IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 113, Number 136

Social Implications of Technology and Information Ethics

Workshop Date : 2013-07-18 - 2013-07-19 / Issue Date : 2013-07-11

[PREV] [NEXT]

[TOP] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2013-6
Study of CAPTCHA suitable for smartphones
Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.)
pp. 7 - 12

SITE2013-7
Proposal of the Support System at the Time of Introduction of User Applications in Android OS
Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.)
pp. 13 - 18

SITE2013-8
Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform
Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 19 - 26

SITE2013-9
Examination of IDS Log Analysis using Discrete Wavelet Transform
Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 27 - 32

SITE2013-10
Engineering Ethics Education with world cafe discussion
Michio Nakanishi (Osaka Inst. of Tech.)
pp. 33 - 38

SITE2013-11
Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.)
pp. 39 - 46

SITE2013-12
The Concept of "Group Privacy" in the Information Age: -- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? --
Takushi Otani (Kibi International Univ.)
pp. 47 - 52

SITE2013-13
Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability
Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC)
pp. 53 - 58

SITE2013-14
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256
Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST)
pp. 59 - 66

SITE2013-15
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 67 - 74

SITE2013-16
On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA)
pp. 75 - 84

SITE2013-17
An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients
Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.)
pp. 167 - 172

SITE2013-18
Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices
Toshio Modegi (DNP)
pp. 173 - 180

SITE2013-19
Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface
Tomoko Kajiyama (Aoyama Gakuin Univ.)
pp. 181 - 185

SITE2013-20
[Panel Discussion] Education for IT Engineers from the Viewpoint of Information Security
Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi
pp. 187 - 192

SITE2013-21
A Hierarchical Access Control Method by the Secret Sharing Scheme
Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.)
pp. 193 - 198

SITE2013-22
A Content Protection Method Using Secret Sharing and Attribute-Based Encryption
Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.)
pp. 199 - 204

SITE2013-23
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method
Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)
pp. 205 - 212

SITE2013-24
Study of an artificial fiber pattern in Augmented Reality system
Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII)
pp. 213 - 220

SITE2013-25
Image Restoration Using Embedding of Similar Region Information
Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.)
pp. 221 - 226

SITE2013-26
On a Data-Hiding Technique Based on Complete Complementary Codes
Ryusuke Mayuzumi (Univ. of Electro-Comm.), Tetsuya Kojima (Tokyo National College of Tech.)
pp. 227 - 232

SITE2013-27
Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection
Shengbei Wang, Masashi Unoki (JAIST)
pp. 233 - 238

SITE2013-28
An Approach to Amplitude Scaling Partial Encryption for Compressed Audio
Twe Ta Oo, Takao Onoye (Osaka Univ.), Kilho Shin (Univ. of Hyogo)
pp. 239 - 244

SITE2013-29
[Invited Talk] Research on Information and Physical Security Technologies for Embedded Systems
Tsutomu Matsumoto (Yokohama National Univ.)
p. 245

SITE2013-30
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba)
pp. 247 - 254

SITE2013-31
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
Daisuke Moriyama (NICT)
pp. 255 - 261

SITE2013-32
A Knapsack Cryptosystem Using Super-Decreasing Sequence
Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.)
pp. 263 - 268

SITE2013-33
An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem
Yasuyuki Murakami, Shinsuke Hamasho (Osaka Electro-Comm. Univ.)
pp. 269 - 274

SITE2013-34
Cryptanalysis of Rainbow Signature -- Enrico, you should have hacked further --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 275 - 279

SITE2013-35
Cryptosystems for Social Organizations Managed by Receiving Administrator -- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations --
Shigeo Tsujii, Hiroshi Yamaguchi, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.)
pp. 281 - 288

SITE2013-36
On Identification Methods for Visible-Light Paper Artifact-Metric Systems
Ryosuke Suzuki, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 289 - 295

SITE2013-37
A proposal of key binding technology using lattice masking
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.)
pp. 297 - 304

SITE2013-38
TLS with Pre-shared Key Extended by Identity-based Encryption
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.)
pp. 315 - 321

SITE2013-39
Application of Efficient Forms of Elliptic Curves to Ate-like Pairings
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT)
pp. 323 - 330

SITE2013-40
On Side-Channel Information Using Signal Toggles in AES Circuit
Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC)
pp. 331 - 338

SITE2013-41
Recovering RSA Secret Keys from Observed Analog Data (I)
Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo)
pp. 339 - 343

SITE2013-42
Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities
Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.)
pp. 373 - 380

SITE2013-43
Network Observation and Analysis Report on nicter -- Malware infection to embedded systems --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT)
pp. 381 - 385

SITE2013-44
Generalization of Noises in Differential Privacy
Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT)
pp. 395 - 402

SITE2013-45
Attacks on Authenticated Encryption Based on E-MACs
Hayato Kobayashi, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)
pp. 403 - 410

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan