IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Akira Hayashi
Vice Chair Shinichi Kawamura, Masakatsu Morii
Secretary Atsushi Fujioka, Shoichi Hirose
Assistant Shoichi Hirose

Technical Committee on Office Information System (OIS)
Chair Masakatsu Morii
Secretary Naoki Mizutani, Norihiko Matsuura

Conference Date Mon, Nov 8, 2004 13:30 - 16:45
Tue, Nov 9, 2004 09:00 - 16:10
Topics  
Conference Place Convention Center, Suita Campus, Osaka University 
Transportation Guide http://www.osaka-u.ac.jp/eng/campus/index.html
Contact
Person
Prof. Toru Fujiwara

Mon, Nov 8 PM 
13:30 - 16:45
(1) 13:30-13:55 A twist technique based on third power residue and non residue Yoshito Hidaka, Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
(2) 13:55-14:20 A Reconfigurable Dual-Field Multiplier for GF(P) and GF(2n) Ryo Namba, Masaru Takesue (Hosei Univ)
(3) 14:20-14:45 An Algebraic Surface Public-key Cryptosystem Koichiro Akiyama (TOSHIBA), Yasuhiro Goto (Hokkaido Univ. of Edu.)
(4) 14:45-15:10 A Construction of Public-Key Crptosystem Based on Algebraic Coding and Random Coding Techniques over F2m Masao Kasahara (Osaka Gakuin Univ.)
  15:10-15:30 Break ( 20 min. )
(5) 15:30-15:55 A Group Signature Scheme with Membership Revocation for Large Groups Fumiaki Kubooka, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)
(6) 15:55-16:20 A Threshold Cryptosystem Based on the Paillier's Encryption Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo), Junji Shikata (Yokohama National univ.)
(7) 16:20-16:45 How to improve the insecurity of Canetti-Goldreich-Halevi public-key cryptosystems Yoshinari Kobayashi (Chuo Univ.), Shigeo Tsujii (IISEC)
Tue, Nov 9 AM 
09:00 - 12:10
(8) 09:00-09:25 Implentation mechanisms of scalable event-ordering system without single point of attack Eiichi Horita, Satoshi Ono, Hidetaka Ishimoto (NTT)
(9) 09:25-09:50 Time-stamping systems ensuring long term validity based on event-ordering systems Hidetaka Ishimoto, Satoshi Ono, Eiichi Horita (NTT)
(10) 09:50-10:15 A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
(11) 10:15-10:40 Transformation-Free Proxy Cryptosystems with Limited Authorization Lihua Wang (Tsukuba Univ.), Zhenfu Cao (Shanghai Jiao Tong Univ.), Eiji Okamoto, Ying Miao, Takeshi Okamoto (Tsukuba Univ.)
  10:40-10:55 Break ( 15 min. )
(12) 10:55-11:20 One-Time Key Type Authentication Scheme for P2P Service Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
(13) 11:20-11:45 Access Control by Service Connector with Single Sign-On Function Youji Fukuta (The Univ. of Tokushima), Takehito Ninomiya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
(14) 11:45-12:10 A study of competition and diffusion of IP phone services Naoki Mizutani (Nara Sangyo Univ.)
Tue, Nov 9 PM 
13:25 - 16:10
(15) 13:25-13:50 Virtual Transmission Monitoring System for Behavior Analysis of Virus Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI)
(16) 13:50-14:15 On Constructing the Illegal Code Detecting System on Memory for Virus Analysis Sachihiro Ichikawa, Masaki Kamizono (Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Univ. of Tokushima)
(17) 14:15-14:40 Design of Damage Prediction System By Event Dependent Model for Illegal Access Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
  14:40-14:55 Break ( 15 min. )
(18) 14:55-15:20 A Software Vulnerability Management System for Server Farm by Using Digital Certificates Motomu Nishikawa, Takeshi Okuda, Suguru Yamaguchi (NAIST)
(19) 15:20-15:45 Internet Accounting System
-- The Development Using Model Driven Architecture --
Daisuke Horinoue, Kenji Ohmori (Hosei Univ.)
(20) 15:45-16:10 Complexity of the Chabaud-Joux Attack on SHA-0 with Different Message Schedules Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida (Kyoto Univ.)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Shoichi Hirose(Graduate School of Informatics,Kyoto University)
TEL075-753-5316,FAX075-753-4982
E--mail: ic-c (to ISEC secretaries) 
OIS Technical Committee on Office Information System (OIS)   
Contact Address Naoki Mizutani
Nara Sangyo University, Faculty of Business Administration
Tateno-kita, Sango, Ikoma-gun, Nara 636-8503
TEL0745-73-7800,FAX0745-72-0822
_m 


Last modified: 2004-11-04 09:04:20


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan