Program
(30 minutes for each presentation of regular papers, 20 minutes for short papers)
International Conference Room,
4th floor of 1st Building in NICT headquarters
August 15, 2023
9:00 - 10:00 | On-site Registration | ||
10:00 - 10:15 | •Opening remark, Mr. Koji Nakao (General Co-chair, NICT) •Welcoming remark (1), Prof. Heung Youl Youm (General Co-chair, Soonchunhyang University) •Welcoming remark (2), Prof. Chun-I Fan (General Co-chair, National Sun Yat-sen University) •Welcoming remark (3), Yong Ding (General Co-chair, Guilin University of Electronic Technology) | ||
10:15 - 11:00 | Keynote (Session Chair: Akira Fujita, NICT) Professor Michel van Eeten (Delft University of Technology) Title: Economics of dark markets: Observations on criminal services via anonymous marketplaces | ||
11:00 - 11:15 | Coffee Break | ||
11:15 - 12:00 | Invited Talk #1: (Session Chair: Narn-Yih Lee, National Cheng Kung University) Professor Raylin Tso (National Chengchi University) Title: Implicit Certificates and Their Extended Applications | ||
12:00 - 13:00 | Conference Lunch | ||
13:00-14:50 | SESSION 1: Privacy Protection (Session Chair: Ryoichi Isawa, NICT ) | Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain (Regular Paper) | Baodong Wen, Yujue Wang, Yong Ding, Hai Liang, Changsong Yang and Decun Luo (Online presentation) |
Privacy Preserving Provable Data Possession: A FHE-based Hash Approach (Regular Paper) | Sheng-Yi Hong, Rui-Zhen Xu, Po-Wen Chi and Albert Guan | ||
A Revocation Key-based Approach Towards Efficient Federated Unlearning (Regular Paper) | Rui-Zhen Xu, Sheng-Yi Hong, Po-Wen Chi and Ming-Hung Wang | ||
Privacy-Preserving Frequency Estimation Method (Short Paper) | Naoki Kawahara, Atsuko Miyaji and Tomoaki Mimoto (Online presentation) | ||
14:50 - 15:00 | Coffee Break | ||
15:00 - 15:45 | Invited Talk #2: (Session Chair: Yong Ding, Guilin University of Electronic Technology ) Professor Chen Yang (Beijing Institute of Technology) (Online presentation) Title: Cloud-Edge-End Computing with Security Challenges | ||
15:45 - 15:50 | Coffee Break | ||
15:50-17:00 | SESSION 2: Detection and Machine Learning (Session Chair: Jason Lin, National Chung Hsing University ) | Intrusion Detection Systems Based on Machine Learning Using Feature Expansion Methods (Regular Paper) | Joonwoo Myung, Youngmin Ko, Taewoong Kwon, Jun Lee, Kyuil Kim and Jungsuk Song |
Phishing Detection with Browser Extension Based on Machine Learning (Short Paper) | Che-Yu Wu, Cheng-Chung Kuo, and Chu-Sing Yang | ||
Packet-Level Intrusion Detection Using LSTM Focusing on Personal Information and Payloads (Short Paper) | Shota Kawanaka, Yoshikatsu Kashiwabara, Kohei Miyamoto, Masazumi Iida, Chansu Han, Tao Ban, Takeshi Takahashi and Jun'Ichi Takeuchi | ||
17:00 - 18:00 | Poster Session (On-site) | ||
18:00 - 20:00 | Welcome dinner at NICT headquarters Collaboration Space, 3rd floor of Quantum Security Collaboration Facility |
August 16, 2023
9:30 – 10:20 | On-site Registration | ||
10:20 – 12:00 | SESSION 3: Cryptography (Session Chair: Jun Lee, KISTI ) | A novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership (Regular Paper) | Yi-Fan Tseng, Jheng-Jia Huang, Guan-Yu Chen, Wei-Hsueh Wang, Yi-Hsueh Lu, Wen-Yi Chen and Shih-Pei Kao |
Receipt-Free E-Voting By Flexible Usage Of Mix Network (Regular Paper) | Kun Peng (Online presentation) | ||
Revisited Linear Approximation formula of ChaCha (Short Paper) | Atsuki Nagai and Atsuko Miyaji | ||
Development of the Edge Computing Platform based on Modular Architecture using Intel SGX (Short Paper) | Yuma Nishihira, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi, Hidenobu Watanabe, Tohru Kondo and Reiji Aibara | ||
12:00 - 13:00 | Conference Lunch | ||
13:00 - 13:45 | Invited Talk #3: (Session Chair: Rui Tanabe, YNU ) Professor Kouichi SAKURAI (Kyushu University) Title: Power and limitations of cryptography for securing non-fungible tokens | ||
13:45 - 14:00 | Coffee Break | ||
14:00 – 15:40 | SESSION 4: System Security and Blockchain (Session Chair: Zhenwei Guo, Hangzhou Innovation Institute of Beihang University ) | A secure firmware or software update model based on DLT system for Internet of Things devices utilizing SBOM (Regular Paper) | Da Eun Hyeon, Jun Hyung Park, and Heung Youl Youm |
VMI System with Smart Contracts for Demand Forecasting (Regular Paper) | Hagiwara Kenta and Omote Kazumasa | ||
Anonymous and Unlikable Identify Scheme in Open Data Environment (Short Paper) | Jheng-Jia Huang, Wei-Hsueh Wang, Yi-Fan Tseng, Guan-Yu Chen, Hao-Hsiang Chang Chien, Wen-Yan Dai and Nai-Wei Lo | ||
A Certificate Management Mechanism Using Distributed Ledger (Short Paper) | Iuon-Chang Lin, Jing-Yuan Huang and Jason Lin | ||
15:40 - 15:50 | Best Paper Award Ceremony | ||
15:50 - 16:00 | Closing Remarks |
Sponsors
Yamato Consulting & Research Group (YCRG) |
|
---|---|
LAC Co., Ltd. |
National Institute of Information and Communications Technology |
SecureBrain Corporation |
clwit, Inc. |