Entity

Time filter

Source Type

Yokohama-shi, Japan

Institute of Information Security is a private university in Kanagawa-ku, Yokohama, Kanagawa Prefecture Japan. It was established in 2004 and offers a graduate studies and post-doctorate studies program Wikipedia.


Chang C.-C.,Feng Chia University | Chen Y.-H.,Asia University, Taiwan | Wang H.-C.,Institute of Information Security
Information Sciences | Year: 2011

Lin and Tasi, Yang et al., and Chang et al.'s meaningful secret sharing schemes provided authentication mechanisms but none included a remedy ability that would cause the secret image never to be completely obtained while some information of the stego-images are losing or tampering with. This paper proposes a meaningful secret-sharing scheme which includes both authentication and remedy abilities that allow for detection of the corrupted area and use of the hidden information to repair the secret image with reasonable visual quality. In comparison with previous schemes, this approach results in superior visual qualities of the stego-images by an average of more than 3 dB. © 2011 Elsevier Inc. All rights reserved. Source


Arita S.,Institute of Information Security
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | Year: 2012

In resetting attacks against a proof system, a prover or a verifier is reset and enforced to use the same random tape on various inputs as many times as an adversary may want. Recent deployment of cloud computing gives these attacks a new importance. This paper shows that argument systems for any NP language that are both resettably-sound and resettable zero-knowledge are possible by a constant-round protocol in the BPK model. For that sake, we define and construct a resettably-extractable conditional commitment scheme. Copyright © 2012 The Institute of Electronics, Information and Communication Engineers. Source


Kim C.H.,Institute of Information Security
IEEE Communications Letters | Year: 2011

A distance bounding protocol enables one entity to determine an upper bound on the physical distance to the other entity as well as to authenticate the other entity. It measures the round-trip time of exchanged messages that normally consist of n rounds of a single-bit challenge and a single-bit response. Let FAR M and FAR D be the false acceptance rate against mafia fraud attack and distance fraud attack, respectively. Brands and Chaum designed the first distance bounding protocol that has (FAR M, FAR D) = ((1/2) n, (1/2) n). Recently Yum et al. proposed a flexible distance bounding protocol, in IEEE Communications Letters, asserting that its false acceptance rate (FAR M, FAR D) can be chosen from ((1/2) n, (1/2) n) to ((1/4) n, ((3/4)) n). However, we introduce a new attack that achieves a higher false acceptance rate, where (FAR M, FAR D) varies from ((1/2) n, (1/2) n) to ((1/2) n, (1/2) n/2). © 2006 IEEE. Source


Uchida K.,Institute of Information Security
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

Information Systems are composed in four main portions, people, information, appliance and facilities. These four portions are called information assets. Information security protects information assets and keeps safe them from the view point of Confidentiality, Integrity and Availability (CIA). Recently, cyber-attacks to people in specific organizations are called advanced persistent threat (APT) or targeted attacks. APT attacks are attacks using psychological and behavioral science weakness of people, are not technical attacks. Kevin Mitnick, the most competent and the most famous attacker for people says “Security is not a technology problem. It is a human and management problems” in his book. By using the knowledge of psychology, behavioral science and criminology, the attackers attack people, and achieve the purposes. Targets of the attacks are not only the direct objects that are theft or destruction of information, but also the indirect objects that obtain the information necessary to achieve the goal. Sun Tzu, a Chinese military general, strategist and philosopher said “If you know your enemies and know yourself, you can win a hundred battles without a single loss”. Attackers and victims are classified into people, appliance (hardware and software) and hybrid (people and appliance). The methods of attackers for each attack and cases of attacks are classified in this paper. Some organizations are beginning to use the elements of games and competitions to motivate employees, and customers. This is known as gamification which is the application of game elements and digital game design techniques to non-game problems, such as business and social impact challenges. Gamification is very useful for awareness training of information security, I believe. This paper attempts to classify and systematize attackers, victims and the methods of attacks, as by psychology, behavioral science, criminal psychology, and cognitive psychology I have proposed some ideas for education, training and awareness for information security using the findings of psychology and behavioral science. © Springer International Publishing Switzerland 2015 Source


Fuster-Sabater A.,Institute of Information Security
Procedia Computer Science | Year: 2013

A large Linear Complexity (LC) is a fundamental requirement for a binary sequence to be used in secret key cryptography. In this paper, a method of computing all the nonlinear filters applied to a shift register with a linear complexity LC ≥ (L k), where L is the length of the register and k the order of the filter, is proposed. The procedure is based on the handling of filtering functions by means of algebraic operations. The method formally completes the family of nonlinear filtering functions with a guaranteed large linear complexity. In cryptographic terms, it means an easy and useful way of designing sequence generators for cryptographic purposes. © 2013 The Authors. Published by Elsevier B.V. Source

Discover hidden collaborations