IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 114, Number 118

Enriched MultiMedia

Workshop Date : 2014-07-03 - 2014-07-04 / Issue Date : 2014-06-26

[PREV] [NEXT]

[TOP] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

EMM2014-10
Consideration on Side-Channel Information Toward Authentication
Arisa Matsubara, Yang Li (UEC), Yu-ichi Hayashi (Tohoku Univ.), Kazuo Sakiyama (UEC)
pp. 1 - 8

EMM2014-11
A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals
Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.)
pp. 9 - 16

EMM2014-12
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack
Daisuke Moriyama (NICT)
pp. 17 - 24

EMM2014-13
Privacy Preserving Conditional Disclosure II
Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.)
pp. 25 - 30

EMM2014-14
Dynamic Security Control Architecture on Hybrid-cloud
Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo)
pp. 61 - 67

EMM2014-15
Deceptive defense architecture toward protection against APT
Takahiro Kakumaru, Shigeyoshi Shima, Masafumi Watanabe (NEC), Katsunari Yoshioka (YNU)
pp. 69 - 74

EMM2014-16
Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.)
pp. 75 - 80

EMM2014-17
Experimental Platform for CAN
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.)
pp. 81 - 87

EMM2014-18
On a PRNG based on non-commutative algebra and its applications
Satoshi Iriyama, Yoshiharu Tanaka, Toshihide Hara, Masanori Ohya (TUS)
pp. 89 - 91

EMM2014-19
Security of RSA with Many Decryption Exponents
Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo)
pp. 93 - 96

EMM2014-20
A New Precomputation Method with Perfect Conjugate-Addition Sequence
Ryota Takahashi, Atsuko Miyaji (JAIST)
pp. 97 - 104

EMM2014-21
Authentication for mobile devices using behavioral biometrics with adaptive templates
Shigeki Karita, Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.)
pp. 133 - 138

EMM2014-22
A proposal of authentication methods against shoulder surfing using a sub channel
Akira Aratani, Atsushi Kanai (Hosei Univ.)
pp. 139 - 144

EMM2014-23
Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII)
pp. 145 - 148

EMM2014-24
A quantification method of the degree of personal information disclosure using statistical data
Tomoyasu Shirayama, Atsushi Kanai (Hosei Univ)
pp. 149 - 154

EMM2014-25
Data authentication scheme suitable for broadcast in the sensor networks
Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST)
pp. 155 - 162

EMM2014-26
Forward-Secure Sequential Aggregate Message Authentication Revisited
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.)
pp. 163 - 170

EMM2014-27
On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT)
pp. 171 - 179

EMM2014-28
Privacy Invasion and the Concept of the "Digital Person" -- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory --
Takushi Otani (Kibi International Univ.)
pp. 205 - 212

EMM2014-29
Comparison on personal information protection ordinates of prefectures and government-designated cities.
Arata Ito, Tetsutaro Uehara (Ritsumeikan Univ.)
pp. 213 - 220

EMM2014-30
Problems Concerning the Digitization of the Japanese Government Authorized Textbooks -- Study of Open Access and Free License of the Digital Textbooks --
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Tsugumasa Suzuki (Keio Gijuku Youchisha Primary School), Takushi Otani (Kibi International Univ.)
pp. 221 - 228

EMM2014-31
Information ethics in interdiscplinarity -- Codes of Ethics and Belief Revision --
Yuko Murakami (Tohoku Univ.)
pp. 229 - 232

EMM2014-32
On Hidden Credential Retrieval
SeongHan Shin, Kazukuni Kobara (AIST)
pp. 233 - 237

EMM2014-33
Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT)
pp. 239 - 246

EMM2014-34
New Higher Order Differential Property of Piccolo
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 247 - 252

EMM2014-35
Quantitative Evaluation of the Key Information That is Learned through Timing Attack -- The Contribution of Bucketing Technique for RSA Cryptosystem --
Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST)
pp. 253 - 258

EMM2014-36
Some Properties on Disaster Prevention Broadcasting Based on Data Hiding Technique
Tetsuya Kojima, Akihiro Oizumi (Tokyo NCT)
pp. 259 - 264

EMM2014-37
Information hiding technique to protect copyright of digital data for 3-D printing
Piyarat Silapasuphakornwong, Masahiro Suzuki, Hiroshi Unno, Kazutake Uehira (Kanagawa Inst. of Tech.), Youichi Takashima (NTT)
pp. 265 - 270

EMM2014-38
Integration for Web reservation data of Hotel
Yu Ichifuji, Noboru Sonehara (NII)
pp. 271 - 274

EMM2014-39
Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2)
Hiroyuki Inaba, Takuto Tamai (Kyoto Inst. of Tech.)
pp. 275 - 280

EMM2014-40
Proposal on Fast Searchable Encryption Scheme Using Bloom Filter
Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.)
pp. 281 - 286

EMM2014-41
Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption
Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.)
pp. 287 - 292

EMM2014-42
Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption
Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.)
pp. 293 - 300

EMM2014-43
Evaluating Resistance of Android Applications to Automated Repackaging
Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 301 - 307

EMM2014-44
A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis
Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications)
pp. 309 - 314

EMM2014-45
DDoS Attack Path Reconstruction in Space-Time Encoding Schemes
Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.)
pp. 315 - 319

EMM2014-46
Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell
Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 321 - 326

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan