Co-organized by IEICE & IPSJ

Time Table

November 25, 2008

Time Session
13:30–13:45 Opening Ceremony
13:45–15:30 Cryptography
15:30–16:00 Coffee break
16:00–17:45 Signature and signcryption

November 26, 2008

Time Session
09:30–11:50 Software security
11:50–14:20 Lunch
14:20–16:05 Privacy protection and contents protection
16:05–16:30 Coffee Break
16:30–17:30 Invited Talk
18:00– Conference Dinner

November 27, 2008

Time Session
09:00–10:45 Authentication and access control
10:45–11:15 Coffee Break
11:15–12:25 Implementation

Program of IWSEC2008

Opening Ceremony

13:30-13:45 25 November (Tue), 2008

Session: Cryptography (13:45-15:30)

13:45-15:30 25 November (Tue), 2008

Session Chair: Tshuyoshi Takagi

  • On generating elements of orders dividing $p^{2k}\pm p^k+1$,
    Maciej Grze\'skowiak
  • Chosen Ciphertext Secure Public Key Encryption with a Simple Structure,
    Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe
  • Remarks on the Attack of Fouque et al. against the $\ell$IC Scheme,
    Naoki Ogura, Shigenori Uchiyama

Session: Signature and signcryption

16:00-17:45 25 November (Tue), 2008

Session Chair: Noboru Kunihiro

  • Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles,
    Fuchun Guo, Yi Mu and Zhide Chen
  • Signcryption Scheme In Multi-user Setting Without Random Oracles,
    Chik How Tan
  • Simple and Efficient Group Signature Scheme assuming Tamperproof Devices,
    Takuya Yoshida and Koji Okada

Session: Software security

09:30-11:50 26 November (Wed), 2008

Session Chair: Jigang Liu

  • The Superdiversifier: Peephole Individualization for Software Protection,
    Matthias Jacob, Mariusz Jakubowski, Prasad Naldurg, Chit Wei (Nick) Saw, Ramarathnam Venkatesan
  • Detecting Java Theft Based on Static API Trace Birthmark,
    Heewan Park, Seokwoo Choi, Hyun-il Lim, Taisook Han
  • Online Network Forensics for Automatic Repair Validation,
    Michael E. Locasto, Matthew Burnside, Angelos D. Keromytis
  • Return Value Predictability Profiles for Self--Healing,
    Michael E. Locasto, Angelos Stavrou, Gabriela F. Cretu, Angelos D. Keromytis, Salvatore J. Stolfo

Session: Privacy protection and contents protection

14:20-16:05 26 November (Wed), 2008

Session Chair: Angelos Keromytis

  • Involuntary Information Leakage in Social Network Services,
    Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen
  • Privacy Preserving Computations without Public Key Cryptographic Operation,
    Koji Chida and Katsumi Takahashi
  • A Novel Framework For Watermarking : The Data-Abstracted Approach,
    Cyril BAZIN, Jean-Marie Le Bars, Jacques Madelaine

Session: Invited Talk

16:30-17:30 26 November (Wed), 2008

Session Chair: Kazuo Ota

  • The Elliptic Curve Discrete Logarithm Problem: State of the Art,
    Alfred Menezes

Session: Authentication and access control

9:00-10:45 27 November (Thu), 2008

Session Chair: Hiroaki Kikuchi

  • An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication,
    Julien Bringer and Herve Chabanne and David Pointcheval and Sebastien Zimmer
  • Analysis of a Biometric Authentication Protocol for Signature Creation Application,
    Anongporn Salaiwarakul and Mark D. Ryan
  • Efficient Secure Labeling Method under Dynamic XML Data Streams,
    Dong Chan An, So Mi Park, and Seog Park

Session: Implementation

11:15-12:25 27 November (Thu), 2008

Session Chair: Shoichi Hirose

  • Bitstream Encryption and Authentication using AES-GCM in Dynamically Reconfigurable Systems,
    Yohei Hori, Akashi Satoh, Hirofumi Sakane and Kenji Toda
  • The Long-Short-Key Primitive and Its Applications to Key Security,
    Matthew Cary, Matthias Jacob, Mariusz Jakubowski, Ramarathnam Venkatesan