IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Toru Fujiwara (Osaka Univ.)
Vice Chair Naoya Torii (Fujitsu Labs.), Tsutomu Matsumoto (Yokohama National Univ.)
Secretary Katsuyuki Takashima (Mitsubishi Electric), Toru Nakanishi (Okayama Univ.)
Assistant Junji Shikata (Yokohama National Univ.)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Hiroyuki Inaba (Kyoto Inst. of Tech.)
Vice Chair Michio Nakanishi (Osaka Inst. of Tech.), Noriaki Yoshikai (Nihon Univ.)
Secretary Soichiro Morishita (Univ. of Tokyo), Kazuhiro Suzuki (Kanagawa Univ.)
Assistant Norimasa Sugiyama (Osaka Inst. of Tech.)

Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Koji Nakao (KDDI/NICT)
Vice Chair Masakatsu Morii (Kobe Univ.), Yuu Miyake (KDDI Labs.)
Secretary Naoto Sone (Naruto Univ.), Shiho Moriai (Sony)
Assistant Daisuke Inoue (NICT)

Conference Date Thu, Jul 1, 2010 10:30 - 17:00
Fri, Jul 2, 2010 09:00 - 17:25
Topics  
Conference Place  
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

Thu, Jul 1 AM 
10:30 - 11:45
(1)
SITE
10:30-10:55 Correlation Problems between Security Protection and Intellectual Property Protection of Information ISEC2010-10 SITE2010-6 ICSS2010-16 Haruo Kodama (Open Univ. of Japan/SOKENDAI)
(2)
SITE
10:55-11:20 A Study on Log Analysis Based on Tendency of IDS Alert Events ISEC2010-11 SITE2010-7 ICSS2010-17 Tsuyoshi Toda, Hiroyuki Inaba (Kyoto Inst. of Tech.)
(3)
SITE
11:20-11:45 Limit of "Control Theory" of Privacy
-- Presentation of Identity and Context Dependency of Privacy --
ISEC2010-12 SITE2010-8 ICSS2010-18
Takushi Otani (Kibi International Univ.)
Thu, Jul 1 PM 
13:25 - 15:30
(4)
ISEC
13:25-13:50 On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher ISEC2010-13 SITE2010-9 ICSS2010-19 Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science)
(5)
ISEC
13:50-14:15 Protection Mode Against Cache Attack (HYRAL) ISEC2010-14 SITE2010-10 ICSS2010-20 Kouzou Hirata (LIS)
(6)
ISEC
14:15-14:40 An Optimization of AES Decryption Using the Bitslice Technique ISEC2010-15 SITE2010-11 ICSS2010-21 Fumihiko Sano (Toshiba Solutions Corporation)
(7)
ISEC
14:40-15:05 An Artifact-Metric System which Extracts Values Unique to Individual Paper ISEC2010-16 SITE2010-12 ICSS2010-22 Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.)
(8)
ISEC
15:05-15:30 Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol ISEC2010-17 SITE2010-13 ICSS2010-23 Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.)
Thu, Jul 1 AM 
10:30 - 12:10
(9) 10:30-10:55  
(10) 10:55-11:20  
(11) 11:20-11:45  
(12) 11:45-12:10  
Thu, Jul 1 PM 
13:25 - 15:30
(13)
ICSS
13:25-13:50 Evaluating Destination Hosts of Malware Based on Search Engine Results ISEC2010-18 SITE2010-14 ICSS2010-24 Kazufumi Aoki, Mitsuaki Akiyama, Makoto Iwamura, Mitsutaka Itoh (NTT)
(14)
ICSS
13:50-14:15 Image Authentication with Access Control Based on Reversible Data Hiding ISEC2010-19 SITE2010-15 ICSS2010-25 Kenta Watanabe, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metro. Univ.)
(15)
ICSS
14:15-14:40 Building Ontology of Cybersecurity Operational Information ISEC2010-20 SITE2010-16 ICSS2010-26 Takeshi Takahashi, Youki Kadobayashi (NICT), Hiroyuki Fujiwara (SCW)
(16)
ICSS
14:40-15:05 Access policy management architecture for virtual server consolidation systems ISEC2010-21 SITE2010-17 ICSS2010-27 Ryuichi Ogawa, Masayuki Nakae, Yoshiharu Maeno, Yoichiro Morita, Fumio Machida, Kumiko Tadano (NEC)
(17)
ICSS
15:05-15:30 On the use and misuse of E-mail sender authentication mechanisms ISEC2010-22 SITE2010-18 ICSS2010-28 Tatsuya Mori (NTT)
Thu, Jul 1 PM 
15:45 - 17:00
(18) 15:45-17:00  
Fri, Jul 2 AM 
09:00 - 10:15
(19)
ISEC
09:00-09:25 Proposal on MPKC Signature Scheme with Check Equations ISEC2010-23 SITE2010-19 ICSS2010-29 Shigeo Tsujii, Masahito Gotaishi (Chuo University)
(20)
ISEC
09:25-09:50 Improvement of Rainbow MPKC Signature system ISEC2010-24 SITE2010-20 ICSS2010-30 Masahito Gotaishi (Chuo Univ.)
(21)
ISEC
09:50-10:15 Consideration on the Luby-Rackoff Cipher based on Physically Unclonable Functions ISEC2010-25 SITE2010-21 ICSS2010-31 Yutaka Kawai (Univ. of Tokyo), Yuichi Komano (Tohisiba), Kazuo Ohta (Univ. of Electro-Comm.)
Fri, Jul 2 AM 
10:30 - 12:10
(22)
ISEC
10:30-10:55 On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 --
ISEC2010-26 SITE2010-22 ICSS2010-32
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST)
(23)
ISEC
10:55-11:20 Implementation of Key Generation Center for Identity-based Encryption ISEC2010-27 SITE2010-23 ICSS2010-33 Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba)
(24)
ISEC
11:20-11:45 A note for secure information sharing systems ISEC2010-28 SITE2010-24 ICSS2010-34 Gembu Morohashi, Akira Nagai (NTT Corp.)
(25)
ISEC
11:45-12:10 On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption ISEC2010-29 SITE2010-25 ICSS2010-35 Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.)
Fri, Jul 2 PM 
13:25 - 15:05
(26)
ISEC
13:25-13:50 Attribute-based encryption with arbitrary number of authorities ISEC2010-30 SITE2010-26 ICSS2010-36 Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC)
(27)
ISEC
13:50-14:15 An Efficient Broadcast Encryption with Personalized Messages ISEC2010-31 SITE2010-27 ICSS2010-37 Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK)
(28)
ISEC
14:15-14:40 Efficient Augmented PAK Protocols ISEC2010-32 SITE2010-28 ICSS2010-38 SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
(29)
ISEC
14:40-15:05 On the Relationship between Recognizing Languages and Computing Functions ISEC2010-37 SITE2010-33 ICSS2010-43 Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya (Tohoku Univ.)
Fri, Jul 2 PM 
15:20 - 17:00
(30)
ISEC
15:20-15:45 On the examination on speeding Cheon's algorithm ISEC2010-33 SITE2010-29 ICSS2010-39 Masaya Yasuda, Tetsuya Izu, Masahiko Takenaka (Fujitsu Lab.)
(31)
ISEC
15:45-16:10 On the proportion of the curves constructed by Brezing-Weng in the pairing-friendly curves ISEC2010-34 SITE2010-30 ICSS2010-40 Takanori Yasuda (Kyushu Univ.), Masaya Yasuda, Takeshi Shimoyama, Jun Kogure (Fujitsu Labo.)
(32)
ISEC
16:10-16:35 DLP with Auxiliary Input and the Security of Cryptographic Protocols ISEC2010-35 SITE2010-31 ICSS2010-41 Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab,), Goichiro Hanaoka (AIST), Masaya Yasuda (FUJITSU Lab,)
(33)
ISEC
16:35-17:00 Cost Estimates of CNTW Attack against EMV Signatures ISEC2010-36 SITE2010-32 ICSS2010-42 Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
Fri, Jul 2 AM 
09:00 - 10:15
(34) 09:00-09:25  
(35) 09:25-09:50  
(36) 09:50-10:15  
Fri, Jul 2 AM 
10:30 - 12:10
(37) 10:30-10:55  
(38) 10:55-11:20  
(39) 11:20-11:45  
(40) 11:45-12:10  
Fri, Jul 2 PM 
13:25 - 15:05
(41) 13:25-13:50  
(42) 13:50-14:15  
(43) 14:15-14:40  
(44) 14:40-15:05  
Fri, Jul 2 PM 
15:20 - 17:25
(45) 15:20-15:45  
(46) 15:45-16:10  
(47) 16:10-16:35  
(48) 16:35-17:00  
(49) 17:00-17:25  

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E--mail: is-qst 
Announcement Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html


Last modified: 2010-06-27 07:13:51


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /  
 
 Go Top  Go Back   Prev IPSJ-CSEC Conf / Next IPSJ-CSEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan