Time Table
November 22, 2010
Time | Session |
---|---|
12:00 | Registration Desk Open |
13:00–13:10 | Opening Remarks |
13:10–14:10 | Invited Talk 1 |
14:10–14:40 | Break |
14:40–16:40 | Regular Session 1 |
17:00–19:30 | Excursion 1 |
November 23, 2010
Time | Session | |
---|---|---|
09:00–10:00 | Invited Talk 2 | |
10:00–10:30 | Break | |
10:30–12:00 | Regular Session 2 | |
12:00–13:30 | Lunch | |
13:30–14:45 | Short Paper Session 1 | |
15:00–17:10 | Excursion 2 | |
19:00–21:00 | Banquet |
November 24, 2010
Time | Session | |
---|---|---|
09:00–11:00 | Regular Session 3 | |
11:00–11:30 | Break | |
11:30–12:20 | Short Paper Session 2 | |
12:20– | Closing |
Program of IWSEC2010 (Tentative)
Invited Talk 1
13:10-14:10 November 22, 2010
Session Chair: Jun Sakuma
- Automating Security Configuration and Administration: An Access Control Perspective
Jaideep S. Vaidya
Regular Session 1
14:40-16:40 November 22, 2010
Room1: Encryption
Session Chair: Tsuyoshi Takagi
- Publishing Upper Half of RSA Decryption Exponent
Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta - PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples
Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang - A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model
Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta - An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme
Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama
Room2: Data and Web Security
Session Chair: Hiroyuki Inaba
- Practical Universal Random Sampling
Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska - Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints
Lena Wiese - Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel
Minoru Kuribayashi - Validating Security Policy Conformance with WS-Security Requirements
Fumiko Satoh, Naohiko Uramoto
Invited Talk 2
09:00-10:00 November 23, 2010
Session Chair: Kanta Matsuura
- Security Metrics and Security Investment Models
Rainer Boehme
Regular Session 2
10:30-12:00 November 23, 2010
Room1: Protocols
Session Chair: Kaoru Kurosawa
- Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto
- Hierarchical ID-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama
- Group Signature Implies PKE with Non-interactive Opening and Threshold PKE
Keita Emura, Goichiro Hanaoka, Yusuke Sakai
Room2: Network Security
Session Chair: Toru Nakanishi
- A Generic Binary Analysis Method for Malware
Tomonori Izumida, Kokichi Futatsugi, Akira Mori
- A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs
Carlos T. Calafate, Javier Campos, Marga Nacher, Pietro Manzoni, Juan-Carlos Cano
- Securing MANET Multicast Using DIPLOMA
Mansoor Alicherry, Angelos D. Keromytis
Short Paper Session 1
13:30-14:45 November 23, 2010
Room1: Track I
Session Chair: Phong Nguyen
- On the Kipnis-Shamir Method Solving the MinRank Problem
Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun
- On Small Secret Key Attack against RSA with High Bits Known Prime Factor
Yasufumi Hashimoto
- Exhaustive Search for Finding a Very Short Vector in High Dimensional Lattices
Masaharu Fukase, Kazunori Yamaguchi
Room2: Track III
Session Chair: Rainer Boehme
- Automated Scheduling of Volunteers Through Adapting a Nurse Scheduling Infrastructure
Ulas Bardak, Seiya Hasegawa, Kazuko Mishima, Takayuki Saito
- A Prototype System for Ensuring Integrity of Extracted Video Data
Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka
- Data Mining in Aviation Safety
Olli Sjoblom
Regular Session 3
09:00-11:00 November 24, 2010
Room1: Block Cipher
Session Chair: Tetsu Iwata
- Preimage Attacks Against Variants of Very Smooth Hash
Kimmo Halunen, Juha Roning
- Matrix Representation of Conditions for the Collision Attack of SHA-1 and its Application to the
Message Modification
Jun Yajima, Takeshi Shimoyama
- Mutual Information Analysis under the view of Higher-Order Statistics
Thanh-Ha Le, Mael Berthier
- Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
Yu Sasaki
Room2: Implementation & Real Life Security
Session Chair: Kazuo Sakiyama
- Differential Addition in generalized Edwards Coordinates
Benjamin Justus, Daniel Loebenberger
- Efficient Implementation of Pairing on BREW Mobile phones
Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi
- Introducing Mitigation Use Cases to Enhance the Scope of Test Cases
Lasse Harjumaa, Ilkka Tervonen
- Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Margus Niitsoo
Short Paper Session 2
11:30-12:20 November 24, 2010
Room1: Track I
Session Chair: Katsuyuki Okeya
- Universally Composable NBAC-based Fair Voucher Exchange for Mobile Environments
Kazuki Yoneyama, Masayuki Terada, Sadayuki Hongo, Kazuo Ohta
- Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation
Joachim Biskup, Cornelia Tadros
Room2: Track II
Session Chair: Sven Wohlgemuth
- Web-based Data Leakage Prevention
Sachiko Yoshihama, Takuya Mishina, Tsutomu Matsumoto
- The Missing Link: Human Interactive Security Protocols in Mobile Payment
Chen Bangdao, A.W.Roscoe, Ronald Kainda, L.H. Nguyen