IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Koichi Sakurai (Kyushu Univ.)
Vice Chair Yukiyasu Tsunoo (NEC), Masahiro Mambo (Kanazawa Univ.)
Secretary Tetsu Iwata (Nagoya Univ.), Goichiro Hanaoka (AIST)
Assistant Tetsuya Izu (Fujitsu Lab.), Junpei Kawamoto (Kyushu Univ.), Yuichi Komano (Toshiba), Shigeyoshi Shima (NEC), Takaaki Mizuki (Tohoku Univ.)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Noriaki Yoshikai (Nihon Univ.)
Vice Chair Hitoshi Okada (NII), Tetsuya Morizumi (Toyo Networks & System Integration)
Secretary Daisuke Yamakata (JAMISR), Sumiko Miyama (Kanagawa Univ.)
Assistant Takahiro Tagawa (Kyushu Univ.)

Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Hiroaki Kikuchi (Meiji Univ.)
Vice Chair Yutaka Miyake (KDDI R&D Labs.), Takashi Nishide (Univ. of Tsukuba)
Secretary Yoshiaki Shiraishi (Kobe Univ.), Takeshi Ueda (Mitsubishi Electric)
Assistant Hiroki Takakura (Nagoya Univ.), Katsunari Yoshioka (Yokohama National Univ.)

Technical Committee on Enriched MultiMedia (EMM) [schedule] [select]
Chair Isao Echizen (NII)
Vice Chair Masashi Unoki (JAIST), Ryoichi Nishimura (NICT)
Secretary Minoru Kuribayashi (Kobe Univ.), Tetsuya Kojima (Tokyo National College of Tech.)
Assistant Masatsugu Ichino (Univ. of Electro-Comm.), Kotaro Sonoda (Nagasaki Univ.)

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Thu, Jul 3, 2014 10:15 - 17:00
Fri, Jul 4, 2014 10:15 - 15:05
Topics Security 
Conference Place  
Transportation Guide http://www.city.hakodate.hokkaido.jp/docs/2014032300166/
Contact
Person
n
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

Thu, Jul 3 AM  Session A-1: ISEC
10:15 - 11:55
(1)
ISEC
10:15-10:40 Consideration on Side-Channel Information Toward Authentication ISEC2014-10 SITE2014-5 ICSS2014-14 EMM2014-10 Arisa Matsubara, Yang Li (UEC), Yu-ichi Hayashi (Tohoku Univ.), Kazuo Sakiyama (UEC)
(2)
ISEC
10:40-11:05 A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.)
(3)
ISEC
11:05-11:30 A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 Daisuke Moriyama (NICT)
(4)
ISEC
11:30-11:55 Privacy Preserving Conditional Disclosure II ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.)
Thu, Jul 3 AM  Sesson B-1: CSEC
10:15 - 11:55
(5) 10:15-10:40 Consideration of a mobile payment system using endorsement in MANETs for a disaster area
Ojetunde Babatunde(Nara Institute of Science and Technology)・Shibata Naoki(Nara Institute of Science and Technology)・Juntao Gao(Nara Institute of Science and Technology)・Ito Minoru(Nara Institute of Science and Technology)
(6) 10:40-11:05 ROP attack code detection of malignant document file (tentative title)
TANAKA YASUYUKI(Institute of infomation security)・GOTO ATSUHIRO(Institute of infomation security)
(7) 11:05-11:30 Implementation of Simple StackTrace and its Application to Permission Control System in Android
Takase Takuho(Nagoya Institute of Technology)・Hioki Shota(Nagoya Institute of Technology)・Saito Shoichi(Nagoya Institute of Technology)・Takimoto Eiji(Ritsumeikan University)・Mouri Koichi(Ritsumeikan University)・Matsuo Hiroshi(Nagoya Institute of Technology)
(8) 11:30-11:55 HIURA Hiroaki・KITAYAMA Shoma・SOSHI Masakazu・OHBA Mitsuru
Thu, Jul 3 AM  Session C-1: ICSS
10:15 - 11:55
(9)
ICSS
10:15-10:40 Dynamic Security Control Architecture on Hybrid-cloud ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo)
(10)
ICSS
10:40-11:05 Deceptive defense architecture toward protection against APT ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15 Takahiro Kakumaru, Shigeyoshi Shima, Masafumi Watanabe (NEC), Katsunari Yoshioka (YNU)
(11)
ICSS
11:05-11:30 Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.)
(12)
ICSS
11:30-11:55 Experimental Platform for CAN ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 Kazuomi Oishi (Shizuoka Inst. of Science and Tech.)
Thu, Jul 3 PM  Session A-2: ISEC
13:50 - 15:05
(13)
ISEC
13:50-14:15 On a PRNG based on non-commutative algebra and its applications ISEC2014-18 SITE2014-13 ICSS2014-22 EMM2014-18 Satoshi Iriyama, Yoshiharu Tanaka, Toshihide Hara, Masanori Ohya (TUS)
(14)
ISEC
14:15-14:40 Security of RSA with Many Decryption Exponents ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo)
(15)
ISEC
14:40-15:05 A New Precomputation Method with Perfect Conjugate-Addition Sequence ISEC2014-20 SITE2014-15 ICSS2014-24 EMM2014-20 Ryota Takahashi, Atsuko Miyaji (JAIST)
Thu, Jul 3 PM  Session B-2: CSEC
13:25 - 15:05
(16) 13:25-13:50 A detection method of malware infections based on "Graylists"
KAKUTA TOMO(Hitachi Systems, Ltd.)・OHTORI TOMOYA(Hitachi Systems, Ltd.)・FUJII YASUHIRO(Hitachi Systems, Ltd.)・TANIGUCHI NOBUHIKO(Hitachi Systems, Ltd.)・KISHIRO TAKEYASU(Hitachi Systems, Ltd.)
(17) 13:50-14:15 Hoshizaw Yuji(SecureBrain Corporation)・Kamizono Masaki(SecureBrain Corporation)
(18) 14:15-14:40 KURIMA Ichiro(Hitachi, Ltd.)・KAI Satoshi(Hitachi, Ltd.)・ISOBE Yoshiaki(Hitachi, Ltd.)・KISHIRO Takeyasu(Hitachi Systems, Ltd.)
(19) 14:40-15:05 Datasets for Anti-Malware Research ~ MWS Datasets 2013 ~
Akiyama Mitsuaki(NTT Secure Platform Laboratories, Nippon Telegraph and Telephon Communication Corporation)・Kamizono Masaki(Advanced Research Laboratory, Securebrain Corporation/National Institute of Information and Communications Technology)・Matsuki Takahiro(FFRI, Inc.)・Hatada Mitsuhiro(NTT Communications Corporation)
Thu, Jul 3 PM  Session C-2: EMM+ICSS
13:25 - 15:05
(20)
EMM
13:25-13:50 Authentication for mobile devices using behavioral biometrics with adaptive templates ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21 Shigeki Karita, Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.)
(21)
ICSS
13:50-14:15 A proposal of authentication methods against shoulder surfing using a sub channel ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 Akira Aratani, Atsushi Kanai (Hosei Univ.)
(22)
EMM
14:15-14:40 Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII)
(23)
ICSS
14:40-15:05 A quantification method of the degree of personal information disclosure using statistical data ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24 Tomoyasu Shirayama, Atsushi Kanai (Hosei Univ)
Thu, Jul 3 PM  Session A-3: ISEC
15:45 - 17:00
(24)
ISEC
15:45-16:10 Data authentication scheme suitable for broadcast in the sensor networks ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST)
(25)
ISEC
16:10-16:35 Forward-Secure Sequential Aggregate Message Authentication Revisited ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.)
(26)
ISEC
16:35-17:00 On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 --
ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT)
Thu, Jul 3 PM  Session B-3: CSEC+SPT
15:20 - 17:00
(27) 15:20-15:45 Distributed Pseudo-Random Number Generation and Its Application to Cloud Database
Chen Jiageng(Japan Advanced Institute of Science and Technology)・Miyaji Atsuko(Japan Advanced Institute of Science and Technology)・Su Chunhua(Japan Advanced Institute of Science and Technology)
(28) 15:45-16:10  
(29) 16:10-16:35 Okumura Kaori(Nagoya Institute of Technology)・Shiraishi Yoshiaki(Kobe Univercity)・Mohri Masami(Gifu Univercity)・Iwata Akira(Nagoya Institute of Technology)
(30) 16:35-17:00 Kawamoto Junpei(Kyushu University)
Thu, Jul 3 PM  Session C-3: SITE
15:20 - 17:00
(31)
SITE
15:20-15:45 Privacy Invasion and the Concept of the "Digital Person"
-- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory --
ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28
Takushi Otani (Kibi International Univ.)
(32)
SITE
15:45-16:10 Comparison on personal information protection ordinates of prefectures and government-designated cities. ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29 Arata Ito, Tetsutaro Uehara (Ritsumeikan Univ.)
(33)
SITE
16:10-16:35 Problems Concerning the Digitization of the Japanese Government Authorized Textbooks
-- Study of Open Access and Free License of the Digital Textbooks --
ISEC2014-30 SITE2014-25 ICSS2014-34 EMM2014-30
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Tsugumasa Suzuki (Keio Gijuku Youchisha Primary School), Takushi Otani (Kibi International Univ.)
(34)
SITE
16:35-17:00 Information ethics in interdiscplinarity
-- Codes of Ethics and Belief Revision --
ISEC2014-31 SITE2014-26 ICSS2014-35 EMM2014-31
Yuko Murakami (Tohoku Univ.)
Fri, Jul 4 AM  Session A-4: ISEC
10:15 - 11:55
(35)
ISEC
10:15-10:40 On Hidden Credential Retrieval ISEC2014-32 SITE2014-27 ICSS2014-36 EMM2014-32 SeongHan Shin, Kazukuni Kobara (AIST)
(36)
ISEC
10:40-11:05 Cryptanalysis of a matrix variant of NTRU ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT)
(37)
ISEC
11:05-11:30 New Higher Order Differential Property of Piccolo ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34 Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science)
(38)
ISEC
11:30-11:55 Quantitative Evaluation of the Key Information That is Learned through Timing Attack
-- The Contribution of Bucketing Technique for RSA Cryptosystem --
ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35
Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST)
Fri, Jul 4 AM  Session B-4: EMM
10:40 - 11:55
(39)
EMM
10:40-11:05 Some Properties on Disaster Prevention Broadcasting Based on Data Hiding Technique ISEC2014-36 SITE2014-31 ICSS2014-40 EMM2014-36 Tetsuya Kojima, Akihiro Oizumi (Tokyo NCT)
(40)
EMM
11:05-11:30 Information hiding technique to protect copyright of digital data for 3-D printing ISEC2014-37 SITE2014-32 ICSS2014-41 EMM2014-37 Piyarat Silapasuphakornwong, Masahiro Suzuki, Hiroshi Unno, Kazutake Uehira (Kanagawa Inst. of Tech.), Youichi Takashima (NTT)
(41)
EMM
11:30-11:55 Integration for Web reservation data of Hotel ISEC2014-38 SITE2014-33 ICSS2014-42 EMM2014-38 Yu Ichifuji, Noboru Sonehara (NII)
Fri, Jul 4 PM  Session A-5: SITE+ISEC
13:25 - 15:05
(42)
SITE
13:25-13:50 Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2) ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39 Hiroyuki Inaba, Takuto Tamai (Kyoto Inst. of Tech.)
(43)
SITE
13:50-14:15 Proposal on Fast Searchable Encryption Scheme Using Bloom Filter ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.)
(44)
ISEC
14:15-14:40 Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.)
(45)
ISEC
14:40-15:05 Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.)
Fri, Jul 4 PM  Session B-5: ICSS
13:25 - 15:05
(46)
ICSS
13:25-13:50 Evaluating Resistance of Android Applications to Automated Repackaging ISEC2014-43 SITE2014-38 ICSS2014-47 EMM2014-43 Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(47)
ICSS
13:50-14:15 A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications)
(48)
ICSS
14:15-14:40 DDoS Attack Path Reconstruction in Space-Time Encoding Schemes ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.)
(49)
ICSS
14:40-15:05 Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
Fri, Jul 4 PM  Session C-5: CSEC
13:25 - 14:15
(50) 13:25-13:50 a user mode implementation of filtering rule management plane on virtualized networking environment
ANDO RUO(National Institute of Information and Communications Technology)
(51) 13:50-14:15 A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack, and its Implementation and evaluation using OpenFlow
Kobayashi Hiroshi(Tokyo Denki University)・Yamaki Hirofumi(Tokyo Denki University)・Suehiro Yuuki(Tokyo Denki University)・Ueno Yoichiro(Tokyo Denki University)・Sano Kaoru(Tokyo Denki University)・Sasaki Ryoichi(Tokyo Denki University)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E--mail: is-qst 
Announcement Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html
EMM Technical Committee on Enriched MultiMedia (EMM)   [Latest Schedule]
Contact Address Tetsuya Kojima
E--mail: jt-ct 
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2014-06-28 05:24:43


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan