IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Social Implications of Technology and Information Ethics (SITE)  (Searched in: 2005)

Search Results: Keywords 'from:2005-07-21 to:2005-07-21'

[Go to Official SITE Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 41 - 60 of 67 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:30
Iwate Iwate Prefectural University Development of a certificate path cache method for Certificate Validation Service
Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.)
Recently, many certification authorities (CAs) have been built as the base of an electronic commerce and an electronic a... [more] ISEC2005-49
pp.47-52
ISEC, IPSJ-CSEC, SITE 2005-07-22
09:55
Iwate Iwate Prefectural University A Status Detection of Secure Communication in Secure Service Platform
Osamu Takata, Yuko Sawai, Kazuyoshi Hoshino, Tadashi Kaji, Keisuke Takeuchi, Takahiro Fujishiro, Satoru Tezuka (Hitachi)
SSP (Secure Service Platform) is a platform that mediate secure communication. The secure communication using SSP needs ... [more] ISEC2005-50
pp.53-58
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:20
Iwate Iwate Prefectural University Development of Combined Authentication System
Shinji Hirata, Masahiro Mimura, Kenta Takahashi, Yoshiaki Isobe (Hitachi)
 [more] ISEC2005-51
pp.59-65
ISEC, IPSJ-CSEC, SITE 2005-07-22
10:45
Iwate Iwate Prefectural University A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository
Yoshifumi Ueshige (ISIT), Kouichi Sakurai (Kyushu Univ.,ISIT)
 [more] ISEC2005-52
pp.67-72
ISEC, IPSJ-CSEC, SITE 2005-07-22
11:10
Iwate Iwate Prefectural University On Shared Attribute Certification
Tsutomu Matsumoto, Junji Shikata, Takenobu Seito, Takahiro Furue, Makiko Ueyama (Yokohama National Univ.)
 [more] ISEC2005-53
pp.73-80
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:00
Iwate Iwate Prefectural University Critical cryptoanalysis for Y-00
Kentaro Imafuku (AIST), Hideki Imai (Tokyo Univ.), Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka (Melco)
 [more] ISEC2005-54
pp.81-87
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:25
Iwate Iwate Prefectural University Cheater Identifiable Quantum Secret Sharing Schemes
Yumiko Murakami (NAIST/JST-ERATO), Masaki Nakanishi, Shigeru Yamashita, Katsumasa Watanabe (NAIST)
In this paper, we show that there exists a cheater identifiable
$(k, n)$ threshold secret sharing scheme for a quantum ... [more]
ISEC2005-55
pp.89-92
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:50
Iwate Iwate Prefectural University Improvement of the Security against Photon Number Splitting Attacks
Yoshifumi Nishida, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Institute of Computing)
Since it is difficult for practical optical devices to output a single-photon pulse, a weak laser pulse is often substit... [more] ISEC2005-56
pp.93-99
ISEC, IPSJ-CSEC, SITE 2005-07-22
14:15
Iwate Iwate Prefectural University Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices
Tetsuya Izu (FUJITSU Lab./Univ. of Electro-Comm.), Noboru Kunihiro, Kazuo Ohta (Univ. of Electro-Comm.), Takeshi Shimoyama (FUJITSU Lab.)
Recently, dedicated factoring devices have attracted much attention since it might be a threat for a current RSA-based P... [more] ISEC2005-57
pp.101-107
ISEC, IPSJ-CSEC, SITE 2005-07-22
14:40
Iwate Iwate Prefectural University Improved Collision Attack on MD4 with Probability Almost 1
Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta (UEC)
In EUROCRYPT2005, a collision attack on MD4 was proposed by Wang et. al..
Wang et. al. claimed that collision messeage... [more]
ISEC2005-58
pp.109-116
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:20
Iwate Iwate Prefectural University 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2005-59
pp.117-122
ISEC, IPSJ-CSEC, SITE 2005-07-22
15:45
Iwate Iwate Prefectural University How to send a return receipt on anonymous channel ?
Shinji Yamanaka (TOSHIBA)
Proof of delivery (or return receipt) is a certificate of reception on network transaction from message sender to messag... [more] ISEC2005-60
pp.123-128
ISEC, IPSJ-CSEC, SITE 2005-07-22
16:10
Iwate Iwate Prefectural University Reducing Communication Complexity of the Private Data Retrieval Protocol with Consistent Results
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara (Osaka Univ.)
A data retrieval protocol between a database server, who has a database,
and a user, who has an index, allows the user... [more]
ISEC2005-61
pp.129-136
ISEC, IPSJ-CSEC, SITE 2005-07-22
16:35
Iwate Iwate Prefectural University A note on cryptographic schemes using collision-resistant functions based on factoring
Jumpei Wada, Hajime Kanzaki (Kyoto Univ.), Shoichi Hirose (Fukui Univ.), Susumu Yoshida (Kyoto Univ.)
A many-to-one function is called collision-resistant if it is infeasible to find two distinct inputs which correspond to... [more] ISEC2005-62
pp.137-142
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:00
Iwate Iwate Prefectural University Security of DOM Knapsack PKC against Low-Density Attack by Computer Experiment
Takeshi Nasako, Yasuyuki Murakami (OECU)
The low-density attack(LDA) is an effective attack to the knapsack cryptosystems when the density is low.
We proposed t... [more]
ISEC2005-63
pp.143-147
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:25
Iwate Iwate Prefectural University Improving the security of S boxes in DES using Genetic Algorithm
Atsushi Koyama, Yasuyuki Murakami (OECU)
As for the Feistel cipher, it is known that the security of DES depends on the strength of S-box. DES is broken with the... [more] ISEC2005-64
pp.149-154
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:00
Iwate Iwate Prefectural University Improvement of the False Negative Error Probability for Correlation Based Watermark Detection Ensuring the False Positive Error Probability
Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
To use results of watermark detection, a detection error probability is
required to be low enough.

We have derived ... [more]
ISEC2005-65
pp.155-160
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:25
Iwate Iwate Prefectural University A Secure Reversible Watermark Using Predictive Coding
Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Hatsukazu Tanaka (Kobe Inst. of Computing)
The watermark that restores the exact original image from the watermarked one is called reversible watermark. Firstly, t... [more] ISEC2005-66
pp.161-166
ISEC, IPSJ-CSEC, SITE 2005-07-22
13:50
Iwate Iwate Prefectural University An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking
Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ)
A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to... [more] ISEC2005-67
pp.167-173
ISEC, IPSJ-CSEC, SITE 2005-07-22
14:15
Iwate Iwate Prefectural University Robust watermarking scheme for copied, rotated and clipped documents
Kurato Maeno, Masayuki Suto (Oki)
With the recent enactment of Privacy Protection Law in Japan, there has been an increasing interest in technologies for ... [more] ISEC2005-68
pp.175-182
 Results 41 - 60 of 67 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan