IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 118, Number 280

Social Implications of Technology and Information Ethics

Workshop Date : 2018-11-03 - 2018-11-04 / Issue Date : 2018-10-27

[PREV] [NEXT]

[TOP] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2018-42
A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo)
pp. 1 - 6

SITE2018-43
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.)
pp. 7 - 12

SITE2018-44
Computationally-independent pair of one-way functions in presence of leakage
Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.)
pp. 13 - 18

SITE2018-45
Secret sharing of color images: An algebraic approach
Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.)
pp. 19 - 24

SITE2018-46
Prediction method of walking motion using machine learning of footsteps. -- Aiming at a tumbling down prediction system for the elderly. --
Takehiro Mori, Kimitaka Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 25 - 29

SITE2018-47
Elderly people observation system based on the detection of untrained acoustic data.
Akihiro Ito, Sara Ozaki, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 31 - 34

SITE2018-48
Automatic clustering using unsupervised life sound learning of elderly
Yuta Tanaka, Naoyuki Mizuno, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.)
pp. 35 - 38

SITE2018-49
Explanation of ORIENT in OODA Loop by object oriented way
Yuichi Takigawa (NDA), Takeo Tatsumi (OUJ)
pp. 39 - 44

SITE2018-50
Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP)
pp. 45 - 50

SITE2018-51
Secure BioSemantic Computing
Hiroshi Yamaguchi (Chuo Univ.), Phillip C. Y. Sheu (UCI), Shigeo Tsujii (Chuo Univ.)
pp. 51 - 56

SITE2018-52
Development of named entity recognition and polarity analysis function for security incidents.
Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS)
pp. 57 - 62

SITE2018-53
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences)
pp. 63 - 68

SITE2018-54
The Digital Devide of the Elderly and from the Elderly
Nobuyuki Yoshinaga (YPU)
pp. 69 - 72

SITE2018-55
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo)
pp. 73 - 78

SITE2018-56
Proposal of Anonymous Attribute Credential System that can Prove CNF Formulas includeing Negative Attribute
Ryo Okishima, Toru Nakanishi (Hiroshima Univ.)
pp. 79 - 85

SITE2018-57
Pairing-based Zero-Knowledge Proof of Graph Information
Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.)
pp. 87 - 93

SITE2018-58
An improvement on Winternitz OTS with puncturing of signing keys
Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.)
pp. 95 - 102

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan