |
|
Hitoshi Okada (NII), Tetsuya Morizumi (Toyo Networks & System Integration) |
Secretary |
|
Sumiko Miyama (Kanagawa Univ.), Takahiro Tagawa (Kyushu Univ.) |
Assistant |
|
Takahiro Haga (Gifu Shotoku Gakuen Univ.) |
|
Technical Committee on Information and Communication System Security (ICSS) |
[schedule] [select]
|
|
Chair |
|
Yutaka Miyake (KDDI R&D Labs.) |
Vice Chair |
|
Takashi Nishide (Univ. of Tsukuba), Yoshiaki Shiraishi (Kobe Univ.) |
Secretary |
|
Takeshi Ueda (Mitsubishi Electric), Hiroki Takakura (NII) |
Assistant |
|
Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT) |
|
|
Chair |
|
Akinori Ito (Tohoku Univ.) |
Vice Chair |
|
Masashi Unoki (JAIST), Masaki Kawamura (Yamaguchi Univ.) |
Secretary |
|
Masatsugu Ichino (Univ. of Electro-Comm.), Kotaro Sonoda (Nagasaki Univ.) |
Assistant |
|
Motoi Iwata (Osaka Pref. Univ.), Kazuhiro Kohno (Kansai Univ.) |
|
Conference Date |
Thu, Jul 2, 2015 10:15 - 16:35
Fri, Jul 3, 2015 10:15 - 11:55 |
Topics |
|
Conference Place |
NAGOYA TRADE & INDUSTRY CENTER |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Thu, Jul 2 AM Session A-1: ISEC 10:15 - 11:55 |
(1) ISEC |
10:15-10:40 |
Attribute-Based Two-Tier Signatures ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) |
(2) ISEC |
10:40-11:05 |
On the Security of SAPAKE ISEC2015-10 SITE2015-8 ICSS2015-20 EMM2015-18 |
SeongHan Shin, Kazukuni Kobara (AIST) |
(3) ISEC |
11:05-11:30 |
Chosen Initial Vector Attack against Pseudorandom Number Generator QP-DYN ISEC2015-11 SITE2015-9 ICSS2015-21 EMM2015-19 |
Kenichi Arai, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) |
(4) ISEC |
11:30-11:55 |
Information Security in National Identification Number called My Number in Japan ISEC2015-12 SITE2015-10 ICSS2015-22 EMM2015-20 |
Takeshi Niiyama, Toshiro Kita (Doshisha Univ.) |
Thu, Jul 2 AM Session B-1: CSEC 10:15 - 11:55 |
(5) |
10:15-10:40 |
|
(6) |
10:40-11:05 |
|
(7) |
11:05-11:30 |
|
(8) |
11:30-11:55 |
|
Thu, Jul 2 PM Session A-2: ISEC 13:25 - 14:40 |
(9) ISEC |
13:25-13:50 |
Proposals of K(AI), K(AII) and K(AIII)Schemes for augmenting code-based PKC, product-sum type PKC and multivariate PKC ISEC2015-13 SITE2015-11 ICSS2015-23 EMM2015-21 |
Masao Kasahara (Waseda Univ./Chuo Univ.) |
(10) ISEC |
13:50-14:15 |
Security Analysis of AONT-based Regenerating Codes ISEC2015-14 SITE2015-12 ICSS2015-24 EMM2015-22 |
Hidenori Kuwakado (Kansai Univ.), Masazumi Kurihara (Univ. of Electro-Communications) |
(11) ISEC |
14:15-14:40 |
Experimental Analysis of Path ORAM in Practical Implementation ISEC2015-15 SITE2015-13 ICSS2015-25 EMM2015-23 |
Karin Sumongkayothin, Atsuko Miyaji, Chunhua Su (JAIST), Steve Gordon (SIIT) |
Thu, Jul 2 PM Session B-2: SITE 13:25 - 15:05 |
(12) SITE |
13:25-13:50 |
On the Comprehensive Consent in the utilization of personal information |
Takushi Otani (Kibi International Univ.) |
(13) SITE |
13:50-14:15 |
Study on Application of Measure Behavior Intention Model for Information Security into Security Action Cyc ISEC2015-16 SITE2015-14 ICSS2015-26 EMM2015-24 |
Noriaki Yoshikai (Nihon Univ.) |
(14) SITE |
14:15-14:40 |
Survey:automated moral judgment ISEC2015-17 SITE2015-15 ICSS2015-27 EMM2015-25 |
Yuko Murakami (Tohoku U) |
(15) SITE |
14:40-15:05 |
Development of an educational material using an injurious scenario regarding the moral rights and its trial ISEC2015-18 SITE2015-16 ICSS2015-28 EMM2015-26 |
Takako Nabeshima, Youzou Miyadera, Atsuo Hazeyama, Yoshimi Tanaka (Tokyo Gakugei Univ.) |
Thu, Jul 2 PM Session A-3: EMM 15:20 - 16:35 |
(16) EMM |
15:20-15:45 |
Secure and Robust Image Identification Based on Fuzzy Commitment Scheme for JPEG Image ISEC2015-19 SITE2015-17 ICSS2015-29 EMM2015-27 |
Kenta Iida, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro Univ.) |
(17) EMM |
15:45-16:10 |
Making RAW Video and Novel Video Watermarking System ISEC2015-20 SITE2015-18 ICSS2015-30 EMM2015-28 |
Natsuki Kokui, Hyunho Kang, Keiichi Iwamura (TUS) |
(18) EMM |
16:10-16:35 |
Study of the color articial fiber pattern for Augmented Reality(AR) ISEC2015-21 SITE2015-19 ICSS2015-31 EMM2015-29 |
Wakana Tomita (TUS), Kitahiro Kanada (OPU), Keiichi Iwamura (TUS) |
Thu, Jul 2 PM Session B-3: SPT 15:45 - 16:35 |
(19) |
15:45-16:10 |
A Proposal of Wolf Websites on Tor Anonymity System
Nakata Kenjiro (Institute of Industrial Science, the University of Tokyo), Matsuura Kanta (Institute of Industrial Science, the University of Tokyo) |
(20) |
16:10-16:35 |
|
Fri, Jul 3 AM Session A-4: ISEC+ICSS 10:40 - 11:55 |
(21) ISEC |
10:40-11:05 |
Report on Workshop on Cybersecurity in a Post-Quantum World ISEC2015-22 SITE2015-20 ICSS2015-32 EMM2015-30 |
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.) |
(22) ISEC |
11:05-11:30 |
Proposal of Accelerating XL algorithm by Assigning Constants to Variables ISEC2015-23 SITE2015-21 ICSS2015-33 EMM2015-31 |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(23) ICSS |
11:30-11:55 |
On Anxiety Factors in Indirect Use for Cloud Type Medical Systems ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32 |
Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) |
Fri, Jul 3 AM Session B-4: CSEC 10:15 - 11:30 |
(24) |
10:15-10:40 |
delta ISMS model - Improving ISMS using accident database
HORIKAWA HIROSHI, OHTANI HISAMICHI, TAKAHASHI YUJI, KATO TAKEHISA, MAGATA FUMIHIKO, TESHIGAWARA YOSHIMI, SASAKI RYOICHI, NISHIGAKI MASAKATSU |
(25) |
10:40-11:05 |
|
(26) |
11:05-11:30 |
|
Announcement for Speakers |
General Talk | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E-: ic-c (to ISEC secretaries) |
SITE |
Technical Committee on Social Implications of Technology and Information Ethics (SITE) [Latest Schedule]
|
Contact Address |
|
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
EMM |
Technical Committee on Enriched MultiMedia (EMM) [Latest Schedule]
|
Contact Address |
|
IPSJ-CSEC |
Special Interest Group on Computer Security (IPSJ-CSEC) [Latest Schedule]
|
Contact Address |
|
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|
Last modified: 2015-06-29 18:31:28
|