Program     Session Table     Invited Lecture    

Session Table―Sessions―

 

J:Japanese Presentation

E:Englich Presentation

(E.g., JJEJJJ means that the 3rd paper will be presented in English among the 6 papers)


2012 Jan. 30 (Mon)
10:00 - 12:00
Registration on site
Venue 12:00 - 13:40 13:50 - 15:50
A1A1ID-based Encryption(1) JJJJJ1A2ID-based Encryption(2) JJJJJJ
B1B1Pairing JJJJJ1B2Elliptic Curve Cryptography EEJJJJ
C1C1Hash Function JJJJJ1C2Symmetric Key Encryption(1) JJJEJJ
D1D1Pseudorandom Number JJJJJ1D2Cryptographic Protocols(1) JJJJEJ
E1E1Malware JJJJ1E2Ubiquitous Security(1) JJJJJJ
F1F1Biometrics(1) JJJJJ1F2Biometrics(2) JJJJJJ
Venue 16:10 - 17:30 -
A1A3ID-based Encryption(3) JJJ
B1B3Applied Number Theory(1)JJJJ
C1C3Symmetric Key Encryption(2) JJJJ
D1D3Cryptographic Protocols(2) JJJJ
E1E3Ubiquitous Security (2) JJJJ
F1F3Biometrics(3) JJJJ

 

2012 Jan. 31 (Tue)
Venue 8:40 - 10:40 11:00 - 12:40
A2A1Public key Encryption(1) JJJJJJ2A2Public key Encryption(2) EJJJJ
B2B1Applied Number Theory(2)JJJJJJ2B2Applied Number Theory(3)JJEJJ
C2C1Symmetric Key Encryption(3) EJJJJJ2C2Side Channel Attack(1) JJJJJ
D2D1Privacy Protection(1) JJJJEJ2D2Privacy Protection(2) JJJJ
E2E1Ubiquitous Security (3) JJJJJJ2E2Network Intrusion Detection JJJJJ
F2F1Security Assessment and Model (1) JJJJJJ2F2Security Assessment and Model (2) JJJJE
12:40 - 14:00
Lunch
Venue 14:00 - 15:40 -
A2A3Public key Encryption(3) EJJJJ
B2B3Theory of Cryptography(1) JJJJJ
C2C3Side Channel Attack (2) JJJJJ
D2D3Quantum Security JJJJJ
E2E3Network Security(1) JJJJJ
F2F3Security Assessment and Model(3) JEJJ
15:40 - 16:30
Transit
Venue 16:30 - 17:30
The Kanazawa TheatreInvited Lecture 1
Venue 17:40 - 18:40
The Kanazawa TheatreInvited Lecture 2
18:40 - 19:30
Transit
Venue 19:30 - 21:30
5F
Ball Room
Banquet

 

2012 Feb. 1 (Wed)
Venue 8:40 - 10:40 11:00 - 12:40
A3A1Public key Encryption(4) JJJJJJ3A2Public key Encryption(5) JJJJ
B3B1Theory of Cryptography(2) EJJJJJ3B2Theory of Cryptography(3) JJJJJ
C3C1Side Channel Attack (3) JJEEJJ3C2Side Channel Attack (4) JJJJJ
D3D1Cloud Security(1) JJJJJJ3D2Cloud Security(2) JJJJJ
E3E1Network Security (2) JJJJJJ3E2Network Security (3) JJJJ
F3F1Watermarking(1) JJJJE3F2Watermarking(2) JJJJE
12:40 - 14:00
Lunch
Venue 14:00 - 15:40 -
A3A3Public key Encryption(6) JJJ
B3B3Theory of Cryptography(4) EJJJJ
C3C3Side Channel Attack(5) JJJJ
D3D3Cloud Security(3) JJJ
E3E3Network Security (4) JJJJ
F3F3Content Protection (1) JJEJ
15:40 - 16:30
Transit
Venue 16:30 - 18:00
The Kanazawa TheatreTutorial
18:00 - 19:30
Transit
Venue 19:30 - 21:30
5F
Ball Room
Night Session

 

2012 Feb. 2 (Thu)
Venue 8:40 - 10:40 11:00 - 12:20
A4A1Signature(1) JJJJJJ4A2Signature(2) EJJJ
B4B1Unconditional Security(1) JJJJJ4B2Unconditional Security(2) JJJ
C4C1Implementation(1) JJJJJJ4C2Implementation(2) JJJJ
D4D1Formal Method EJJJJ4D2Authentication JJJJ
E4E1Web Security JJJJJJ4E2Secure OS/Software Protection JJJJ
F4F1Content Protection (2) JJJJJ4F2Content Protection (3) JJJ
PAGE UP

Copyright (C) 2011-2012 SCIS2012, All Rights Reserved.