Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:15 |
Hokkaido |
San-Refure Hakodate |
Consideration on Side-Channel Information Toward Authentication Arisa Matsubara, Yang Li (UEC), Yu-ichi Hayashi (Tohoku Univ.), Kazuo Sakiyama (UEC) ISEC2014-10 SITE2014-5 ICSS2014-14 EMM2014-10 |
Recently, authentication using near field communication is widely spread for entrance and exit control and electronic mo... [more] |
ISEC2014-10 SITE2014-5 ICSS2014-14 EMM2014-10 pp.1-8 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:40 |
Hokkaido |
San-Refure Hakodate |
A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 |
Act on Electronic Signatures and Certification Business was revised and duties of Public Certification Service for Indiv... [more] |
ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 pp.9-16 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack Daisuke Moriyama (NICT) ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 |
Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneous... [more] |
ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 pp.17-24 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:30 |
Hokkaido |
San-Refure Hakodate |
Privacy Preserving Conditional Disclosure II Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.) ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 |
In SCIS2012, we proposed a privacy preserving and utilization scheme, called the privacy preserving conditional disclosu... [more] |
ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 pp.25-30 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:15 |
Hokkaido |
San-Refure Hakodate |
Dynamic Security Control Architecture on Hybrid-cloud Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo) ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 |
Recently, it is increasing that the multiple cloud services are used because cloud computing has been spread. However, i... [more] |
ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 pp.61-67 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:40 |
Hokkaido |
San-Refure Hakodate |
Deceptive defense architecture toward protection against APT Takahiro Kakumaru, Shigeyoshi Shima, Masafumi Watanabe (NEC), Katsunari Yoshioka (YNU) ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15 |
It has been difficult to detect all of increasingly-sophisticated cyber-attacks, so that we must assume th... [more] |
ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15 pp.69-74 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 |
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] |
ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16 pp.75-80 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:30 |
Hokkaido |
San-Refure Hakodate |
Experimental Platform for CAN Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 |
Embedded systems are used for various purposes and are widely prevalent.
It turned out that embedded systems for which ... [more] |
ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17 pp.81-87 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 13:50 |
Hokkaido |
San-Refure Hakodate |
On a PRNG based on non-commutative algebra and its applications Satoshi Iriyama, Yoshiharu Tanaka, Toshihide Hara, Masanori Ohya (TUS) ISEC2014-18 SITE2014-13 ICSS2014-22 EMM2014-18 |
[more] |
ISEC2014-18 SITE2014-13 ICSS2014-22 EMM2014-18 pp.89-91 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:15 |
Hokkaido |
San-Refure Hakodate |
Security of RSA with Many Decryption Exponents Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 |
When we use small secret exponents, RSA becomes efficient for its decryption cost and signature generation cost. However... [more] |
ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 pp.93-96 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:40 |
Hokkaido |
San-Refure Hakodate |
A New Precomputation Method with Perfect Conjugate-Addition Sequence Ryota Takahashi, Atsuko Miyaji (JAIST) ISEC2014-20 SITE2014-15 ICSS2014-24 EMM2014-20 |
In elliptic curve cryptosystems, a scalar multiplication is the dominant computation.
For speeding up elliptic curve c... [more] |
ISEC2014-20 SITE2014-15 ICSS2014-24 EMM2014-20 pp.97-104 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 13:25 |
Hokkaido |
San-Refure Hakodate |
Authentication for mobile devices using behavioral biometrics with adaptive templates Shigeki Karita, Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21 |
This paper proposes a template renewal method for improving authentication accuracy in biometric authentication with beh... [more] |
ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21 pp.133-138 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 13:50 |
Hokkaido |
San-Refure Hakodate |
A proposal of authentication methods against shoulder surfing using a sub channel Akira Aratani, Atsushi Kanai (Hosei Univ.) ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 |
The compromise of personal information has become a social problem as the rapid spread of smart phones and tablet-type d... [more] |
ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 pp.139-144 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:15 |
Hokkaido |
San-Refure Hakodate |
Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 |
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] |
ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23 pp.145-148 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:40 |
Hokkaido |
San-Refure Hakodate |
A quantification method of the degree of personal information disclosure using statistical data Tomoyasu Shirayama, Atsushi Kanai (Hosei Univ) ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24 |
In recent years, we have come to be seen many cases where the user is in the disclosure of personal information unconsci... [more] |
ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24 pp.149-154 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:45 |
Hokkaido |
San-Refure Hakodate |
Data authentication scheme suitable for broadcast in the sensor networks Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 |
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] |
ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 pp.155-162 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:10 |
Hokkaido |
San-Refure Hakodate |
Forward-Secure Sequential Aggregate Message Authentication Revisited Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 |
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more] |
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 pp.163-170 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:35 |
Hokkaido |
San-Refure Hakodate |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT) ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27 pp.171-179 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:20 |
Hokkaido |
San-Refure Hakodate |
Privacy Invasion and the Concept of the "Digital Person"
-- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory -- Takushi Otani (Kibi International Univ.) ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 |
This article explores the harm caused by the misuses of the “digital person,” which is the aggregated personal data from... [more] |
ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 pp.205-212 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:45 |
Hokkaido |
San-Refure Hakodate |
Comparison on personal information protection ordinates of prefectures and government-designated cities. Arata Ito, Tetsutaro Uehara (Ritsumeikan Univ.) ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29 |
As the governmental works are computerized more and more, it is discussed how personal information possessed by the gove... [more] |
ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29 pp.213-220 |