IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Social Implications of Technology and Information Ethics (SITE)  (Searched in: 2005)

Search Results: Keywords 'from:2005-07-21 to:2005-07-21'

[Go to Official SITE Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 67 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:00
Iwate Iwate Prefectural University The Direction of Japan's CMVP II
Yuichi Hagiwara (C4T), Travis Spann (InfoGard), Tatsuaki Takebe (Yokogawa)
As Japan now has her own e-government recommended cipher list, is seeking the possibilities to have her own Cryptographi... [more] ISEC2005-29 SITE2005-27
pp.147-153
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:25
Iwate Iwate Prefectural University On the Standardization of Information Security -- Report on the Vienna Meeting in April, 2005 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric), Toshio Tatsuta (IBM Japan), Akira Otsuka (IPA/AIST), Kan Yasuda (NTT)
 [more] ISEC2005-30 SITE2005-28
pp.155-164
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:00
Iwate Iwate Prefectural University Construction of Oblivious Signatures
Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.)
(To be available after the conference date) [more] ISEC2005-31 SITE2005-29
pp.165-171
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:25
Iwate Iwate Prefectural University Partially Blind Signatures with Traceability
Koji Chida, Miyako Ohkubo, Osamu Shionoiri, Ichizo Nakamura, Atsushi Kanai (NTT)
Until now, it is not sufficiently discussed about how to construct a provably secure ``partially blind signature with tr... [more] ISEC2005-32 SITE2005-30
pp.173-178
ISEC, IPSJ-CSEC, SITE 2005-07-21
13:50
Iwate Iwate Prefectural University Proposal on Sumi coating method which can change the coating parts to protect against insider attacks
Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ)
Digital signatures do not allow any alteration of a document. However, for some signed documents ”appropriate” alteratio... [more] ISEC2005-33 SITE2005-31
pp.179-186
ISEC, IPSJ-CSEC, SITE 2005-07-21
14:15
Iwate Iwate Prefectural University Exact t-out-of-n Signer-Ambiguous Signature
Eiichiro Fujisaki, Koutarou Suzuki (NTT)
 [more] ISEC2005-34 SITE2005-32
pp.187-194
ISEC, IPSJ-CSEC, SITE 2005-07-21
14:40
Iwate Iwate Prefectural University An (N,K) Threshold Signature Scheme with Public Keys of Small Size
Masao Kasahara (Osaka Gakuin Univ.), Ryuichi Sakai (Osaka Electro-Comm. Univ.)
 [more] ISEC2005-35 SITE2005-33
pp.195-200
ISEC, IPSJ-CSEC, SITE 2005-07-21
15:05
Iwate Iwate Prefectural University Meta Ring Signature
Hiroyuki Okazaki (KCG), Ryuichi Sakai (OECU), Masao Kasahara (OGU)
In this paper, we propose a new concept ``Meta Ring Signature''.
Suppose that a signature text work as a public key,
... [more]
ISEC2005-36 SITE2005-34
pp.201-204
ISEC, IPSJ-CSEC, SITE 2005-07-21
15:45
Iwate Iwate Prefectural University An Information Hiding System for Word 2003 XML Documents
Muneyuki Kitano, Hidetaka Masuda (TDU), Hiroshi Nakagawa (Univ. of Tokyo)
We are considering an information hiding technique for the following
situation: 1) The original writer applies the digi... [more]
ISEC2005-37 SITE2005-35
pp.205-212
ISEC, IPSJ-CSEC, SITE 2005-07-21
16:10
Iwate Iwate Prefectural University A Note on Application of the Program Obfuscation Scheme using Random Numbers to Complicate Control Flow
Tatsuya Toyofuku (Kyushu Univ.), Toshihiro Tabata (Okayama Univ.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-38 SITE2005-36
pp.213-220
ISEC, IPSJ-CSEC, SITE 2005-07-21
16:35
Iwate Iwate Prefectural University A Text hiding by Visual Secret Sharing with Picture Images
Takashi Miyaki, Kazuya Shioda (Shizuoka Univ.), Hideki Yoshida (NTT Data), Masaharu Ozawa (ChanceLab.), Masakatsu Nishigaki (Shizuoka Univ.)
The information in a digital document can flow out easily by copy & paste, print out, etc. "Text Secret Sharing Scheme U... [more] ISEC2005-39 SITE2005-37
pp.221-228
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:00
Iwate Iwate Prefectural University Implementation and Evaluation of Memory Protection Methods for Multitask OSes -- CMS for Resource-poor Platforms and Tampering Detection --
Yu Inamura, Toru Egashira, Atsushi Takeshita (NTT DoCoMo)
The authors have been proposing a method, called Cryptographic Memory System (CMS), to protect the data stored in the ad... [more] ISEC2005-40 SITE2005-38
pp.229-234
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:25
Iwate Iwate Prefectural University A description model for data access control in Salvia operating system
Yoshimi Ichiyanagi, Kazuhisa Suzuki, Koichi Mouri, Eiji Okubo (Ritsumeikan Univ.)
 [more] ISEC2005-41 SITE2005-39
pp.235-242
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:50
Iwate Iwate Prefectural University A Case Study of Gordon-Loeb Model on Optimal Security Investiments
Kimio Kuramitsu (Yokohama National Univ.)
Gordon and Loeb (2002) presented an economic model of characterizing an optimal investment in information security. The ... [more] ISEC2005-42 SITE2005-40
pp.243-248
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:30
Iwate Iwate Prefectural University A Group Key Management Scheme for Secure Multicast Increasing Efficency in Leave Operation
Alireza Nemaney Pour, Kazuya Kumekawa, Toshihiko Kato, Shuichi Itoh (The Univ. of Electro-Communications)
This paper proposes an efficient model and the associated algorithm for the group key management in secure multicast. In... [more] ISEC2005-43
pp.1-8
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:55
Iwate Iwate Prefectural University Murakami-Kasahara ID-based Key Sharing Scheme Revisited -- In Comparison With Maurer-Yacobi Scheme --
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
In Sept.~1990, the present authors firstly discussed DLP over
composite number and presented an ID-based Key Sharing Sc... [more]
ISEC2005-44
pp.9-16
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:20
Iwate Iwate Prefectural University Efficient N-Party Password-based Authenticated Key Exchange Protocol
SeongHan Shin, Kazukuni Kobara, Hideki Imai (Univ. of Tokyo)
In this paper, we propose an efficient N-party
password-authenticated key exchange (so-called {\sf N-PAKE})
protocol a... [more]
ISEC2005-45
pp.17-23
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:45
Iwate Iwate Prefectural University Relations Among Notions of Security for Identity Based Encryption Schemes
Peng Yang (Univ. of Tokyo), Goichiro Hanaoka (AIST/Univ. of Tokyo), Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura (Univ. of Tokyo), Hideki Imai (Univ. of Tokyo/AIST)
We prove the equivalences among indistinguishability, semantic security and non-malleability under adaptive chosen ident... [more] ISEC2005-46
pp.25-32
ISEC, IPSJ-CSEC, SITE 2005-07-22
11:10
Iwate Iwate Prefectural University On a secure circuit evaluation protocol using ElGamal encryption
Tsuyoshi Yamamoto, Koji Chida, Anderson Nasciment, Koutarou Suzuki, Shigenori Uchiyama (NTT)
 [more] ISEC2005-47
pp.33-40
ISEC, IPSJ-CSEC, SITE 2005-07-22
11:35
Iwate Iwate Prefectural University An efficiently-verifiable zero-knowledge argument for proofs of knowledge
Tsuyoshi Yamamoto, Eiichiro Fujisaki, Masayuki Abe (NTT)
 [more] ISEC2005-48
pp.41-45
 Results 21 - 40 of 67 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan