CSS'99

    Date: Oct. 21-22, 1999


    CSS(Computer Securityt Symposium)is promoted by IPSJ(Information Processing Society of Japan).
    CSS'99 on Oct.21-22.1999 in Hotel Nikko Kanazawa is promoted by JAIST(Japan Advanced Institute
    of Science and Technology) and Hokuriku branch,IPSJ. An announcement about various theories
    used as the foundation of a computer security and technology was made. Our laboratory also
    helped the receptionist.


    CSS'99 program(The mark * means a presenter)
    - October 21st, (Thu.) : 13:30 - 15:10

    Hall A : Session 1A (Cryptology) -- Chair : Tsutomu Matsumoto (Yokohama National Univ.)

    An absolute time-stamping protocol using relative time-stamp by distributed authorities
    *Masaru Jinnai, Kouichi Sakurai (Kyushu Univ.)

    Gaudry's variant against Cab curves
    *Seigo Arita (NEC)

    A study on plain cipher
    *Ikuhiro Igarashi

    Proxy signatures based on original signer's message recovery
    *Takechi Okamoto, Mitsuru Tada, Atsuko Miyaji (JAIST)

    On the security of security-enhanced ElGamal-type cryptosystem
    *Hirokazu Shimada, Eikoh Chida, Masahiro Mambo, Hiroki Shizuya (Tohoku Univ.)

    Hall B : Session 1B (Software protection, Provacy protection) -- Chair : Ryoichi Sasaki (Hitachi)

    The fair data delivery protocol
    *Yoichi Samoto, Shinichi Nakahara (NTT)

    Protecting anonymity and location privacy in cyclic routes
    *Satoru Nagano, Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji (JAIST)

    A proposal for tamper-resistant mobile agent
    *Toshiya Iwai (ISD), Wen Wu, Fumio Mizoguchi (Science University of Tokyo)

    A protocol for secure data transportation from smart card to CPU
    *Tohru Ikuma, Masakatsu Nishigaki (Shizuoka Univ.), Masakazu Soga (Iwate Perfectural Univ.), Akio Takubo (Mitsubishi)

    Anti-macro-virus experiments by digital certificate of Microsoft Office 2000
    *Yasushi Sengoku, Shimmi Hattori (Kanazawa Ins. of Tech.)

    October 21st (Thu.) : 15:30 - 16:30

    Hall A : Session S1 (Invited talk 1) -- Chiar : Akira Hayashi (Kanazawa Ins. of Tech.)

    Legal Aspects of Year 2000 Problem
    *Kazuko Otani (Legal Affairs Department)

    - October 21st (Thu.) : 16:50 - 17:50

    Hall B : Session 2B (Network security 1) -- Chair : Atsuko Miyaji (JAIST)

    New results on model checking authentication protocols
    *Wen Wu, Fumio Mizoguchi (Science Univ. of Tokyo)

    Access control issues in flexible group communication with Email
    *Yuko Murayama (Iwate Prefectural Univ.)

    Effects of data hiding on remote data analysis
    *Kanta Matsuura (Tokyo Univ.)

    - October 22nd (Fri.) : 8:30 - 10:50

    Hall A : Session 3A (Electronic commerce, Electronic voting) -- Chair : Takayoshi Shiraishi (Hiroshima Shudo univ.)

    Electronic revenue stamp system suitable for electronic application
    *Takehisa Kato, Atsushi Simbo, Satomi Hori, Toshiaki Saisho (Toshiba)

    A digital ticket system for trading various rights
    *Yasunao Mizuno, Nobuyuki Chiwata, Yoshihito Oshima, Kazuo Matsuyama (NTT)

    A copy prevention method for rights trading infrastructure
    *Masayuki Terada, Hiroshi Kuno, Masayuki Hanadate (NTT)

    A ticket definition language for rights trading infrastructure
    *Yoshiaki Nakajima, Ko Fujimura, Jun Sekine (NTT)

    Study on an off-line e-cash scheme
    *Atsushi Koide (JAIST), Koji Hirohashi (PFU), Mitsuru Tada, Atsuko Miyaji (JAIST)

    An anonymous electronic sealed-bid auction scheme with group keys
    *Shingo Miyazaki (Toshiba), Kouichi Sakurai (Kyushu Univ.)

    Performance evaluation of distributed systems for anonymous auction system
    Hiroaki Kikuchi, *Shinji Hotta, Kensuke Abe, Shohachiro Nakanishi (Tokai Univ.)

    Hall B : Session 3B : Illegal access

    Implementation and evaluation of a network intrusion detection system by packet monitoring
    *Keiji Takeda, Yoshiyasu Takefuji (Keio Univ.)

    Visual browser for intrusion detection : VB-ID
    *Fumio Mizoguchi (Science Univ. of Tokyo)

    Development of configuration file based security scanner
    *Masato Terada, Satoshi Kai, Hitoshi Kumagai (Hitachi)

    A firewall with authentication of the right of an operation and filtering of operation commands
    *Masatoshi Furuya, Hiromitsu Kato, Teruji Sekozawa (Hitachi), Takeshi Koizumi (Realtec)

    An integration framework for open vender unauthorized access protection system
    *Satoru Torii, Masahiro Komura, Osamu Koyano, Tetsuo Shiozaki (Fujitsu), Kotaro Katsuyama, Seiji Fujii (Mitsubishi), Masato Terada, Takeshi Ito (Hitachi)

    A proposal of connection method between components for open vender defensive system from unauthorized access
    *Makoto Kayashima, Hiromi Isokawa, Toru Senoo (Hitachi), Seiji Fujii, Kotaro Katsuyama (Mitsubishi), Masahiro Komura, Tetsuo Shiozaki (Fujitsu)

    Implementation of network monitor for open vender unauthorized access protection system
    *Seiji Fujii, Takehiro Ohkoshi, Hiroshi Suzuki (Mitsubishi), Satoru Torii, Osamu Koyano (Fujitsu), Toru Senoo (Hitachi)

    - October 22nd (Fri.) : 11:10 - 12:10

    Hall A : Session S2 (Invited talk 2) -- Chair : Tsuyoshi Takebe (Kanazawa Ins. of Tech.)

    Current situation and countermeasures of high-tech crime
    *Masayuki Tanaka (Ishikawa Prefectural Police Headquarters)

    - October 22nd (Fri.) : 13:30 - 14:30

    Hall A : Session 4A (Authentication, Identification) -- Chair : Eiji Okamoto (Wisconsin Univ.)

    A verification tool of authentication protocols
    *Takamichi Saito, Kenji Tsukimura, Wu Wen (Science Univ. of Tokyo)

    Authentication technology on the electronic notary system
    *Shoichi Hashimoto, Shinichi Nakahara (NTT)

    Authentication by a smart card and biometric devices including cryptographic calculators
    *Tomoaki Morijiri, Miki Yamada, Toshiaki Saisho (Toshiba)

    Hall B : Session 4B (Electronic watermark 1) -- Keiichi Iwamura (Canon)

    Consideration of detecting technique for audio media watermarking
    *Munetoshi Iwakiri, Kineo Matsui (National Defense Academy)

    A variable-displaying digital watermark for grayscale image using the rate of frequency transform coefficients
    *Takayuki Yamada, Kineo Matsui (National Defense Academy)

    The watermark by Wavelet transform with the well-considered position to embed
    *Kenji Murakami, Yoshito Ueno (Soka Univ.)

    - October 22nd (Fri.) : 14:50 - 17:10

    Hall A : Session 5A (Network security 2) -- Chair : Satoru Torii (Fujitsu)

    Proposal of group search protocol making the realization of closed communication groups easy
    *Akira Watanabe, Toru Inada (Mitsubishi), Tetsuo Ideguchi (Aichi Prefectural Univ.), Iwao Sasase (Keio Univ.)

    Design of key distribution protocol without certification authority
    *Makoto Satoh, Norishige Chiba (Iwate Univ.)

    Interactive proof of mobile code safety
    *Yasuyuki Tsukada (NTT)

    Improvement of SSL communication protocol to protect from misusement of leaked secret key
    *Takuto Fujinaga, Shigetomo Kimura, Yoshihiko Ebihara (Tsukuba Univ.)

    Renewable authentication and encryption systems
    *Kouya Tochikubo, Koji Okada, Naoki Endoh (Toshiba), Eiji Okamoto (Wisconsin Univ.)

    X.509 certificate based secure devices control
    *Kazuaki Tomioka, Wu Wen, Fumio Mizoguchi (Science Univ. of Tokyo)

    A Cookie-based information hiding scheme and its implementation
    Tsutomu Matsumoto, *Tatsuro Ikeda (Yokohama National Univ.), Kyoko Makino, Akio Sato, Ichiro Murase (Mitsubishi)

    Hall B : Session 5B (Electronic watermark 2, Architecture) -- Chair : Natsume Matsuzaki (AMSL)

    A fingerprinting scheme for content redistribution
    *Taku Katoh, Hirofumi Muratani (Toshiba)

    A proposal of digital watermark to H.263 video coding for low bitrare communication
    *Wisetsuit Piyapisuit, Kineo Matsui (National Defense Academy)

    Digital watermarking for 3 dimensional CG by bump mapping
    *Tadashi Mizumoto, Kineo Matsui (National Defense Academy)

    A watermarking method adapted to JPEG compressed images
    *Yoonki Choi, Kiyoharu Aizawa (Tokyo Univ.)

    A prototyping on digital camera with function of copyright protection
    *Hajime Morito, Kosuke Anzai, Hiroshi Yoshiura, Chisato Konno (Hitachi)

    Proposal of the middleware for common use of Java cards and its security functions
    *Tatsuya Ishihara, Toshiyuki Asanoma, Megumi Aoki, Toshiaki Saisho (Toshiba)

    The information technology design based on security architecture
    *Yoshihiro Sato (Hewlett-Packard Japan)


    [ back ]