Co-organized by IEICE & IPSJ

Time Table

November 22, 2010

Time Session
12:00 Registration Desk Open
13:00–13:10 Opening Remarks
13:10–14:10 Invited Talk 1
14:10–14:40 Break
14:40–16:40 Regular Session 1
17:00–19:30 Excursion 1

November 23, 2010

Time Session
09:00–10:00 Invited Talk 2
10:00–10:30 Break
10:30–12:00 Regular Session 2
12:00–13:30 Lunch
13:30–14:45 Short Paper Session 1
15:00–17:10 Excursion 2
19:00–21:00 Banquet

November 24, 2010

Time Session
09:00–11:00 Regular Session 3
11:00–11:30 Break
11:30–12:20 Short Paper Session 2
12:20– Closing

Program of IWSEC2010 (Tentative)

Invited Talk 1

13:10-14:10 November 22, 2010

Session Chair: Jun Sakuma

  • Automating Security Configuration and Administration: An Access Control Perspective
    Jaideep S. Vaidya

Regular Session 1

14:40-16:40 November 22, 2010

Room1: Encryption

Session Chair: Tsuyoshi Takagi

  • Publishing Upper Half of RSA Decryption Exponent
    Subhamoy Maitra, Santanu Sarkar, Sourav Sen Gupta
  • PA1 and IND-CCA2 Do Not Guarantee PA2: Brief Examples
    Yamin Liu, Bao Li, Xianhui Lu, Yazhe Zhang
  • A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model
    Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta
  • An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme
    Naoki Ogura, Go Yamamoto, Tetsutaro Kobayashi, Shigenori Uchiyama

Room2: Data and Web Security

Session Chair: Hiroyuki Inaba

  • Practical Universal Random Sampling
    Marek Klonowski, Michal Przykucki, Tomasz Struminski, Malgorzata Sulkowska
  • Horizontal Fragmentation for Data Outsourcing with Formula-Based Confidentiality Constraints
    Lena Wiese
  • Experimental Assessment of Probabilistic Fingerprinting Codes over AWGN Channel
    Minoru Kuribayashi
  • Validating Security Policy Conformance with WS-Security Requirements
    Fumiko Satoh, Naohiko Uramoto

Invited Talk 2

09:00-10:00 November 23, 2010

Session Chair: Kanta Matsuura

  • Security Metrics and Security Investment Models
    Rainer Boehme

Regular Session 2

10:30-12:00 November 23, 2010

Room1: Protocols

Session Chair: Kaoru Kurosawa

  • Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
    Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto
  • Hierarchical ID-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama
  • Group Signature Implies PKE with Non-interactive Opening and Threshold PKE
    Keita Emura, Goichiro Hanaoka, Yusuke Sakai

Room2: Network Security

Session Chair: Toru Nakanishi

  • A Generic Binary Analysis Method for Malware
    Tomonori Izumida, Kokichi Futatsugi, Akira Mori
  • A-HIP: A Solution Offering Secure and Anonymous Communications in MANETs
    Carlos T. Calafate, Javier Campos, Marga Nacher, Pietro Manzoni, Juan-Carlos Cano
  • Securing MANET Multicast Using DIPLOMA
    Mansoor Alicherry, Angelos D. Keromytis

Short Paper Session 1

13:30-14:45 November 23, 2010

Room1: Track I

Session Chair: Phong Nguyen

  • On the Kipnis-Shamir Method Solving the MinRank Problem
    Xin Jiang, Lei Hu, Jintai Ding, Siwei Sun
  • On Small Secret Key Attack against RSA with High Bits Known Prime Factor
    Yasufumi Hashimoto
  • Exhaustive Search for Finding a Very Short Vector in High Dimensional Lattices
    Masaharu Fukase, Kazunori Yamaguchi

Room2: Track III

Session Chair: Rainer Boehme

  • Automated Scheduling of Volunteers Through Adapting a Nurse Scheduling Infrastructure
    Ulas Bardak, Seiya Hasegawa, Kazuko Mishima, Takayuki Saito
  • A Prototype System for Ensuring Integrity of Extracted Video Data
    Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka
  • Data Mining in Aviation Safety
    Olli Sjoblom

Regular Session 3

09:00-11:00 November 24, 2010

Room1: Block Cipher

Session Chair: Tetsu Iwata

  • Preimage Attacks Against Variants of Very Smooth Hash
    Kimmo Halunen, Juha Roning
  • Matrix Representation of Conditions for the Collision Attack of SHA-1 and its Application to the Message Modification
    Jun Yajima, Takeshi Shimoyama
  • Mutual Information Analysis under the view of Higher-Order Statistics
    Thanh-Ha Le, Mael Berthier
  • Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
    Yu Sasaki

Room2: Implementation & Real Life Security

Session Chair: Kazuo Sakiyama

  • Differential Addition in generalized Edwards Coordinates
    Benjamin Justus, Daniel Loebenberger
  • Efficient Implementation of Pairing on BREW Mobile phones
    Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi
  • Introducing Mitigation Use Cases to Enhance the Scope of Test Cases
    Lasse Harjumaa, Ilkka Tervonen
  • Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
    Margus Niitsoo

Short Paper Session 2

11:30-12:20 November 24, 2010

Room1: Track I

Session Chair: Katsuyuki Okeya

  • Universally Composable NBAC-based Fair Voucher Exchange for Mobile Environments
    Kazuki Yoneyama, Masayuki Terada, Sadayuki Hongo, Kazuo Ohta
  • Policy-Based Secrecy in the Runs & Systems Framework and Controlled Query Evaluation
    Joachim Biskup, Cornelia Tadros

Room2: Track II

Session Chair: Sven Wohlgemuth

  • Web-based Data Leakage Prevention
    Sachiko Yoshihama, Takuya Mishina, Tsutomu Matsumoto
  • The Missing Link: Human Interactive Security Protocols in Mobile Payment
    Chen Bangdao, A.W.Roscoe, Ronald Kainda, L.H. Nguyen