IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 118, Number 279

Information Security

Workshop Date : 2018-11-03 - 2018-11-04 / Issue Date : 2018-10-27

[PREV] [NEXT]

[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2018-64
A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo)
pp. 1 - 6

ISEC2018-65
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.)
pp. 7 - 12

ISEC2018-66
Computationally-independent pair of one-way functions in presence of leakage
Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.)
pp. 13 - 18

ISEC2018-67
Secret sharing of color images: An algebraic approach
Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.)
pp. 19 - 24

ISEC2018-68
Prediction method of walking motion using machine learning of footsteps. -- Aiming at a tumbling down prediction system for the elderly. --
Takehiro Mori, Kimitaka Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 25 - 29

ISEC2018-69
Elderly people observation system based on the detection of untrained acoustic data.
Akihiro Ito, Sara Ozaki, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 31 - 34

ISEC2018-70
Automatic clustering using unsupervised life sound learning of elderly
Yuta Tanaka, Naoyuki Mizuno, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 35 - 38

ISEC2018-71
Explanation of ORIENT in OODA Loop by object oriented way
Yuichi Takigawa (NDA), Takeo Tatsumi (OUJ)
pp. 39 - 44

ISEC2018-72
Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP)
pp. 45 - 50

ISEC2018-73
Secure BioSemantic Computing
Hiroshi Yamaguchi (Chuo Univ.), Phillip C. Y. Sheu (UCI), Shigeo Tsujii (Chuo Univ.)
pp. 51 - 56

ISEC2018-74
Development of named entity recognition and polarity analysis function for security incidents.
Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS)
pp. 57 - 62

ISEC2018-75
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences)
pp. 63 - 68

ISEC2018-76
The Digital Devide of the Elderly and from the Elderly
Nobuyuki Yoshinaga (YPU)
pp. 69 - 72

ISEC2018-77
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo)
pp. 73 - 78

ISEC2018-78
Proposal of Anonymous Attribute Credential System that can Prove CNF Formulas includeing Negative Attribute
Ryo Okishima, Toru Nakanishi (Hiroshima Univ.)
pp. 79 - 85

ISEC2018-79
Pairing-based Zero-Knowledge Proof of Graph Information
Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.)
pp. 87 - 93

ISEC2018-80
An improvement on Winternitz OTS with puncturing of signing keys
Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.)
pp. 95 - 102

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan