IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2008)

Search Results: Keywords 'from:2008-07-24 to:2008-07-24'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 47 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:20
Fukuoka Fukuoka Institute of System LSI Design Industry Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems
Ryoya Miyazawa, Koki Abe (UEC) ISEC2008-36
 [more] ISEC2008-36
pp.9-14
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] ISEC2008-37
pp.15-22
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:10
Fukuoka Fukuoka Institute of System LSI Design Industry Examination of the issues in designing of electronic signature documentation system
Miyuki Takao, Koichiro Hayashi (IISEC) ISEC2008-38
Electronic signature and Digital timestamp are new technologies which provide high level integrity to digital data. But ... [more] ISEC2008-38
pp.23-30
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:35
Fukuoka Fukuoka Institute of System LSI Design Industry Clone Resistance of Paper Artifact-Metrics with Segmented Matching
Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU) ISEC2008-39
It is desired to develop excellent counterfeit deterrence techniques for artifacts such as security documents, credentia... [more] ISEC2008-39
pp.31-36
ISEC, SITE, IPSJ-CSEC 2008-07-25
09:55
Fukuoka Fukuoka Institute of System LSI Design Industry Architecture Optimization of a Group Signature Circuit
Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC)
Group signature scheme is one of the most active research area in recent cryptographic algorithms/applications. Typical... [more] ISEC2008-40
pp.37-44
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:20
Fukuoka Fukuoka Institute of System LSI Design Industry A Lattice Model of the General Confidentiality Policies
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
An information flow policy is defined as a set of information flow rules among security-classes. Implementations of such... [more] ISEC2008-41
pp.45-52
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases
Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC)
As personal information comes to be in digital and transferred on networks, its leakage is becoming more and more seriou... [more] ISEC2008-42
pp.53-60
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:10
Fukuoka Fukuoka Institute of System LSI Design Industry Proposal of Anonymos Routing Technique with DHT
Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.)
The immense amount of information is processed on the network by the spread of the Internet.Therefore problems such as l... [more] ISEC2008-43
pp.61-68
ISEC, SITE, IPSJ-CSEC 2008-07-25
11:35
Fukuoka Fukuoka Institute of System LSI Design Industry Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document
Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.)
Digital watermarks provide the capability to add extra information to various media, such as still images, movies and au... [more] ISEC2008-44
pp.69-74
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry Implementation of Block Cipher Camellia with a Configurable and Extensible Processor
Kazuyoshi Matsuo, Koki Abe (UEC) ISEC2008-45
Camellia, a block cipher algorithm, has been implemented on a configurable and extensible processor to measure cycles an... [more] ISEC2008-45
pp.75-80
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) ISEC2008-46
Applications of an iterated hash function such as HMAC require that the compression function of the hash function is a p... [more] ISEC2008-46
pp.81-86
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Hash Function Using MMO Compression Function and MDP Domain Extension
Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.) ISEC2008-47
 [more] ISEC2008-47
pp.87-94
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Traitor Tracing from ID based Broadcast Encryption
Ryuichi Sakai (OECU) ISEC2008-48
ID based broadcast encryption scheme based on the key setting of Mitsunari-Ssakai-Kasahara
traitor tracing has several... [more]
ISEC2008-48
pp.95-100
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography
Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2008-49
In recent years, pairing-based cryptographies such as ID-base cryptography and group signature have been studied.
These... [more]
ISEC2008-49
pp.101-108
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry Invalidation of a Mailing-list Address against Spam
Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2008-50
pp.109-116
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry Proposal of a Cue & Response Based User Authentication Using Unclear Image
Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.)
 [more] ISEC2008-51
pp.117-124
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Self expandable RBAC for distributed systems
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC)
(To be available after the conference date) [more] ISEC2008-52
pp.125-132
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:15
Fukuoka Fukuoka Institute of System LSI Design Industry Best Match Security -- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. --
Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST)
The importance of security measures are considerably increasing in the recent information society. The service providers... [more] ISEC2008-53
pp.133-138
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] ISEC2008-54
pp.139-146
ISEC, SITE, IPSJ-CSEC 2008-07-25
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Watermarking Method with a Quasi-One-Way Function
Kazuo Ohzeki, Engyoku Gi (SIT) ISEC2008-55
This paper describes the one-way function for use in an image watermarking to improve authentication ability. The one-wa... [more] ISEC2008-55
pp.147-154
 Results 21 - 40 of 47 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan