Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2005-11-14 13:00 |
Fukuoka |
Kitakyushu Science and Research Park |
A Study on Coordination Assistance of the Clothes Using Picture Search Shunsuke Sakazaki, Toshihiko Wakahara (Fkuoka Institute of Technology) |
[more] |
ISEC2005-89 OIS2005-52 pp.1-6 |
ISEC, LOIS |
2005-11-14 13:25 |
Fukuoka |
Kitakyushu Science and Research Park |
Investigation of retrieval method reflecting user's feeling Kaoru Sugita, Masao Yokota (FIT), Akihiro Miyakawa (Nanao City, Ishikawa Pref.), Giuseppe De Marco, Leonard Barolli (FIT), Yoshitaka Shibata (Iwate Prefectural Univ.) |
[more] |
ISEC2005-90 OIS2005-53 pp.7-12 |
ISEC, LOIS |
2005-11-14 13:50 |
Fukuoka |
Kitakyushu Science and Research Park |
Some Expansions of Universal Digital Talking Book Authoring System "HIMAWARI" Reiko Shinohara, Takanori Takeuchi, Yukio Rikiso (U. of Hyogo) |
[more] |
ISEC2005-91 OIS2005-54 pp.13-18 |
ISEC, LOIS |
2005-11-14 14:15 |
Fukuoka |
Kitakyushu Science and Research Park |
A Study on the Configuration of the Community System Toshihiko Wakahara, Yuuya Hiwatashi (FIT), Hirofumi Iori, Jiriki Tei, Munehisa Shibata (Kyusyu Keiso) |
Recently, the community services, such as weblog services based on the web diary which are constructed by Movable Type a... [more] |
ISEC2005-92 OIS2005-55 pp.19-24 |
ISEC, LOIS |
2005-11-14 14:40 |
Fukuoka |
Kitakyushu Science and Research Park |
Development of Multimedia Use in Distant Education of Alice Springs School of Air Shiro Uesugi (Matsuyama Univ.) |
There have been varieties of distance education systems. Alice Springs School of Air (ASSOA) is presently undergoing a ... [more] |
ISEC2005-93 OIS2005-56 pp.25-31 |
ISEC, LOIS |
2005-11-14 15:20 |
Fukuoka |
Kitakyushu Science and Research Park |
A Proposal of Three Term Public-Key Cryptosystem, KM(3)-PKC
-- Along with Challenge Problems on KM(3)-PKC of Very Small Key-Size -- Masao Kasahara (Osaka Gakuin Univ.), Yasuyuki Murakami (Osaka Electro-Comm. Univ.) |
[more] |
ISEC2005-94 OIS2005-57 pp.33-37 |
ISEC, LOIS |
2005-11-14 15:45 |
Fukuoka |
Kitakyushu Science and Research Park |
A Digital Signature Suitable for XTR Masaaki Shirase, Yasushi Hibino (JAIST) |
This paper proposes a new efficient digital signature scheme for
XTR (Efficient and Compact Subgroup Trace Representat... [more] |
ISEC2005-95 OIS2005-58 pp.39-44 |
ISEC, LOIS |
2005-11-14 16:10 |
Fukuoka |
Kitakyushu Science and Research Park |
Study of System Application for MUGI Hardware Takashi Matsumoto, Toru Owada, Shigeki Taira (Hitachi), Yoshifumi Kawamura (Renesas) |
[more] |
ISEC2005-96 OIS2005-59 pp.45-52 |
ISEC, LOIS |
2005-11-14 16:35 |
Fukuoka |
Kitakyushu Science and Research Park |
A study of the reconstruction of display image on a PC's monitor by unintiontional electromagnetic emanation
-- Emanated electromagnetic signal measurement method and reconstructed display image using measured signal emanation -- Hidenori Sekiguchi, Hidema Tanaka, Shinji Seto, Akihiro Yamamura (NICT) |
[more] |
ISEC2005-97 OIS2005-60 pp.53-58 |
ISEC, LOIS |
2005-11-15 09:15 |
Fukuoka |
Kitakyushu Science and Research Park |
A Study on Wartermark for Texture Images on 3D Virtual Space Shunsuke Araki (Kyushu Institute of Tech.) |
We show a three-dimensional landscape rendering method with image compression with vector quantization based on the rend... [more] |
ISEC2005-98 OIS2005-61 pp.1-5 |
ISEC, LOIS |
2005-11-15 09:40 |
Fukuoka |
Kitakyushu Science and Research Park |
Dynamic Access Control Method for Ad-Hoc Information Sharing Yoichiro Morita, Masayuki Nakae, Ryuichi Ogawa (NEC) |
This paper proposes a context-based access control model CBAC that can handle temporal access control of ad-hoc group me... [more] |
ISEC2005-99 OIS2005-62 pp.7-14 |
ISEC, LOIS |
2005-11-15 10:05 |
Fukuoka |
Kitakyushu Science and Research Park |
An Information Leakage Risk Evaluation Method Based n ecurity Configuration Hiroshi Sakaki, Kazuo Yanoo, Ryuichi Ogawa, Itaru Hosomi (NEC) |
[more] |
ISEC2005-100 OIS2005-63 pp.15-22 |
ISEC, LOIS |
2005-11-15 10:30 |
Fukuoka |
Kitakyushu Science and Research Park |
Examination and implementation of network security against distributed denial of service attacks
-- Design and introduction of DTI hub -- Kentarou Nagayama, Haruhiko Shirai, Isamu Takahashi, Jousuke Kuroiwa, Tomohiro Odaka, Hisakazu Ogura (Fukui Univ.) |
[more] |
ISEC2005-101 OIS2005-64 pp.23-24 |
ISEC, LOIS |
2005-11-15 11:10 |
Fukuoka |
Kitakyushu Science and Research Park |
On Construction of Periodic Sequence on Algebraic Curve over Finite Field Takayasu Kaida (Kinki Univ.) |
In this paper, a construction method for a periodic sequence over a finite field $F'$ from rational points on a algebrai... [more] |
ISEC2005-102 OIS2005-65 pp.25-28 |
ISEC, LOIS |
2005-11-15 11:35 |
Fukuoka |
Kitakyushu Science and Research Park |
Some Results of Brute Force Attack for a Random Seed and Security Evaluation of Pseudo Random Number Generator using Logistic-Mapping Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Kyoki Imamura (Kyushu Inst. of Tech.) |
Security of Pseudo Random Number Generators(PRNGs), which means no one except valid user can
specify unknown outputs fr... [more] |
ISEC2005-103 OIS2005-66 pp.29-33 |
ISEC, LOIS |
2005-11-15 13:15 |
Fukuoka |
Kitakyushu Science and Research Park |
Improved Collision Attack on MD5 Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.) |
In EUROCRYPT2005, a collision attack on MD5 was proposed by Wang et al.
In this attack, conditions which are sufficien... [more] |
ISEC2005-104 OIS2005-67 pp.35-42 |
ISEC, LOIS |
2005-11-15 13:40 |
Fukuoka |
Kitakyushu Science and Research Park |
Efficient Algorithm for Computing Linear Probability of constant addition (2) Kazunori Sumikawa (TUS), Hirotaka Ittogi (Canon), Toshinobu Kaneko (TUS) |
This paper presents an efficient algorithm for computing linear probability of constant addition modulo $2^n$. Ittogi et... [more] |
ISEC2005-105 OIS2005-68 pp.43-49 |
ISEC, LOIS |
2005-11-15 14:05 |
Fukuoka |
Kitakyushu Science and Research Park |
On Reference Positions and Bits in Differential Power Analysis Attack against DES Yousuke Kakuishi, Akihiko Sasaki, Koki Abe (UEC) |
Differential power analysis (DPA) is a kind of side channel attacks which enables attackers to estimate secret informati... [more] |
ISEC2005-106 OIS2005-69 pp.51-56 |
ISEC, LOIS |
2005-11-15 14:45 |
Fukuoka |
Kitakyushu Science and Research Park |
A Universally Composable Commitment Protocol based on KEA1 and Revocable DDH Assumptions Yosuke Iwasaki, Seiko Arita (IISEC) |
[more] |
ISEC2005-107 OIS2005-70 pp.57-62 |
ISEC, LOIS |
2005-11-15 15:10 |
Fukuoka |
Kitakyushu Science and Research Park |
Asymmetric 3-party Password Authenticated Kay Exchange Toru Iino, Shin'ichiro Matsuo (NTT DATA), Hiroto Matsuoka, Wakaha Ogata (Tokyo Inst. of Tech.) |
Password-based authenticated key exchange (PAKE) are protocols in which
two parties establish secure session key by us... [more] |
ISEC2005-108 OIS2005-71 pp.63-70 |