IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 117, Number 126

Social Implications of Technology and Information Ethics

Workshop Date : 2017-07-14 - 2017-07-15 / Issue Date : 2017-07-07

[PREV] [NEXT]

[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2017-5
Performance Analysis of Video Watermarking Using Patchwork Method on Frequency Domain
Takaya Kimura, Hiroyuki Inaba (KIT)
pp. 1 - 4

SITE2017-6
Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain
Kohei Miura, Hiroyuki Inaba (KIT)
pp. 5 - 8

SITE2017-7
Semantic Properties of Multi-layered Logic of Agency
Yuko Murakami (Tohoku Univ.)
pp. 9 - 10

SITE2017-8
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research)
pp. 33 - 38

SITE2017-9
Identifying bottlenecks on social implementation of advanced cryptography
Hiroki Kunii, Hiroyuki Date (SECOM)
pp. 39 - 44

SITE2017-10
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.)
pp. 81 - 86

SITE2017-11
File Access Analysis of Ransomware using Dynamic Binary Instrumentation
Shun Yonamine, Yuki Kadobayashi (NAIST)
pp. 87 - 92

SITE2017-12
(See Japanese page.)
pp. 93 - 98

SITE2017-13
Presentation of fundamental schemes for augmenting several public key cryptosystems
Masao Kasahara (Waseda Univ.)
pp. 99 - 106

SITE2017-14
Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method.
Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo)
pp. 107 - 114

SITE2017-15
Report of solving SVP's by using DeepLLL
Junpei Yamaguchi, Masaya Yasuda (Kyushu Univ.)
pp. 115 - 122

SITE2017-16
PUF based Device Authentication without Error Correction
Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 123 - 130

SITE2017-17
Considering Usability in the Discussions about Central Bank Issued Digital Currency
Vanessa Bracamonte, Hitoshi Okada (NII)
pp. 131 - 133

SITE2017-18
Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study -- In the case to see latent texts as random variables --
Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.)
pp. 135 - 140

SITE2017-19
Secrecy Law and Information Processing
Makoto Koike (Micro Patent)
pp. 141 - 147

SITE2017-20
A Study on Copyright Education Required in School Education
Takahiro Haga (GSGU), Junko Azuma, Yoko Usui (Schwan), Takusi Otani (KIU), Haruki Ono (NU), Tsugumasa Suzuki (Keio Yochisya), Hiroyuki Takase (Wanagawa JHS), Hatsue Tsukamoto (ICT Kobo), Sinpei Toyofuku (GLOCOM), Yasuhiro Nakada (FSI), Takuro Nisio (Sakuradai), Ryuichi Morimune (Shirayuri JSHS), Yoshikazu Miwa (Gakusyu Kaihatsu), Sakiko Kudo (Bunri), Koki Watanabe (Ochanomizu JHS)
pp. 205 - 210

SITE2017-21
Development of IT Enabled Services -- For Regional Vitalization --
Shiro Uesugi (Mstsuyama J.C.)
pp. 211 - 214

SITE2017-22
Theoretical Consideration on Innovation Dissemination of Wide Area Brands -- Microeconomic Aspects --
Masahiro Morita (Matsuyama Univ.)
pp. 215 - 218

SITE2017-23
Consideration on Innovation Dissemination of "Wide Area Brands" Using Multi-Agent Simulation
Masahiro Morita (Matsuyama Univ.)
pp. 219 - 222

SITE2017-24
Investigation of spikegram-based signal representation for speech fingerprints
Dung Kim Tran, Masashi Unoki (JAIST)
pp. 241 - 246

SITE2017-25
Study of template matching application of steganography ANGO
Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.)
pp. 247 - 252

SITE2017-26
A Data Embedding for NGS Data
Motoshige Takagi (SST)
pp. 253 - 258

SITE2017-27
Proposal of Personal Authentication Method by Visual Secret Scheme Using Smart Phone
Ryo Mizuno, Hiroyuki Inaba (KIT)
pp. 259 - 266

SITE2017-28
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation
Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)
pp. 267 - 274

SITE2017-29
Zynq-based Coprocessor Development Environment for Cryptography with Advanced Functionality and Its Evaluation
Takanori Miyoshi, Tsutomu Matsumoto (YNU)
pp. 275 - 280

SITE2017-30
Proof Of Retrievability for Lightweight Secure Cloud Storage
Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba)
pp. 281 - 288

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan