Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [Japanese] / [English]
SITE2013-6
Study of CAPTCHA suitable for smartphones
Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.)
pp. 7 - 12
SITE2013-7
Proposal of the Support System at the Time of Introduction of User Applications in Android OS
Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.)
pp. 13 - 18
SITE2013-8
Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform
Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 19 - 26
SITE2013-9
Examination of IDS Log Analysis using Discrete Wavelet Transform
Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 27 - 32
SITE2013-10
Engineering Ethics Education with world cafe discussion
Michio Nakanishi (Osaka Inst. of Tech.)
pp. 33 - 38
SITE2013-11
Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.)
pp. 39 - 46
SITE2013-12
The Concept of "Group Privacy" in the Information Age:
-- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? --
Takushi Otani (Kibi International Univ.)
pp. 47 - 52
SITE2013-13
Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability
Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC)
pp. 53 - 58
SITE2013-14
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256
Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST)
pp. 59 - 66
SITE2013-15
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 67 - 74
SITE2013-16
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA)
pp. 75 - 84
SITE2013-17
An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients
Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.)
pp. 167 - 172
SITE2013-18
Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices
Toshio Modegi (DNP)
pp. 173 - 180
SITE2013-19
Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface
Tomoko Kajiyama (Aoyama Gakuin Univ.)
pp. 181 - 185
SITE2013-20
[Panel Discussion]
Education for IT Engineers from the Viewpoint of Information Security
Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi
pp. 187 - 192
SITE2013-21
A Hierarchical Access Control Method by the Secret Sharing Scheme
Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.)
pp. 193 - 198
SITE2013-22
A Content Protection Method Using Secret Sharing and Attribute-Based Encryption
Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.)
pp. 199 - 204
SITE2013-23
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method
Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)
pp. 205 - 212
SITE2013-24
Study of an artificial fiber pattern in Augmented Reality system
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)
pp. 213 - 220
SITE2013-25
Image Restoration Using Embedding of Similar Region Information
Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.)
pp. 221 - 226
SITE2013-26
On a Data-Hiding Technique Based on Complete Complementary Codes
Ryusuke Mayuzumi (Univ. of Electro-Comm.), Tetsuya Kojima (Tokyo National College of Tech.)
pp. 227 - 232
SITE2013-27
Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection
Shengbei Wang, Masashi Unoki (JAIST)
pp. 233 - 238
SITE2013-28
An Approach to Amplitude Scaling Partial Encryption for Compressed Audio
Twe Ta Oo, Takao Onoye (Osaka Univ.), Kilho Shin (Univ. of Hyogo)
pp. 239 - 244
SITE2013-29
[Invited Talk]
Research on Information and Physical Security Technologies for Embedded Systems
Tsutomu Matsumoto (Yokohama National Univ.)
p. 245
SITE2013-30
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba)
pp. 247 - 254
SITE2013-31
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
Daisuke Moriyama (NICT)
pp. 255 - 261
SITE2013-32
A Knapsack Cryptosystem Using Super-Decreasing Sequence
Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.)
pp. 263 - 268
SITE2013-33
An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem
Yasuyuki Murakami, Shinsuke Hamasho (Osaka Electro-Comm. Univ.)
pp. 269 - 274
SITE2013-34
Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 275 - 279
SITE2013-35
Cryptosystems for Social Organizations Managed by Receiving Administrator
-- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations --
Shigeo Tsujii, Hiroshi Yamaguchi, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.)
pp. 281 - 288
SITE2013-36
On Identification Methods for Visible-Light Paper Artifact-Metric Systems
Ryosuke Suzuki, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 289 - 295
SITE2013-37
A proposal of key binding technology using lattice masking
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.)
pp. 297 - 304
SITE2013-38
TLS with Pre-shared Key Extended by Identity-based Encryption
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.)
pp. 315 - 321
SITE2013-39
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
pp. 323 - 330
SITE2013-40
On Side-Channel Information Using Signal Toggles in AES Circuit
Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC)
pp. 331 - 338
SITE2013-41
Recovering RSA Secret Keys from Observed Analog Data (I)
Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo)
pp. 339 - 343
SITE2013-42
Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities
Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.)
pp. 373 - 380
SITE2013-43
Network Observation and Analysis Report on nicter
-- Malware infection to embedded systems --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)
pp. 381 - 385
SITE2013-44
Generalization of Noises in Differential Privacy
Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT)
pp. 395 - 402
SITE2013-45
Attacks on Authenticated Encryption Based on E-MACs
Hayato Kobayashi, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)
pp. 403 - 410
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.