IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 115, Number 293

Information Security

Workshop Date : 2015-11-06 - 2015-11-07 / Issue Date : 2015-10-30

[PREV] [NEXT]

[TOP] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2015-36
Self Information Control as Identity Management -- Practical Problems of "Identity" leading to Information Ethics --
Akiyoshi Kabeya (Chiba Univ.)
pp. 1 - 6

ISEC2015-37
An approach to assess the risk of information leakage by inference -- A pilot study of methods using a breadth first search in digraphs and mutual information --
Kazuhiro Suzuki, Shohei Kitamura, Noriki Hirai (Kochi Univ.)
pp. 7 - 10

ISEC2015-38
A Pruning Method for the Decision Tree constructed on Run-Based Trie.
Takashi Harada, Ken Tanaka (Kanagawa Univ.), Kenji Mikawa (Niigata Univ.)
pp. 11 - 17

ISEC2015-39
[Invited Talk] Design of Learning e-Portfolio System Based on User-centered design
Rieko Inaba (Tsuda Coll.), Norimichi Kobayashi, Miho Mohri, Yasunori Motomoura (Kansai Univ.)
pp. 19 - 24

ISEC2015-40
[Invited Talk] Effective Utilization of Mobile Communication Technology for Life-Saving -- State Emergency Wireless System --
Noriyoshi Sonetaka (ICPS)
pp. 25 - 32

ISEC2015-41
The Problems of "Consent" in the Big Data Context
Takushi Otani (Kibi International Univ.)
pp. 33 - 39

ISEC2015-42
Social media guidelines for international students
Daisuke Suzuki (Hokuriku Univ.)
pp. 41 - 45

ISEC2015-43
Input UI Specification Recovery using Web Operation Monitoring
Daisuke Tashiro, Katsuro Kikuchi, Ryota Mibe (Hitachi)
pp. 47 - 52

ISEC2015-44
Proposal and Prototyping of a TV Content Providing System using Geolocation
Chigusa Yamamura, Hisayuki Ohmata, Michihiro Uehara (NHK)
pp. 53 - 58

ISEC2015-45
The threshold value design of recognition score considering the prior probability in a quiz speech recognition system
Hiroyuki Nishi, Kimurra Yoshimasa, Kakinoki Toshio (Sojo Univ.)
pp. 59 - 65

ISEC2015-46
A Feasibility Study of Autonomous Security Infrastructure in the Internet
Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU)
pp. 67 - 74

ISEC2015-47
Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ)
pp. 75 - 80

ISEC2015-48
Postpaid electronic money to keep privacy and its implementation
Tatshuhiko Sukegawa, Mashu Sakai, Hikaru Morita (Kanagawa Univ.)
pp. 81 - 86

ISEC2015-49
An Additionable Type ToDo List which Can Support Daily Activities
Noriaki Saito (NTT)
pp. 87 - 92

ISEC2015-50
Evaluation of the Web System U-MOS for Supporting University Management Operation
Satoshi Taoka (Hiroshima Univ.)
pp. 93 - 97

ISEC2015-51
Encryption and decryption system of composite cellular automata
Toshikazu Ishida (KSU)
pp. 99 - 102

ISEC2015-52
Extension of NTRU Using Group Ring and Its Application
Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.)
pp. 103 - 109

ISEC2015-53
A dynamic filtering method to reduce DDoS packets by using access tokens
Ryota Suzuki, Hikaru Morita (Kanagawa Univ.)
pp. 111 - 116

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan