Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2022-03-07 14:40 |
Online |
Online |
Efficient Construction of Hash Trees over P2P systems Soma Ishihara, Masakazu Soshi (Hiroshima City Univ.) ICSS2021-63 |
P2P systems provide efficient distributed systems and have the benefit of being easily scalable. However, they also have... [more] |
ICSS2021-63 pp.26-31 |
ICSS, IPSJ-SPT |
2021-03-01 14:30 |
Online |
Online |
A path authentication framework based on One-way cross networks Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) ICSS2020-33 |
Since MANETs can transmit information between mobile devices, it is critically important to guarantee that the transmitt... [more] |
ICSS2020-33 pp.43-48 |
ICSS, IPSJ-SPT |
2020-03-02 13:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Extension of authentication method using hash chain aggregation Hirai Shinta, Soshi Masakazu (Hiroshima City Univ.) ICSS2019-97 |
(To be available after the conference date) [more] |
ICSS2019-97 pp.213-218 |
ICSS, IPSJ-SPT |
2019-03-07 14:20 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
On Improvement of a White-box Cryptographic Scheme Masakazu Soshi (Hiroshima City Univ.) ICSS2018-72 |
White-box cryptography provides a method to conceal a secret key embedded in a hardware device for encryption even if an... [more] |
ICSS2018-72 pp.25-27 |
ICSS, IPSJ-SPT |
2019-03-08 13:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Authentication with hash chain computation model Shinta Hirai, Masakazu Soshi (Hiroshima City Univ.) ICSS2018-84 |
Due to the spread of IoT devices, the number of devices restricted by memory etc. has increased.
In order to securely ... [more] |
ICSS2018-84 pp.149-153 |
ICSS, IPSJ-SPT |
2018-03-08 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
On a Method to Implement White-box Cryptography (No Presentation) Tomonari Ozeki, Masakazu Soshi (Hiroshima City Univ.) ICSS2017-84 |
[more] |
ICSS2017-84 pp.211-213 |
ICSS, IPSJ-SPT |
2016-03-04 10:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Selection of authentication methods with game theory in VANET Hiroaki Hiroaki, Masakazu Soshi (Hiroshima City Univ.) ICSS2015-63 |
Much attention has recently been paid to VANET (Vehicular Ad-hoc Networks), where moving vehicles wirelessly communicate... [more] |
ICSS2015-63 pp.95-100 |
ICSS |
2015-03-04 11:40 |
Okinawa |
Meio Univiersity |
Consideration for Path Authentication for VANET with Group One-Way Cross-Networks Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) ICSS2014-87 |
VANET (Vehicular Ad-hoc Network) is a wireless ad hoc network which interconnects many moving vehicles along roads.
The... [more] |
ICSS2014-87 pp.145-150 |
ICSS |
2015-03-04 15:30 |
Okinawa |
Meio Univiersity |
Flexible Constructions of Hash Chains and Their Key Generation Shouki Nishiyama, Masakazu Soshi (Hiroshima City Univ.) ICSS2014-98 |
We have proposed simple and efficient authentication schemes with several
novel elaborate hash chains. In this paper... [more] |
ICSS2014-98 pp.211-216 |
ISEC |
2014-12-19 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Space-Time Encoding Schemes with No False Positives Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71 |
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] |
ISEC2014-71 pp.11-15 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 14:15 |
Hokkaido |
San-Refure Hakodate |
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 |
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] |
ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45 pp.315-319 |
ICSS, IPSJ-SPT |
2014-03-28 13:55 |
Okinawa |
Meio Univiersity |
Evaluation of hash tree construction on P2P networks Tomoyuki Asaeda, Taihei Higuchi, Masakazu Soshi (Hiroshima City Univ.) ICSS2013-91 |
In recent years communication systems called P2P, where the peers communicate with one another
without the support of... [more] |
ICSS2013-91 pp.217-224 |
ICSS, IPSJ-SPT |
2014-03-28 14:20 |
Okinawa |
Meio Univiersity |
Path Authentication for VANET with Group One-Way Cross-Networks Shoma Kitayama, Masakazu Soshi (Hiroshima City Univ.) ICSS2013-92 |
In recent years, the implementation of advanced traffic information networks has been made possible with the development... [more] |
ICSS2013-92 pp.225-229 |
ICSS |
2010-11-05 10:30 |
Hiroshima |
Hiroshima City University |
On Simple Authentication Schemes with Novel Hash Chain Constructions and their Application Masakazu Soshi (Hiroshima City Univ.) ICSS2010-44 |
We have proposed simple and efficient authentication schemes with several
novel elaborate hash chains. We also discu... [more] |
ICSS2010-44 pp.1-5 |
ICSS |
2010-11-05 10:55 |
Hiroshima |
Hiroshima City University |
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.) ICSS2010-45 |
This paper discusses the probrem of an efficient group key distribution
protocol for wireless sensor networks,which is ... [more] |
ICSS2010-45 pp.7-10 |
ISEC |
2007-05-18 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
consideration of quantum Oblivious Transfer Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST) ISEC2007-10 |
Quantum oblivious transfer (QOT) is one of the important primitive for quantum security. In representative example of Q... [more] |
ISEC2007-10 pp.65-68 |
IT, ISEC, WBS |
2007-03-16 13:00 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Share selectable secret sharing scheme on inefficiency concentrated for particular user Keita Emura (JAIST), Akito Nomura (Kanazwa Univ.), Masakazu Soshi, Atsuko Miyaji (JAIST) |
On Shamir threshold scheme, a participant's share is randomly given.\
The usability can be improved if share is select... [more] |
IT2006-114 ISEC2006-169 WBS2006-111 pp.173-178 |
IT, ISEC, WBS |
2007-03-16 13:50 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On Quantum Secret Sharing between Multiparty and Multiparty without Quantum Memory Takayuki Takagi, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (Jaist) |
[more] |
IT2006-116 ISEC2006-171 WBS2006-113 pp.185-190 |
ISEC |
2005-12-16 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Consideration for the quantum multi-secret sharing using MSP Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (JAIST) |
Quantum secret sharing schemes(QSSS) was proposed by Hillery for the first time. Afterwards, various techniques are prop... [more] |
ISEC2005-119 pp.53-60 |
IT, WBS, ISEC |
2005-03-18 10:20 |
Kyoto |
Kyoto Univ. |
Consideration for Quantum Secret Sharing Ken Sasaki, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (JAIST) |
Quantum secret sharing schemes(QSSS) was proposed by Hillery\cite{HBB99} for the first time. Afterwards, various techniq... [more] |
IT2004-71 ISEC2004-127 WBS2004-186 pp.7-11 |