IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2004)

Search Results: Keywords 'from:2004-11-08 to:2004-11-08'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, LOIS 2004-11-08
13:30
Osaka Osaka Univ. A twist technique based on third power residue and non residue
Yoshito Hidaka, Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
In this paper, we propose a twist technique based on third power residue and non residue. In addition,with the conventio... [more] ISEC2004-78 OIS2004-45
pp.1-6
ISEC, LOIS 2004-11-08
13:55
Osaka Osaka Univ. A Reconfigurable Dual-Field Multiplier for GF(P) and GF(2n)
Ryo Namba, Masaru Takesue (Hosei Univ)
This paper proposes a dual-field multiplier for the cryptographic system on GF(P) and GF(2^n) both with multiple key-siz... [more] ISEC2004-79 OIS2004-46
pp.7-12
ISEC, LOIS 2004-11-08
14:20
Osaka Osaka Univ. An Algebraic Surface Public-key Cryptosystem
Koichiro Akiyama (TOSHIBA), Yasuhiro Goto (Hokkaido Univ. of Edu.)
In this paper, we propose a new type of public-key cryptosystem whose security is based on a section finding problem of ... [more] ISEC2004-80 OIS2004-47
pp.13-20
ISEC, LOIS 2004-11-08
14:45
Osaka Osaka Univ. A Construction of Public-Key Crptosystem Based on Algebraic Coding and Random Coding Techniques over F2m
Masao Kasahara (Osaka Gakuin Univ.)
 [more] ISEC2004-81 OIS2004-48
pp.21-26
ISEC, LOIS 2004-11-08
15:30
Osaka Osaka Univ. A Group Signature Scheme with Membership Revocation for Large Groups
Fumiaki Kubooka, Toru Nakanishi, Nobuo Funabiki (Okayama Univ.)
Some group signature schemes with membership revocation were proposed.
In a scheme using an accumulator, the computatio... [more]
ISEC2004-82 OIS2004-49
pp.27-34
ISEC, LOIS 2004-11-08
15:55
Osaka Osaka Univ. A Threshold Cryptosystem Based on the Paillier's Encryption
Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo (NTT DoCoMo), Junji Shikata (Yokohama National univ.)
The threshold cryptosystem is a threshold distributed version of the
public key cryptosystem.
The threshold cryptosyst... [more]
ISEC2004-83 OIS2004-50
pp.35-41
ISEC, LOIS 2004-11-08
16:20
Osaka Osaka Univ. How to improve the insecurity of Canetti-Goldreich-Halevi public-key cryptosystems
Yoshinari Kobayashi (Chuo Univ.), Shigeo Tsujii (IISEC)
 [more] ISEC2004-84 OIS2004-51
pp.43-48
ISEC, LOIS 2004-11-09
09:00
Osaka Osaka Univ. Implentation mechanisms of scalable event-ordering system without single point of attack
Eiichi Horita, Satoshi Ono, Hidetaka Ishimoto (NTT)
 [more] ISEC2004-85 OIS2004-52
pp.1-8
ISEC, LOIS 2004-11-09
09:25
Osaka Osaka Univ. Time-stamping systems ensuring long term validity based on event-ordering systems
Hidetaka Ishimoto, Satoshi Ono, Eiichi Horita (NTT)
 [more] ISEC2004-86 OIS2004-53
pp.9-14
ISEC, LOIS 2004-11-09
09:50
Osaka Osaka Univ. A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] ISEC2004-87 OIS2004-54
pp.15-22
ISEC, LOIS 2004-11-09
10:15
Osaka Osaka Univ. Transformation-Free Proxy Cryptosystems with Limited Authorization
Lihua Wang (Tsukuba Univ.), Zhenfu Cao (Shanghai Jiao Tong Univ.), Eiji Okamoto, Ying Miao, Takeshi Okamoto (Tsukuba Univ.)
In this paper transformation-free proxy cryptosystems with limited
authorization (TFP systems) are studied. The TFP sys... [more]
ISEC2004-88 OIS2004-55
pp.23-28
ISEC, LOIS 2004-11-09
10:55
Osaka Osaka Univ. One-Time Key Type Authentication Scheme for P2P Service
Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
In P2P service, there is the case a user would not like to register his/her secret information such as password, because... [more] ISEC2004-89 OIS2004-56
pp.29-36
ISEC, LOIS 2004-11-09
11:20
Osaka Osaka Univ. Access Control by Service Connector with Single Sign-On Function
Youji Fukuta (The Univ. of Tokushima), Takehito Ninomiya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
In operation of server-hosts in client-server model, allowing to connect to general public is a frequent cause of frauds... [more] ISEC2004-90 OIS2004-57
pp.37-43
ISEC, LOIS 2004-11-09
11:45
Osaka Osaka Univ. A study of competition and diffusion of IP phone services
Naoki Mizutani (Nara Sangyo Univ.)
It is a rational way for IP phone users to choose the best phone network
considering which network other users join,
... [more]
ISEC2004-91 OIS2004-58
pp.45-50
ISEC, LOIS 2004-11-09
13:25
Osaka Osaka Univ. Virtual Transmission Monitoring System for Behavior Analysis of Virus
Toshihiko Hirooka (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima), Yuji Hoshizawa (Secure Brain), Koji Nakao (KDDI)
The resarch of virus such as detection of virus, or behavior analysis of virus is active. It is difficult to know the be... [more] ISEC2004-92 OIS2004-59
pp.51-56
ISEC, LOIS 2004-11-09
13:50
Osaka Osaka Univ. On Constructing the Illegal Code Detecting System on Memory for Virus Analysis
Sachihiro Ichikawa, Masaki Kamizono (Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Univ. of Tokushima)
 [more] ISEC2004-93 OIS2004-60
pp.57-62
ISEC, LOIS 2004-11-09
14:15
Osaka Osaka Univ. Design of Damage Prediction System By Event Dependent Model for Illegal Access
Ryoji Hasui (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
 [more] ISEC2004-94 OIS2004-61
pp.63-68
ISEC, LOIS 2004-11-09
14:55
Osaka Osaka Univ. A Software Vulnerability Management System for Server Farm by Using Digital Certificates
Motomu Nishikawa, Takeshi Okuda, Suguru Yamaguchi (NAIST)
In a server farm, application servers are connected to the LAN through
switches. In this case, if one server has a vul... [more]
ISEC2004-95 OIS2004-62
pp.69-76
ISEC, LOIS 2004-11-09
15:20
Osaka Osaka Univ. Internet Accounting System -- The Development Using Model Driven Architecture --
Daisuke Horinoue, Kenji Ohmori (Hosei Univ.)
 [more] ISEC2004-96 OIS2004-63
pp.77-84
ISEC, LOIS 2004-11-09
15:45
Osaka Osaka Univ. Complexity of the Chabaud-Joux Attack on SHA-0 with Different Message Schedules
Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida (Kyoto Univ.)
SHA-0 employs a primitive polynomial of degree 16 over GF(2) in its message scheduling. There are 2048 primitive polynom... [more] ISEC2004-97 OIS2004-64
pp.85-91
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan