Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2014-09-05 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Fail-Stop Signature Scheme with TTP and Its UC-Security Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) ISEC2014-49 |
As security requirements of fail-stop signature (FSS) schemes, non-repudiability and unforgeability are required. In thi... [more] |
ISEC2014-49 pp.13-20 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:40 |
Hokkaido |
San-Refure Hakodate |
A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 |
Act on Electronic Signatures and Certification Business was revised and duties of Public Certification Service for Indiv... [more] |
ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 pp.9-16 |
ISEC, IT, WBS |
2014-03-11 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Note on Indistinguishability of Fail-Stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2013-79 ISEC2013-108 WBS2013-68 |
Fail-Stop signature (FSS) schemes are digital signature schemes in which there are many signatures that pass the signatu... [more] |
IT2013-79 ISEC2013-108 WBS2013-68 pp.155-161 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Compatible 2d-code having tamper detection system with QR-code Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106 |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more] |
EMM2013-106 pp.39-44 |
LOIS, ICM |
2014-01-16 15:40 |
Nagasaki |
Nagasaki Museum of History and Culture |
A study on cooperation between the public sector and the private sector by utilizing the Public Certification Service for Individuals. Kazushige Fujita, Takashi Obi, Chikahiro Miyokawa, Masuyoshi Yachida, Joong Sun Lee, Tetsuya Natsume, Naoko Taira, Eikazu Niwano, Makoto Kumakura, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Inst. of Tech.) ICM2013-40 LOIS2013-44 |
With the introduction of the Social Security and Tax Number System, electronic authentication function, which is require... [more] |
ICM2013-40 LOIS2013-44 pp.29-34 |
BioX (2nd) |
2013-05-24 17:40 |
Toyama |
Toyama Prefectural University |
[Poster Presentation]
Lazy Signature: A non-registered Digital Signature Using Biometrics Yuta Yoneyama (Shizuoka Univ.), Kenta Takahashi (Hitachi Ltd.), Eisei Honbu, Masakatsu Nishigaki (Shizuoka Univ.) |
The conventional digital signature is implemented and operated as the function of registered stamp or signature for digi... [more] |
|
ISEC |
2013-05-23 14:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking Tsutomu Matsumoto, Hikotaro Suzuki, Katsunari Yoshioka (Yokohama National Univ.), Yosuke Maekawa, Hisashi Oguma (TOYOTA InfoTechnology Center) ISEC2013-4 |
When implementing advanced automotive services in cooperation with external data centers, it is very important to ensure... [more] |
ISEC2013-4 pp.23-28 |
EMM |
2013-03-07 13:30 |
Kyoto |
|
Information hiding for QR-code using Wet Paper Code Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-107 |
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more] |
EMM2012-107 pp.1-6 |
IT, ISEC, WBS |
2013-03-07 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Consideration on Security Requirements of Fail-stop Signature Schemes Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.) IT2012-67 ISEC2012-85 WBS2012-53 |
A fail-stop signature (FSS) scheme is a digital signature scheme with forgery-proof function, in which even if an advers... [more] |
IT2012-67 ISEC2012-85 WBS2012-53 pp.31-38 |
ICSS |
2012-11-22 10:45 |
Hiroshima |
Miyajima Mori-no-Yado |
On Distribution of Certificate Revocation List Using Random Network Coding for VANET Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) ICSS2012-45 |
Intelligent transport system (ITS) is for resolving traffic accidents and congestion by using information and communicat... [more] |
ICSS2012-45 pp.1-6 |
ICSS, IA |
2012-06-21 14:55 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
A Proposal of a Functional Extension Framework for Authn & Authz Federation Infrastructure using Web Browser Add-on Toyokazu Akiyama (Kyoto Sangyo Univ.), Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura (NII) IA2012-3 ICSS2012-3 |
We have constructed an academic authn \& authz infrastructure by
using Web single sign-on in a community, named GakuNin... [more] |
IA2012-3 ICSS2012-3 pp.13-18 |
ITS, WBS (Joint) |
2011-12-15 13:50 |
Nagasaki |
|
Online/offline Authentication Protocol in Car to Car/Infrastructure Communication Systems Eriko Ando, Hisayoshi Sato, Yasuko Fukuzawa (Hitachi) ITS2011-22 |
Services such as sending a pre-crash sensing warning and traffic condition warning are expected to be provided in car-to... [more] |
ITS2011-22 pp.13-18 |
ISEC, LOIS |
2011-11-14 14:45 |
Osaka |
Osaka Electro-Communication University |
Hidden Pair of Bijection Signature system (2)
-- Discussion of the Security -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2011-42 LOIS2011-36 |
The actual parameters as well as the possibility of attack are discussed on the new MPKC signature system "Hidden Pair o... [more] |
ISEC2011-42 LOIS2011-36 pp.55-60 |
ISEC, IT, WBS |
2011-03-03 11:15 |
Osaka |
Osaka University |
A Study on Forward Secure Leakage Resilient Signature Schemes Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50 |
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] |
IT2010-71 ISEC2010-75 WBS2010-50 pp.23-30 |
ISEC, IT, WBS |
2011-03-04 11:15 |
Osaka |
Osaka University |
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-122 ISEC2010-126 WBS2010-101 |
This paper proposes a digital watermark method with maximum detection amplitude value of complex signature impulse.
Si... [more] |
IT2010-122 ISEC2010-126 WBS2010-101 pp.361-366 |
ISEC, IT, WBS |
2011-03-04 11:40 |
Osaka |
Osaka University |
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-123 ISEC2010-127 WBS2010-102 |
This paper proposes an digital watermark method using extended smear-desmearing transform and high-pass filter.In this m... [more] |
IT2010-123 ISEC2010-127 WBS2010-102 pp.367-372 |
PRMU |
2011-02-17 16:00 |
Saitama |
|
Accurate Content-Based Copy Detection Scheme Using Global/Local Visual Features and Audio Features Yusuke Uchida, Shigeyuki Sakazawa (KDDI Labs) PRMU2010-216 |
In recent years, Content-Based Copy Detection (CBCD) technology, more generally referred to as digital fingerprinting, h... [more] |
PRMU2010-216 pp.49-54 |
VLD |
2010-09-27 16:30 |
Kyoto |
Kyoto Institute of Technology |
[Invited Talk]
An Automatic Test Generation Framework for Digitally-Assisted Analog Circuit Satoshi Komatsu, Mohamed Abbas (Univ. of Tokyo), Yasuo Furukawa (Advantest), Kunihiro Asada (Univ. of Tokyo) VLD2010-46 |
This paper presents a new analog ATPG (AATPG) framework that generates near-optimal test stimulus for the digitally-assi... [more] |
VLD2010-46 pp.25-30 |
ISEC |
2010-09-10 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Extension of Rank Attacks to MPKC Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2010-44 |
A variant of Rank Attack which is applicable to the Complementary STS is discussed. The Complementary
STS is a variant ... [more] |
ISEC2010-44 pp.35-40 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 09:00 |
Aomori |
Hirosaki University |
Proposal on MPKC Signature Scheme with Check Equations Shigeo Tsujii, Masahito Gotaishi (Chuo University) ISEC2010-23 SITE2010-19 ICSS2010-29 |
A new signature system of multivariate public key cryptosystem (MPKC), which uses separate check equations in order to p... [more] |
ISEC2010-23 SITE2010-19 ICSS2010-29 pp.107-112 |