Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]
SITE2018-42
A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo)
pp. 1 - 6
SITE2018-43
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.)
pp. 7 - 12
SITE2018-44
Computationally-independent pair of one-way functions in presence of leakage
Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.)
pp. 13 - 18
SITE2018-45
Secret sharing of color images: An algebraic approach
Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.)
pp. 19 - 24
SITE2018-46
Prediction method of walking motion using machine learning of footsteps.
-- Aiming at a tumbling down prediction system for the elderly. --
Takehiro Mori, Kimitaka Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 25 - 29
SITE2018-47
Elderly people observation system based on the detection of untrained acoustic data.
Akihiro Ito, Sara Ozaki, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 31 - 34
SITE2018-48
Automatic clustering using unsupervised life sound learning of elderly
Yuta Tanaka, Naoyuki Mizuno, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 35 - 38
SITE2018-49
Explanation of ORIENT in OODA Loop by object oriented way
Yuichi Takigawa (NDA), Takeo Tatsumi (OUJ)
pp. 39 - 44
SITE2018-50
Introduction of PKI Electronic Authentication for Important IoT Devices
-- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP)
pp. 45 - 50
SITE2018-51
Secure BioSemantic Computing
Hiroshi Yamaguchi (Chuo Univ.), Phillip C. Y. Sheu (UCI), Shigeo Tsujii (Chuo Univ.)
pp. 51 - 56
SITE2018-52
Development of named entity recognition and polarity analysis function for security incidents.
Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS)
pp. 57 - 62
SITE2018-53
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences)
pp. 63 - 68
SITE2018-54
The Digital Devide of the Elderly and from the Elderly
Nobuyuki Yoshinaga (YPU)
pp. 69 - 72
SITE2018-55
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo)
pp. 73 - 78
SITE2018-56
Proposal of Anonymous Attribute Credential System that can Prove CNF Formulas includeing Negative Attribute
Ryo Okishima, Toru Nakanishi (Hiroshima Univ.)
pp. 79 - 85
SITE2018-57
Pairing-based Zero-Knowledge Proof of Graph Information
Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.)
pp. 87 - 93
SITE2018-58
An improvement on Winternitz OTS with puncturing of signing keys
Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.)
pp. 95 - 102
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.