Thu, Jul 21 AM Room A 09:30 - 12:00 |
(1) |
09:30-09:55 |
A Proposal of Worm Detection System by Taking a Statistics of Series of Packets to Honeypot |
Maki Kataoka, Yumiko Ishige (NTT Data Corporation), Nobutaka Mantani, Humiharu Ohashi (National Police Agency) |
(2) |
09:55-10:20 |
A Study on Implementation of the Worm Prevention System Following the Infection Process |
Shusuke Maeda, Tatsuya Baba, Hisamichi Ohtani, Masataka Kado, Tsutomu Inada (NTT DATA) |
(3) |
10:20-10:45 |
A Study on a Method for Malware Quarantine in a Multi-OS Environment |
Tatsuya Baba, Hiroshi Fujimoto, Masataka Kado, Tsutomu Inada (NTT Data) |
(4) |
10:45-11:10 |
A Consideration of Spyware Detection using Traffic Analysis |
Akira Yonahara, Hisamichi Ohtani, Tatsuya Baba, Tsutomu Inada (NTT DATA) |
(5) |
11:10-11:35 |
Evaluation of the quarantine system using "in the wild" viruses |
Osamu Tanaka, Katsuya Uchida (IISEC) |
(6) |
11:35-12:00 |
A Note of Intrusion Detection using Alteration of Data |
Fumiaki Nagano, Kohei Tatara (Kyushu Univ.), Toshihiro Tabata (Okayama Univ), Kouichi Sakurai (Kyushu Univ.) |
Thu, Jul 21 AM Room B 09:55 - 12:00 |
(7) |
09:55-10:20 |
Comparison of Error Probabilities of The Miller-Rabin Test by Experimental Measurement Value and Theoretical Upper Bound |
Toshiya Nakajima (Fujitsu Labs.) |
(8) |
10:20-10:45 |
On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack |
Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC) |
(9) |
10:45-11:10 |
Performance of Prime Order Elliptic Curve Generation based on y-twist |
Mayumi Obara, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) |
(10) |
11:10-11:35 |
Defeating Simple Power Analysis on Koblitz Curves |
Katsuyuki Okeya (Hitachi), Tsuyoshi Takagi (Future Univ. of Hakodate), Camille Vuillaume (Hitachi) |
(11) |
11:35-12:00 |
Development of DPA evaluation platform for 32 bit processor |
Koichi Fujisaki, Hideo Shimizu, Atsushi Shimbo (Toshiba Corp.) |
Thu, Jul 21 PM Room A 13:00 - 17:50 |
(12) |
13:00-13:25 |
Researches on Incident Tendency Detection Method on Frequency Analysis |
Hirofumi Nakakoji, Masato Terada, Kenichi Sakamoto (Hitachi) |
(13) |
13:25-13:50 |
Study on Host Profiling for Incident Analysis |
Kazuya Ohkouchi (NICT/HITACHI), Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI) |
(14) |
13:50-14:15 |
A Simulation-based UDP Traffic Analysis of DNSSEC |
Kenji Rikitake (NICT), Koji Nakao (NICT/KDDI), Shinji Shimojo (Osaka Univ.), Hiroki Nogawa (Tokyo Medical and Dental Univ.) |
(15) |
14:15-14:40 |
Research on Epidemiologic Approach for Anti Computer Viruses - 2
-- Applying to the model of anti mass-mailing virus measure -- |
Satoshi Seki (Waseda Univ.), Ryoichi Sasaki (Tokyo Denki Univ.), Mitsuru Iwamura (Waseda Univ.), Hiroshi Motosugi (Tokyo Denki Univ.) |
(16) |
14:40-15:05 |
Extension and Evaluation of Check Function for Improper Sending of Personal Information in Encrypted Mail System |
Kenji Yasu (TDU), Yasuhiko Akabane (NSD), Masami Ozaki (HIN), Koji Semoto (DCS), Ryoichi Sasaki (TDU) |
(17) |
15:05-15:30 |
Guardian watch support system for the children's Web access |
Tatsumi Ueda, Yoshiaki Takai (Hokkaido Univ.) |
|
15:30-15:45 |
Break ( 15 min. ) |
(18) |
15:45-16:10 |
* |
Keiko Kinoshita, Yasuhiro Inazumi, Hirotsugu Kinoshita (Kanagawa Univ.), |
(19) |
16:10-16:35 |
Systematizing of Information Forensics |
Kouichi Mukouyama, Katsuya Uchida (IISEC) |
(20) |
16:35-17:00 |
Consideration about intellectual property rights in university graduation thesis and production created by students |
Ryoju Hamada (Tohoku Univ.), Norihisa Segawa, Yuko Murayama (Iwate-pu) |
(21) |
17:00-17:25 |
The Direction of Japan's CMVP II |
Yuichi Hagiwara (C4T), Travis Spann (InfoGard), Tatsuaki Takebe (Yokogawa) |
(22) |
17:25-17:50 |
On the Standardization of Information Security
-- Report on the Vienna Meeting in April, 2005 -- |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric), Toshio Tatsuta (IBM Japan), Akira Otsuka (IPA/AIST), Kan Yasuda (NTT) |
Thu, Jul 21 PM Room B 13:00 - 18:15 |
(23) |
13:00-13:25 |
Construction of Oblivious Signatures |
Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
(24) |
13:25-13:50 |
Partially Blind Signatures with Traceability |
Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT) |
(25) |
13:50-14:15 |
Proposal on Sumi coating method which can change the coating parts to protect against insider attacks |
Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ) |
(26) |
14:15-14:40 |
Exact t-out-of-n Signer-Ambiguous Signature |
Eiichiro Fujisaki, Koutarou Suzuki (NTT) |
(27) |
14:40-15:05 |
An (N,K) Threshold Signature Scheme with Public Keys of Small Size |
Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Comm. Univ.) |
(28) |
15:05-15:30 |
Meta Ring Signature |
Hiroyuki Okazaki (KCG), Ryuichi Sakai (OECU), Masao Kasahara (OGU) |
|
15:30-15:45 |
Break ( 15 min. ) |
(29) |
15:45-16:10 |
An Information Hiding System for Word 2003 XML Documents |
Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo) |
(30) |
16:10-16:35 |
A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow |
Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.) |
(31) |
16:35-17:00 |
A Text hiding by Visual Secret Sharing with Picture Images |
Takashi Miyaki, Kazuya Shioda (Shizuoka Univ.), Hideki Yoshida (NTT Data), Masaharu Ozawa (ChanceLab.), Masakatsu Nishigaki (Shizuoka Univ.) |
(32) |
17:00-17:25 |
Implementation and Evaluation of Memory Protection Methods for Multitask OSes
-- CMS for Resource-poor Platforms and Tampering Detection -- |
Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo) |
(33) |
17:25-17:50 |
A description model for data access control in Salvia operating system |
Yoshimi Ichiyanagi, Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo (Ritsumeikan Univ.) |
(34) |
17:50-18:15 |
A Case Study of Gordon-Loeb Model on Optimal Security Investiments |
Kimio Kuramitsu (Yokohama National Univ.) |
Fri, Jul 22 AM Room A 09:30 - 12:00 |
(35) |
09:30-09:55 |
A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation |
Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications) |
(36) |
09:55-10:20 |
Murakami-Kasahara ID-based Key Sharing Scheme Revisited
-- In Comparison With Maurer-Yacobi Scheme -- |
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.) |
(37) |
10:20-10:45 |
Efficient N-Party Password-based Authenticated Key Exchange Protocol |
SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo) |
(38) |
10:45-11:10 |
Relations Among Notions of Security for Identity Based Encryption Schemes |
Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST) |
(39) |
11:10-11:35 |
On a secure circuit evaluation protocol using ElGamal encryption |
Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT) |
(40) |
11:35-12:00 |
An efficiently-verifiable zero-knowledge argument for proofs of knowledge |
Tsuyoshi Yamamoto, Eiichiro Fujisaki, Masayuki Abe (NTT) |
Fri, Jul 22 AM Room B 09:30 - 11:35 |
(41) |
09:30-09:55 |
Development of a certificate path cache method for Certificate Validation Service |
Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.) |
(42) |
09:55-10:20 |
A Status Detection of Secure Communication in Secure Service Platform |
Osamu Takata, Yuko Sawai, Kazuyoshi Hoshino, Tadashi Kaji, Keisuke Takeuchi, Takahiro Fujishiro, Satoru Tezuka (Hitachi) |
(43) |
10:20-10:45 |
Development of Combined Authentication System |
Shinji Hirata, Masahiro Mimura, Kenta Takahashi, Yoshiaki Isobe (Hitachi) |
(44) |
10:45-11:10 |
A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository |
Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT) |
(45) |
11:10-11:35 |
On Shared Attribute Certification |
Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.) |
Fri, Jul 22 PM Room A 13:00 - 17:50 |
(46) |
13:00-13:25 |
Critical cryptoanalysis for Y-00 |
Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco) |
(47) |
13:25-13:50 |
Cheater Identifiable Quantum Secret Sharing Schemes |
Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST) |
(48) |
13:50-14:15 |
Improvement of the Security against Photon Number Splitting Attacks |
Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing) |
(49) |
14:15-14:40 |
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices |
Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.) |
(50) |
14:40-15:05 |
Improved Collision Attack on MD4 with Probability Almost 1 |
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta (UEC) |
|
15:05-15:20 |
Break ( 15 min. ) |
(51) |
15:20-15:45 |
1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption |
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
(52) |
15:45-16:10 |
How to send a return receipt on anonymous channel ? |
Shinji Yamanaka (TOSHIBA) |
(53) |
16:10-16:35 |
Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results |
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.) |
(54) |
16:35-17:00 |
A note on cryptographic schemes using collision-resistant functions based on factoring |
Jumpei Wada, Hajime Kanzaki (Kyoto Univ.), Shoichi Hirose (Fukui Univ.), Susumu Yoshida (Kyoto Univ.) |
(55) |
17:00-17:25 |
Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment |
Takeshi Nasako, Yasuyuki Murakami (OECU) |
(56) |
17:25-17:50 |
Improving the security of S boxes in DES using Genetic Algorithm |
Atsushi Koyama, Yasuyuki Murakami (OECU) |
Fri, Jul 22 PM Room B 13:00 - 17:50 |
(57) |
13:00-13:25 |
Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability |
Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
(58) |
13:25-13:50 |
A Secure Reversible Watermark Using Predictive Coding |
Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing) |
(59) |
13:50-14:15 |
An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking |
Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ) |
(60) |
14:15-14:40 |
Robust watermarking scheme for copied, rotated and clipped documents |
Kurato Maeno, Masayuki Suto (Oki) |
(61) |
14:40-15:05 |
An Implementation of Partial Integrity Assurance Method for Image Data |
Masahiko Takenaka, Takashi Yoshioka (FUJITSU LABS.) |
|
15:05-15:20 |
Break ( 15 min. ) |
(62) |
15:20-15:45 |
Study on a Anti-Tracking RF-ID Tag System |
Atsushi Sakai, Masahiko Takenaka (FUJITSU LABS.) |
(63) |
15:45-16:10 |
Proposal and evaluation of digital forensic logging system using USB Device |
Yuki Ashino, Hiroto Kokawa, Tsukasa Sato, Ryoichi Sasaki (TDU) |
(64) |
16:10-16:35 |
A study of wireless location privacy protection considering communication quality |
Hiroshi Yamane, Leping Huang, Kanta Matsuura, Kaoru Sezaki (Tokyo Univ.) |
(65) |
16:35-17:00 |
Personal Information Management System based on Linkability Control |
Yoshinori Sato, Akihiko Kawasaki, Toyohisa Morita, Takashi Fukumoto (Hitachi, Ltd.) |
(66) |
17:00-17:25 |
Identity Control Method Considering Privacy |
Hajime Morito, Akihiko Kawasaki, Toyohisa Morita, Kazuo Takaragi (Hitachi Ltd.) |
(67) |
17:25-17:50 |
A Report on the 4th Annual PKI R&D Workshop |
Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |