Thu, Jul 3 AM Session A-1: ISEC 10:15 - 11:55 |
(1) ISEC |
10:15-10:40 |
Consideration on Side-Channel Information Toward Authentication ISEC2014-10 SITE2014-5 ICSS2014-14 EMM2014-10 |
Arisa Matsubara, Yang Li (UEC), Yu-ichi Hayashi (Tohoku Univ.), Kazuo Sakiyama (UEC) |
(2) ISEC |
10:40-11:05 |
A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 |
Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) |
(3) ISEC |
11:05-11:30 |
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 |
Daisuke Moriyama (NICT) |
(4) ISEC |
11:30-11:55 |
Privacy Preserving Conditional Disclosure II ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 |
Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.) |
Thu, Jul 3 AM Sesson B-1: CSEC 10:15 - 11:55 |
(5) |
10:15-10:40 |
Consideration of a mobile payment system using endorsement in MANETs for a disaster area
Ojetunde Babatunde(Nara Institute of Science and Technology)・Shibata Naoki(Nara Institute of Science and Technology)・Juntao Gao(Nara Institute of Science and Technology)・Ito Minoru(Nara Institute of Science and Technology) |
(6) |
10:40-11:05 |
ROP attack code detection of malignant document file (tentative title)
TANAKA YASUYUKI(Institute of infomation security)・GOTO ATSUHIRO(Institute of infomation security) |
(7) |
11:05-11:30 |
Implementation of Simple StackTrace and its Application to Permission Control System in Android
Takase Takuho(Nagoya Institute of Technology)・Hioki Shota(Nagoya Institute of Technology)・Saito Shoichi(Nagoya Institute of Technology)・Takimoto Eiji(Ritsumeikan University)・Mouri Koichi(Ritsumeikan University)・Matsuo Hiroshi(Nagoya Institute of Technology) |
(8) |
11:30-11:55 |
HIURA Hiroaki・KITAYAMA Shoma・SOSHI Masakazu・OHBA Mitsuru |
Thu, Jul 3 AM Session C-1: ICSS 10:15 - 11:55 |
(9) ICSS |
10:15-10:40 |
Dynamic Security Control Architecture on Hybrid-cloud ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 |
Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo) |
(10) ICSS |
10:40-11:05 |
Deceptive defense architecture toward protection against APT ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15 |
Takahiro Kakumaru, Shigeyoshi Shima, Masafumi Watanabe (NEC), Katsunari Yoshioka (YNU) |
(11) ICSS |
11:05-11:30 |
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 |
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) |
(12) ICSS |
11:30-11:55 |
Experimental Platform for CAN ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 |
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) |
Thu, Jul 3 PM Session A-2: ISEC 13:50 - 15:05 |
(13) ISEC |
13:50-14:15 |
On a PRNG based on non-commutative algebra and its applications ISEC2014-18 SITE2014-13 ICSS2014-22 EMM2014-18 |
Satoshi Iriyama, Yoshiharu Tanaka, Toshihide Hara, Masanori Ohya (TUS) |
(14) ISEC |
14:15-14:40 |
Security of RSA with Many Decryption Exponents ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 |
Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) |
(15) ISEC |
14:40-15:05 |
A New Precomputation Method with Perfect Conjugate-Addition Sequence ISEC2014-20 SITE2014-15 ICSS2014-24 EMM2014-20 |
Ryota Takahashi, Atsuko Miyaji (JAIST) |
Thu, Jul 3 PM Session B-2: CSEC 13:25 - 15:05 |
(16) |
13:25-13:50 |
A detection method of malware infections based on "Graylists"
KAKUTA TOMO(Hitachi Systems, Ltd.)・OHTORI TOMOYA(Hitachi Systems, Ltd.)・FUJII YASUHIRO(Hitachi Systems, Ltd.)・TANIGUCHI NOBUHIKO(Hitachi Systems, Ltd.)・KISHIRO TAKEYASU(Hitachi Systems, Ltd.) |
(17) |
13:50-14:15 |
Hoshizaw Yuji(SecureBrain Corporation)・Kamizono Masaki(SecureBrain Corporation) |
(18) |
14:15-14:40 |
KURIMA Ichiro(Hitachi, Ltd.)・KAI Satoshi(Hitachi, Ltd.)・ISOBE Yoshiaki(Hitachi, Ltd.)・KISHIRO Takeyasu(Hitachi Systems, Ltd.) |
(19) |
14:40-15:05 |
Datasets for Anti-Malware Research ~ MWS Datasets 2013 ~
Akiyama Mitsuaki(NTT Secure Platform Laboratories, Nippon Telegraph and Telephon Communication Corporation)・Kamizono Masaki(Advanced Research Laboratory, Securebrain Corporation/National Institute of Information and Communications Technology)・Matsuki Takahiro(FFRI, Inc.)・Hatada Mitsuhiro(NTT Communications Corporation) |
Thu, Jul 3 PM Session C-2: EMM+ICSS 13:25 - 15:05 |
(20) EMM |
13:25-13:50 |
Authentication for mobile devices using behavioral biometrics with adaptive templates ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21 |
Shigeki Karita, Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) |
(21) ICSS |
13:50-14:15 |
A proposal of authentication methods against shoulder surfing using a sub channel ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 |
Akira Aratani, Atsushi Kanai (Hosei Univ.) |
(22) EMM |
14:15-14:40 |
Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 |
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) |
(23) ICSS |
14:40-15:05 |
A quantification method of the degree of personal information disclosure using statistical data ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24 |
Tomoyasu Shirayama, Atsushi Kanai (Hosei Univ) |
Thu, Jul 3 PM Session A-3: ISEC 15:45 - 17:00 |
(24) ISEC |
15:45-16:10 |
Data authentication scheme suitable for broadcast in the sensor networks ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 |
Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) |
(25) ISEC |
16:10-16:35 |
Forward-Secure Sequential Aggregate Message Authentication Revisited ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 |
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) |
(26) ISEC |
16:35-17:00 |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 -- ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27 |
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT) |
Thu, Jul 3 PM Session B-3: CSEC+SPT 15:20 - 17:00 |
(27) |
15:20-15:45 |
Distributed Pseudo-Random Number Generation and Its Application to Cloud Database
Chen Jiageng(Japan Advanced Institute of Science and Technology)・Miyaji Atsuko(Japan Advanced Institute of Science and Technology)・Su Chunhua(Japan Advanced Institute of Science and Technology) |
(28) |
15:45-16:10 |
|
(29) |
16:10-16:35 |
Okumura Kaori(Nagoya Institute of Technology)・Shiraishi Yoshiaki(Kobe Univercity)・Mohri Masami(Gifu Univercity)・Iwata Akira(Nagoya Institute of Technology) |
(30) |
16:35-17:00 |
Kawamoto Junpei(Kyushu University) |
Thu, Jul 3 PM Session C-3: SITE 15:20 - 17:00 |
(31) SITE |
15:20-15:45 |
Privacy Invasion and the Concept of the "Digital Person"
-- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory -- ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 |
Takushi Otani (Kibi International Univ.) |
(32) SITE |
15:45-16:10 |
Comparison on personal information protection ordinates of prefectures and government-designated cities. ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29 |
Arata Ito, Tetsutaro Uehara (Ritsumeikan Univ.) |
(33) SITE |
16:10-16:35 |
Problems Concerning the Digitization of the Japanese Government Authorized Textbooks
-- Study of Open Access and Free License of the Digital Textbooks -- ISEC2014-30 SITE2014-25 ICSS2014-34 EMM2014-30 |
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Tsugumasa Suzuki (Keio Gijuku Youchisha Primary School), Takushi Otani (Kibi International Univ.) |
(34) SITE |
16:35-17:00 |
Information ethics in interdiscplinarity
-- Codes of Ethics and Belief Revision -- ISEC2014-31 SITE2014-26 ICSS2014-35 EMM2014-31 |
Yuko Murakami (Tohoku Univ.) |
Fri, Jul 4 AM Session A-4: ISEC 10:15 - 11:55 |
(35) ISEC |
10:15-10:40 |
On Hidden Credential Retrieval ISEC2014-32 SITE2014-27 ICSS2014-36 EMM2014-32 |
SeongHan Shin, Kazukuni Kobara (AIST) |
(36) ISEC |
10:40-11:05 |
Cryptanalysis of a matrix variant of NTRU ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33 |
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) |
(37) ISEC |
11:05-11:30 |
New Higher Order Differential Property of Piccolo ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34 |
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) |
(38) ISEC |
11:30-11:55 |
Quantitative Evaluation of the Key Information That is Learned through Timing Attack
-- The Contribution of Bucketing Technique for RSA Cryptosystem -- ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35 |
Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) |
Fri, Jul 4 AM Session B-4: EMM 10:40 - 11:55 |
(39) EMM |
10:40-11:05 |
Some Properties on Disaster Prevention Broadcasting Based on Data Hiding Technique ISEC2014-36 SITE2014-31 ICSS2014-40 EMM2014-36 |
Tetsuya Kojima, Akihiro Oizumi (Tokyo NCT) |
(40) EMM |
11:05-11:30 |
Information hiding technique to protect copyright of digital data for 3-D printing ISEC2014-37 SITE2014-32 ICSS2014-41 EMM2014-37 |
Piyarat Silapasuphakornwong, Masahiro Suzuki, Hiroshi Unno, Kazutake Uehira (Kanagawa Inst. of Tech.), Youichi Takashima (NTT) |
(41) EMM |
11:30-11:55 |
Integration for Web reservation data of Hotel ISEC2014-38 SITE2014-33 ICSS2014-42 EMM2014-38 |
Yu Ichifuji, Noboru Sonehara (NII) |
Fri, Jul 4 PM Session A-5: SITE+ISEC 13:25 - 15:05 |
(42) SITE |
13:25-13:50 |
Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2) ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39 |
Hiroyuki Inaba, Takuto Tamai (Kyoto Inst. of Tech.) |
(43) SITE |
13:50-14:15 |
Proposal on Fast Searchable Encryption Scheme Using Bloom Filter ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 |
Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) |
(44) ISEC |
14:15-14:40 |
Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41 |
Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) |
(45) ISEC |
14:40-15:05 |
Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42 |
Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) |
Fri, Jul 4 PM Session B-5: ICSS 13:25 - 15:05 |
(46) ICSS |
13:25-13:50 |
Evaluating Resistance of Android Applications to Automated Repackaging ISEC2014-43 SITE2014-38 ICSS2014-47 EMM2014-43 |
Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(47) ICSS |
13:50-14:15 |
A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44 |
Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications) |
(48) ICSS |
14:15-14:40 |
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 |
Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) |
(49) ICSS |
14:40-15:05 |
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46 |
Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
Fri, Jul 4 PM Session C-5: CSEC 13:25 - 14:15 |
(50) |
13:25-13:50 |
a user mode implementation of filtering rule management plane on virtualized networking environment
ANDO RUO(National Institute of Information and Communications Technology) |
(51) |
13:50-14:15 |
A Proposal of Multi-Layer-Binding Router to Prevent Cyber-Attack, and its Implementation and evaluation using OpenFlow
Kobayashi Hiroshi(Tokyo Denki University)・Yamaki Hirofumi(Tokyo Denki University)・Suehiro Yuuki(Tokyo Denki University)・Ueno Yoichiro(Tokyo Denki University)・Sano Kaoru(Tokyo Denki University)・Sasaki Ryoichi(Tokyo Denki University) |