List of Accepted Papers
Short Papers (10 articles)
- Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun : On the Kipnis-Shamir Method Solving the MinRank Problem
- Yasufumi Hashimoto : On Small Secret Key Attack against RSA with High Bits Known Prime Factor
- Masaharu Fukase, Kazunori Yamaguchi : Exhaustive Search for Finding a Very Short Vector in High Dimensional Lattices
- Kazuki Yoneyama, Masayuki Terada, Sadayuki Hongo, Kazuo Ohta : Universally Composable NBAC-based Fair Voucher Exchange for Mobile Environments
- Joachim Biskup, Cornelia Tadros : Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation
- Sachiko Yoshihama, Takuya Mishina, Tsutomu Matsumoto : Web-based Data Leakage Prevention
- Chen Bangdao, A.W.Roscoe, Ronald Kainda, L.H. Nguyen : The Missing Link: Human Interactive Security Protocols in Mobile Payment
- Ulas Bardak, Seiya Hasegawa, Kazuko Mishima, Takayuki Saito : Automated Scheduling of Volunteers Through Adapting a Nurse Scheduling Infrastructure
- Olli Sjoblom : Data Mining in Aviation Safety
- Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka : A Prototype System for Ensuring Integrity of Extracted Video Data
Regular Papers (22 articles)
Track I (13 articles)- Kimmo Halunen, Juha Roning : Preimage Attacks Against Variants of Very Smooth Hash
- Minoru Kuribayashi : Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel
- Benjamin Justus, Daniel Loebenberger : Differential Addition in generalized Edwards Coordinates
- Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang : PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples
- Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta : Publishing Upper Half of RSA Decryption Exponent
- Jun Yajima, Takeshi Shimoyama : Matrix Representation of Conditions for the Collision Attack of SHA-1 and its Application to the Message Modification
- Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta : A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model
- Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto : Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
- Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama : Hierarchical ID-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
- Thanh-Ha Le, Mael Berthier : Mutual Information Analysis under the view of Higher-Order Statistics
- Keita Emura, Goichiro Hanaoka, Yusuke Sakai : Group Signature Implies PKE with Non-interactive Opening and Threshold PKE
- Yu Sasaki : Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
- Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama : An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme
Track II (6 articles)- Lena Wiese : Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints
- Fumiko Satoh, Naohiko Uramoto : Validating Security Policy Conformance with WS-Security Requirements
- Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska : Practical Universal Random Sampling
- Carlos T. Calafate, Javier Campos, Marga N?cher, Pietro Manzoni, Juan-Carlos Cano : A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs
- Mansoor Alicherry, Angelos D. Keromytis : Securing MANET Multicast Using DIPLOMA
- Tomonori Izumida, Kokichi Futatsugi, Akira Mori : A Generic Binary Analysis Method for Malware
Track III (3 articles)- Margus Niitsoo : Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
- Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi : Efficient Implementation of Pairing on BREW Mobile phones
- Lasse Harjumaa, Ilkka Tervonen : Introducing Mitigation Use Cases to Enhance the Scope of Test Cases