IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 117, Number 286

Social Implications of Technology and Information Ethics

Workshop Date : 2017-11-09 - 2017-11-10 / Issue Date : 2017-11-02

[PREV] [NEXT]

[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2017-31
A proposal of precut vegetable search algorithm for homemade cooking
Risa Matsuoka, Yukiko Matsushima (NIT, Tsuyama Col.)
pp. 1 - 5

SITE2017-32
Consciousness Investigation of Passwords Management in University Students -- Questionnaire Design based on Friend Relationships --
Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ)
pp. 7 - 12

SITE2017-33
User Authentication Keeping Method Using Watch Type Devices -- Case of Acceleration Sensors --
Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.)
pp. 13 - 18

SITE2017-34
Application of ISO/IEC 29100:2011 to the evaluation criteria of privacy impact assessment
Ryotaro Nakata, Sanggyu Shin, Yoichi Seto (AIIT)
pp. 19 - 26

SITE2017-35
Verifing Individualities of Usage History in Digital Flyers Application
Soki Nishiyama, Hiroya Susuki, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi (UTokyo)
pp. 27 - 32

SITE2017-36
Attempt to apply 3-Aufheben/MELT-UP for social issues "Realization of Safe and Secure E-mail Exchange Framework"
Toshiaki Saisho, Shigeo Tshujii (Research and Development Initiative, Chuo University)
pp. 33 - 40

SITE2017-37
(See Japanese page.)
pp. 41 - 44

SITE2017-38
A Consideration on Information Legal Policy in Japan from the Digital Single Market Strategy in EU -- Based on Mid-Term review of DSM --
Naonori Kato, Yosuke Murakami (KDDI Research)
pp. 45 - 50

SITE2017-39
Why Do We Need the Ethical Guideline for Internet Research? -- The Development of Internet Research Ethics and Its Introduction to Japan --
Takushi Otani (Kibi International Univ.), Reina Saijo (Hokkaido Univ.), Akinori Kubo (Hitotsuabshi Univ.), Hirotaka Osawa (Tsukuba Univ.), Arisa Ema (Tokyo Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Hiromitsu Hattori (Ritsumeikan Univ.), Ryutaro Ichise (NII), Naonori Akiya (Yamaguchi Univ.), Kazunori Komatani (Osaka Univ.), Miyano Naoki (Kyoto Univ.)
pp. 51 - 55

SITE2017-40
Construction of code based PKC based on binary cyclic code realizing coding rate of exactly 1.0 -- Along with revised K(V)PKC --
Masao Kasahara (Waseda Univ.)
pp. 57 - 62

SITE2017-41
Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation
Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC)
pp. 63 - 70

SITE2017-42
HIBE based on Universal Sampler
Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.)
pp. 71 - 77

SITE2017-43
Prediction method of tumble using machine learning of footsteps.
Takehiro Mori, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 79 - 82

SITE2017-44
Elderly people observation system based on the detection of untrained acoustic data
Akihiro Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 83 - 86

SITE2017-45
Estimation of Office Worker Seated-State with Ambient Sensors
Daisuke Ikeda, Yukihiro Tsuboshita, Takeshi Onishi (Fuji Xerox)
pp. 87 - 91

SITE2017-46
Consideration for Estimation of Accommodation State from Web big data with Deep Learning
Noriaki Koide (ROIS)
pp. 93 - 94

SITE2017-47
A study on Information -- Tribute to Shannon and Dretski --
Ichiro Mizukoshi (IISEC/NTT East)
pp. 95 - 98

SITE2017-48
Considering Privacy issue -- based on Floridi's Philosophy of Information --
Hiroyuki Kinoshita (IISEC)
pp. 99 - 102

SITE2017-49
Implementation Planning of Penetration Testing Exercises for Raising Cybersecurity Awareness
Daisuke Suzuki (Hokuriku Univ.)
pp. 103 - 106

SITE2017-50
Accelerating Revocable Group Signature with Compact Revocation List Using Vector Commitments
Yasuyuki Seita, Shahidatul Sadiah, Toru Nakanishi (Hiroshima Univ.)
pp. 107 - 113

SITE2017-51
Lattice Attacks on Elliptic Curve Diffie-Hellman key exchange
Sota Onozawa (The Univ. of Tokyo), Atsushi Takayasu (The Univ. of Tokyo/AIST), Noboru Kunihiro (The Univ. of Tokyo)
pp. 115 - 122

SITE2017-52
An Implementation of Mutual Authentication Using Attribute-based Encryption for IoT
Yusuke Tsubaki, Toru Nakanishi (Hiroshima Univ.)
pp. 123 - 128

SITE2017-53
Revocable Hierarchical Identity-Based Encryption based on LWE Assumption
Atsushi Takayasu, Shuichi Katsumata (Univ. Tokyo), Takahiro Matsuda (AIST)
pp. 129 - 136

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan