|
Chair |
|
Naoya Torii (Fujitsu Labs.) |
Vice Chair |
|
Tsutomu Matsumoto (Yokohama National Univ.), Toshiaki Tanaka (KDDI Labs.) |
Secretary |
|
Toru Nakanishi (Okayama Univ.), Junji Shikata (Yokohama National Univ.) |
Assistant |
|
Tetsuya Izu (Fujitsu Labs.) |
|
Technical Committee on Life Intelligence and Office Information Systems (LOIS) |
[schedule] [select]
|
|
Chair |
|
Masanobu Abe (Okayama Univ.) |
Vice Chair |
|
Toshihiko Wakahara (Fukuoka Inst. of Tech.) |
Secretary |
|
Noriyasu Yamamoto (Fukuoka Inst. of Tech.), Tetsuya Kinebuchi (NTT) |
Assistant |
|
Hiroshi Konishi (NTT) |
|
Conference Date |
Mon, Nov 14, 2011 10:00 - 17:40
Tue, Nov 15, 2011 09:00 - 16:30 |
Topics |
|
Conference Place |
I101, Ekimae Campus, Osaka Electro-Communication University |
Address |
12-16, Hayakocho, Neyagawa, Osaka, 572-0837 Japan |
Transportation Guide |
http://oweb11.osakac.ac.jp/institution/access.html |
Contact Person |
Prof. Ryuichi Sakai
072-824-8900 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Mon, Nov 14 AM ISEC 10:00 - 11:40 |
(1) |
10:00-10:25 |
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction ISEC2011-34 LOIS2011-28 |
Yosuke Todo, Masakatu Morii (Kobe Univ.) |
(2) |
10:25-10:50 |
A Lattice Attack against (u|u+v)ΣPKC ISEC2011-35 LOIS2011-29 |
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) |
(3) |
10:50-11:15 |
On the attack against Gentry's somewhat homomorphic encryption using LLL algorithm (II) ISEC2011-36 LOIS2011-30 |
Jun Yajima, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (FUJITSU LAB.) |
(4) |
11:15-11:40 |
An element-selective knapsack cryptosystem with encryption multipliers ISEC2011-37 LOIS2011-31 |
Yuki Okada, Akira Hayashi (KIT) |
|
11:40-12:40 |
Lunch ( 60 min. ) |
Mon, Nov 14 PM LOIS -Life Log- 12:40 - 14:10 |
(5) |
12:40-13:10 |
A study on necessary location information accuracy in lifelog ISEC2011-38 LOIS2011-32 |
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) |
(6) |
13:10-13:40 |
Evaluation method for telephone conversations retrieval using precision and recall ISEC2011-39 LOIS2011-33 |
Hiroyuki Nishi, Yuuki Yokobayashi, Haiyen, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ) |
(7) |
13:40-14:10 |
Proposal of “Knowledge Recommender” the Business-knowledge Sharing System and Rating Evaluation
-- Application for Building Energy Management Service -- ISEC2011-40 LOIS2011-34 |
Minako Toba (Hitachi, Ltd.) |
|
14:10-14:20 |
Break ( 10 min. ) |
Mon, Nov 14 PM ISEC 14:20 - 16:00 |
(8) |
14:20-14:45 |
Three dimensional Dyck Path Cipher ISEC2011-41 LOIS2011-35 |
Jun Hashimoto, Akira Hayashi (KIT) |
(9) |
14:45-15:10 |
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security -- ISEC2011-42 LOIS2011-36 |
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) |
(10) |
15:10-15:35 |
Ramp secret sharing scheme based on MBR codes ISEC2011-43 LOIS2011-37 |
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe University) |
(11) |
15:35-16:00 |
Formalization and Verification of Arithmetic Algorithms by Mizar ISEC2011-44 LOIS2011-38 |
Yoshiki Aoki, Hiroyuki Okazaki, Yasunari Shidama (Shinshu Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Mon, Nov 14 PM LOIS -Office System- 16:10 - 17:40 |
(12) |
16:10-16:40 |
Designing a Filter for Internet Flow Control under Macro Dynamics
-- Towards Innovating Autonomous Network Architecture for Future Dynamics-aware Internet -- ISEC2011-45 LOIS2011-39 |
Jian-Qin Liu (NICT), Wuyi Yue (Konan Univ.), Hiroaki Umehara (NICT) |
(13) |
16:40-17:10 |
Efficient Decoding of QR Code using Error Correcting Capability
-- Decoding Method using Erasure Error Correction and the Ability -- ISEC2011-46 LOIS2011-40 |
Keisuke Saito, Masakatu Morii (Kobe Univ.) |
(14) |
17:10-17:40 |
A suudy of machine learning corresponding to the change of a turn and the of the recognition object ISEC2011-47 LOIS2011-41 |
Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.) |
Tue, Nov 15 AM ISEC 09:00 - 10:40 |
(15) |
09:00-09:25 |
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks ISEC2011-48 LOIS2011-42 |
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) |
(16) |
09:25-09:50 |
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems Using Clockwise Collisions ISEC2011-49 LOIS2011-43 |
Hikaru Sakamoto, Yang Li, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm.) |
(17) |
09:50-10:15 |
Optimized Right-to-Left Scalar Multiplication RIP Algorithms ISEC2011-50 LOIS2011-44 |
Atsuko Miyaji, Yiren Mo (JAIST) |
(18) |
10:15-10:40 |
Efficient Privacy Preserving Set Operations ISEC2011-51 LOIS2011-45 |
Atsuko Miyaji, Mohammad Rahman (JAIST) |
|
10:40-10:55 |
Break ( 15 min. ) |
Tue, Nov 15 AM LOIS -System Security- 10:55 - 12:25 |
(19) |
10:55-11:25 |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol ISEC2011-52 LOIS2011-46 |
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) |
(20) |
11:25-11:55 |
Secure and Effective Password Management System ISEC2011-53 LOIS2011-47 |
Ryo Hirano, Masakatu Morii (Kobe Univ.) |
(21) |
11:55-12:25 |
Secure VoIP system for mobile devices ISEC2011-54 LOIS2011-48 |
Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.) |
|
12:25-13:25 |
Lunch ( 60 min. ) |
Tue, Nov 15 PM ISEC 13:25 - 14:40 |
(22) |
13:25-13:50 |
SLP separates the strong RSA assumption from the DDH assumption ISEC2011-55 LOIS2011-49 |
Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) |
(23) |
13:50-14:15 |
On the Little Knowledge Interactive Proof ISEC2011-56 LOIS2011-50 |
Jun-ya Iwazaki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) |
(24) |
14:15-14:40 |
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols ISEC2011-57 LOIS2011-51 |
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
|
14:40-14:50 |
Break ( 10 min. ) |
Tue, Nov 15 PM ISEC 14:50 - 16:30 |
(25) |
14:50-15:15 |
On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8 ISEC2011-58 LOIS2011-52 |
Masaaki Shirase (FUN) |
(26) |
15:15-15:40 |
A proposal of Privacy Impact Assessment framework in Japan ISEC2011-59 LOIS2011-53 |
Shigeru Ishida, Sadamu Takasaka, Mamoru Yokoyama, Yoichi Seto (AIIT) |
(27) |
15:40-16:05 |
Content Authentication for Range Queries in Peer-to-Peer Networks ISEC2011-60 LOIS2011-54 |
Shoichi Hirose (Univ. of Fukui) |
(28) |
16:05-16:30 |
On the Insecurity of Randomized Arithmetic Codes Based on Markov Model ISEC2011-61 LOIS2011-55 |
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.) |
Announcement for Speakers |
General Talk (ISEC) | Each speech will have 20 minutes for presentation and 5 minutes for discussion. |
General Talk (LOIS) | Each speech will have 20 minutes for presentation and 10 minutes for discussion. |
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E-: ic-c (to ISEC secretaries) |
LOIS |
Technical Committee on Life Intelligence and Office Information Systems (LOIS) [Latest Schedule]
|
Contact Address |
Noriyasu Yamamoto
Fukuoka Institute of Technology
3-30-1 Wajiro-higashi, Higashi-ku, Fukuoka-shi 811-0295
FAX +81-92-606-0758
E-: fit |
Last modified: 2011-11-09 09:52:23
|