Date: Oct. 21-22, 1999
![]() ![]() ![]() ![]()
CSS(Computer Securityt Symposium)is promoted by IPSJ(Information Processing Society of Japan).
CSS'99 program(The mark * means a presenter) - October 21st, (Thu.) : 13:30 - 15:10 Hall A : Session 1A (Cryptology) -- Chair : Tsutomu Matsumoto (Yokohama National Univ.) An absolute time-stamping protocol using relative time-stamp by distributed authorities *Masaru Jinnai, Kouichi Sakurai (Kyushu Univ.) Gaudry's variant against Cab curves *Seigo Arita (NEC) A study on plain cipher *Ikuhiro Igarashi Proxy signatures based on original signer's message recovery *Takechi Okamoto, Mitsuru Tada, Atsuko Miyaji (JAIST) On the security of security-enhanced ElGamal-type cryptosystem *Hirokazu Shimada, Eikoh Chida, Masahiro Mambo, Hiroki Shizuya (Tohoku Univ.) Hall B : Session 1B (Software protection, Provacy protection) -- Chair : Ryoichi Sasaki (Hitachi) The fair data delivery protocol *Yoichi Samoto, Shinichi Nakahara (NTT) Protecting anonymity and location privacy in cyclic routes *Satoru Nagano, Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji (JAIST) A proposal for tamper-resistant mobile agent *Toshiya Iwai (ISD), Wen Wu, Fumio Mizoguchi (Science University of Tokyo) A protocol for secure data transportation from smart card to CPU *Tohru Ikuma, Masakatsu Nishigaki (Shizuoka Univ.), Masakazu Soga (Iwate Perfectural Univ.), Akio Takubo (Mitsubishi) Anti-macro-virus experiments by digital certificate of Microsoft Office 2000 *Yasushi Sengoku, Shimmi Hattori (Kanazawa Ins. of Tech.) October 21st (Thu.) : 15:30 - 16:30 Hall A : Session S1 (Invited talk 1) -- Chiar : Akira Hayashi (Kanazawa Ins. of Tech.) Legal Aspects of Year 2000 Problem *Kazuko Otani (Legal Affairs Department) - October 21st (Thu.) : 16:50 - 17:50 Hall B : Session 2B (Network security 1) -- Chair : Atsuko Miyaji (JAIST) New results on model checking authentication protocols *Wen Wu, Fumio Mizoguchi (Science Univ. of Tokyo) Access control issues in flexible group communication with Email *Yuko Murayama (Iwate Prefectural Univ.) Effects of data hiding on remote data analysis *Kanta Matsuura (Tokyo Univ.) - October 22nd (Fri.) : 8:30 - 10:50 Hall A : Session 3A (Electronic commerce, Electronic voting) -- Chair : Takayoshi Shiraishi (Hiroshima Shudo univ.) Electronic revenue stamp system suitable for electronic application *Takehisa Kato, Atsushi Simbo, Satomi Hori, Toshiaki Saisho (Toshiba) A digital ticket system for trading various rights *Yasunao Mizuno, Nobuyuki Chiwata, Yoshihito Oshima, Kazuo Matsuyama (NTT) A copy prevention method for rights trading infrastructure *Masayuki Terada, Hiroshi Kuno, Masayuki Hanadate (NTT) A ticket definition language for rights trading infrastructure *Yoshiaki Nakajima, Ko Fujimura, Jun Sekine (NTT) Study on an off-line e-cash scheme *Atsushi Koide (JAIST), Koji Hirohashi (PFU), Mitsuru Tada, Atsuko Miyaji (JAIST) An anonymous electronic sealed-bid auction scheme with group keys *Shingo Miyazaki (Toshiba), Kouichi Sakurai (Kyushu Univ.) Performance evaluation of distributed systems for anonymous auction system Hiroaki Kikuchi, *Shinji Hotta, Kensuke Abe, Shohachiro Nakanishi (Tokai Univ.) Hall B : Session 3B : Illegal access Implementation and evaluation of a network intrusion detection system by packet monitoring *Keiji Takeda, Yoshiyasu Takefuji (Keio Univ.) Visual browser for intrusion detection : VB-ID *Fumio Mizoguchi (Science Univ. of Tokyo) Development of configuration file based security scanner *Masato Terada, Satoshi Kai, Hitoshi Kumagai (Hitachi) A firewall with authentication of the right of an operation and filtering of operation commands *Masatoshi Furuya, Hiromitsu Kato, Teruji Sekozawa (Hitachi), Takeshi Koizumi (Realtec) An integration framework for open vender unauthorized access protection system *Satoru Torii, Masahiro Komura, Osamu Koyano, Tetsuo Shiozaki (Fujitsu), Kotaro Katsuyama, Seiji Fujii (Mitsubishi), Masato Terada, Takeshi Ito (Hitachi) A proposal of connection method between components for open vender defensive system from unauthorized access *Makoto Kayashima, Hiromi Isokawa, Toru Senoo (Hitachi), Seiji Fujii, Kotaro Katsuyama (Mitsubishi), Masahiro Komura, Tetsuo Shiozaki (Fujitsu) Implementation of network monitor for open vender unauthorized access protection system *Seiji Fujii, Takehiro Ohkoshi, Hiroshi Suzuki (Mitsubishi), Satoru Torii, Osamu Koyano (Fujitsu), Toru Senoo (Hitachi) - October 22nd (Fri.) : 11:10 - 12:10 Hall A : Session S2 (Invited talk 2) -- Chair : Tsuyoshi Takebe (Kanazawa Ins. of Tech.) Current situation and countermeasures of high-tech crime *Masayuki Tanaka (Ishikawa Prefectural Police Headquarters) - October 22nd (Fri.) : 13:30 - 14:30 Hall A : Session 4A (Authentication, Identification) -- Chair : Eiji Okamoto (Wisconsin Univ.) A verification tool of authentication protocols *Takamichi Saito, Kenji Tsukimura, Wu Wen (Science Univ. of Tokyo) Authentication technology on the electronic notary system *Shoichi Hashimoto, Shinichi Nakahara (NTT) Authentication by a smart card and biometric devices including cryptographic calculators *Tomoaki Morijiri, Miki Yamada, Toshiaki Saisho (Toshiba) Hall B : Session 4B (Electronic watermark 1) -- Keiichi Iwamura (Canon) Consideration of detecting technique for audio media watermarking *Munetoshi Iwakiri, Kineo Matsui (National Defense Academy) A variable-displaying digital watermark for grayscale image using the rate of frequency transform coefficients *Takayuki Yamada, Kineo Matsui (National Defense Academy) The watermark by Wavelet transform with the well-considered position to embed *Kenji Murakami, Yoshito Ueno (Soka Univ.) - October 22nd (Fri.) : 14:50 - 17:10 Hall A : Session 5A (Network security 2) -- Chair : Satoru Torii (Fujitsu) Proposal of group search protocol making the realization of closed communication groups easy *Akira Watanabe, Toru Inada (Mitsubishi), Tetsuo Ideguchi (Aichi Prefectural Univ.), Iwao Sasase (Keio Univ.) Design of key distribution protocol without certification authority *Makoto Satoh, Norishige Chiba (Iwate Univ.) Interactive proof of mobile code safety *Yasuyuki Tsukada (NTT) Improvement of SSL communication protocol to protect from misusement of leaked secret key *Takuto Fujinaga, Shigetomo Kimura, Yoshihiko Ebihara (Tsukuba Univ.) Renewable authentication and encryption systems *Kouya Tochikubo, Koji Okada, Naoki Endoh (Toshiba), Eiji Okamoto (Wisconsin Univ.) X.509 certificate based secure devices control *Kazuaki Tomioka, Wu Wen, Fumio Mizoguchi (Science Univ. of Tokyo) A Cookie-based information hiding scheme and its implementation Tsutomu Matsumoto, *Tatsuro Ikeda (Yokohama National Univ.), Kyoko Makino, Akio Sato, Ichiro Murase (Mitsubishi) Hall B : Session 5B (Electronic watermark 2, Architecture) -- Chair : Natsume Matsuzaki (AMSL) A fingerprinting scheme for content redistribution *Taku Katoh, Hirofumi Muratani (Toshiba) A proposal of digital watermark to H.263 video coding for low bitrare communication *Wisetsuit Piyapisuit, Kineo Matsui (National Defense Academy) Digital watermarking for 3 dimensional CG by bump mapping *Tadashi Mizumoto, Kineo Matsui (National Defense Academy) A watermarking method adapted to JPEG compressed images *Yoonki Choi, Kiyoharu Aizawa (Tokyo Univ.) A prototyping on digital camera with function of copyright protection *Hajime Morito, Kosuke Anzai, Hiroshi Yoshiura, Chisato Konno (Hitachi) Proposal of the middleware for common use of Java cards and its security functions *Tatsuya Ishihara, Toshiyuki Asanoma, Megumi Aoki, Toshiaki Saisho (Toshiba) The information technology design based on security architecture *Yoshihiro Sato (Hewlett-Packard Japan) |
[ back ] |