Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Improving Resistance to DoS using Attack History in Signature based Intrusion Detection Systems Ryoya Miyazawa, Koki Abe (UEC) ISEC2008-36 |
[more] |
ISEC2008-36 pp.9-14 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Proposal of Intrusion Detection using Third-parties Support Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37 |
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] |
ISEC2008-37 pp.15-22 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Examination of the issues in designing of electronic signature documentation system Miyuki Takao, Koichiro Hayashi (IISEC) ISEC2008-38 |
Electronic signature and Digital timestamp are new technologies which provide high level integrity to digital data. But ... [more] |
ISEC2008-38 pp.23-30 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Clone Resistance of Paper Artifact-Metrics with Segmented Matching Yoichi Kobayashi, Sho Sakakura, Mitsutoshi Taira, Manabu Yamakoshi, Tsutomu Matsumoto (YNU) ISEC2008-39 |
It is desired to develop excellent counterfeit deterrence techniques for artifacts such as security documents, credentia... [more] |
ISEC2008-39 pp.31-36 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 09:55 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Architecture Optimization of a Group Signature Circuit Sumio Morioka, Toshinori Araki, Toshiyuki Isshiki, Satoshi Obana, Kazue Sako, Isamu Teranishi (NEC) |
Group signature scheme is one of the most active research area in recent cryptographic algorithms/applications. Typical... [more] |
ISEC2008-40 pp.37-44 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Lattice Model of the General Confidentiality Policies Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.) |
An information flow policy is defined as a set of information flow rules among security-classes. Implementations of such... [more] |
ISEC2008-41 pp.45-52 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 10:45 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Relational Algebra in Multi-Party Protocol to Enable Secure and Unlimited Databases Masanori Shimura, Tsukasa Endo (UEC), Kunihiko Miyazaki (Hitachi Ltd.), Hiroshi Yoshiura (UEC) |
As personal information comes to be in digital and transferred on networks, its leakage is becoming more and more seriou... [more] |
ISEC2008-42 pp.53-60 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Proposal of Anonymos Routing Technique with DHT Masaki Kondo, Shoichi Saito, Hiroshi Matsuo (Nagoya Inst. of Tech.) |
The immense amount of information is processed on the network by the spread of the Internet.Therefore problems such as l... [more] |
ISEC2008-43 pp.61-68 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Information Hideing Method utilizing Low Visible Natural Fiber Pattern for Printed Document Kitahiro Kaneda, Kenji Hirano, Keiichi Iwamura, Seiichiro Hangai (T.U.S.) |
Digital watermarks provide the capability to add extra information to various media, such as still images, movies and au... [more] |
ISEC2008-44 pp.69-74 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Implementation of Block Cipher Camellia with a Configurable and Extensible Processor Kazuyoshi Matsuo, Koki Abe (UEC) ISEC2008-45 |
Camellia, a block cipher algorithm, has been implemented on a configurable and extensible processor to measure cycles an... [more] |
ISEC2008-45 pp.75-80 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) ISEC2008-46 |
Applications of an iterated hash function such as HMAC require that the compression function of the hash function is a p... [more] |
ISEC2008-46 pp.81-86 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Hash Function Using MMO Compression Function and MDP Domain Extension Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.) ISEC2008-47 |
[more] |
ISEC2008-47 pp.87-94 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Traitor Tracing from ID based Broadcast Encryption Ryuichi Sakai (OECU) ISEC2008-48 |
ID based broadcast encryption scheme based on the key setting of Mitsunari-Ssakai-Kasahara
traitor tracing has several... [more] |
ISEC2008-48 pp.95-100 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Consideration on Efficient Exponentiation in Extension Field for Pairing-based Cryptography Tomoki Yoshida, Hidehiro Kato, Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2008-49 |
In recent years, pairing-based cryptographies such as ID-base cryptography and group signature have been studied.
These... [more] |
ISEC2008-49 pp.101-108 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Invalidation of a Mailing-list Address against Spam Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2008-50 pp.109-116 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Proposal of a Cue & Response Based User Authentication Using Unclear Image Takumi Yamamoto, Takeo Isarida, Masakatsu Nishigaki (Shizuoka Univ.) |
[more] |
ISEC2008-51 pp.117-124 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Self expandable RBAC for distributed systems Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC) |
(To be available after the conference date) [more] |
ISEC2008-52 pp.125-132 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Best Match Security
-- The proposal of a knowledge-based system for selection of security countermeasures according to user disposition. -- Yumiko Nakazawa (Shizuoka Univ.), Takehisa Kato (Toshiba Solutions Corp.), Takeo Isarida, Fumiyasu Yamada (Shizuoka Univ.), Masakatsu Nishigaki (Shizuoka Univ./JST) |
The importance of security measures are considerably increasing in the recent information society. The service providers... [more] |
ISEC2008-53 pp.133-138 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] |
ISEC2008-54 pp.139-146 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 15:20 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Watermarking Method with a Quasi-One-Way Function Kazuo Ohzeki, Engyoku Gi (SIT) ISEC2008-55 |
This paper describes the one-way function for use in an image watermarking to improve authentication ability. The one-wa... [more] |
ISEC2008-55 pp.147-154 |