Sat, Nov 3 AM 11:00 - 13:00 |
(1) |
11:00-11:30 |
A Statistical Method for Searching Biases of Stream Ciphers |
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) |
(2) |
11:30-12:00 |
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network |
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) |
(3) |
12:00-12:30 |
Computationally-independent pair of one-way functions in presence of leakage |
Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.) |
(4) |
12:30-13:00 |
Secret sharing of color images: An algebraic approach |
Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.) |
|
13:00-14:00 |
Break ( 60 min. ) |
Sat, Nov 3 PM 14:00 - 16:00 |
(5) |
14:00-14:30 |
Prediction method of walking motion using machine learning of footsteps.
-- Aiming at a tumbling down prediction system for the elderly. -- |
Takehiro Mori, Kimitaka Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) |
(6) |
14:30-15:00 |
Elderly people observation system based on the detection of untrained acoustic data. |
Akihiro Ito, Sara Ozaki, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) |
(7) |
15:00-15:30 |
Automatic clustering using unsupervised life sound learning of elderly |
Yuta Tanaka, Naoyuki Mizuno, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) |
(8) |
15:30-16:00 |
Explanation of ORIENT in OODA Loop by object oriented way |
Yuichi Takigawa (NDA), Takeo Tatsumi (OUJ) |
|
16:00-16:10 |
Break ( 10 min. ) |
Sat, Nov 3 PM 16:10 - 17:10 |
(9) |
16:10-17:10 |
|
Sun, Nov 4 AM 10:00 - 12:00 |
(10) |
10:00-10:30 |
Introduction of PKI Electronic Authentication for Important IoT Devices
-- For Establishment of Secure IoT Platform -- |
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) |
(11) |
10:30-11:00 |
Secure BioSemantic Computing |
Hiroshi Yamaguchi (Chuo Univ.), Phillip C. Y. Sheu (UCI), Shigeo Tsujii (Chuo Univ.) |
(12) |
11:00-11:30 |
Development of named entity recognition and polarity analysis function for security incidents. |
Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS) |
(13) |
11:30-12:00 |
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree |
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) |
|
12:00-13:00 |
Break ( 60 min. ) |
Sun, Nov 4 PM 13:00 - 14:00 |
(14) |
13:00-13:30 |
The Digital Devide of the Elderly and from the Elderly |
Nobuyuki Yoshinaga (YPU) |
(15) |
13:30-14:00 |
Winny incident as a social experiment
-- Look back it as a case of internet research problem -- |
Takushi Otani (Kibi International Univ.) |
|
14:00-14:10 |
Break ( 10 min. ) |
Sun, Nov 4 PM 14:10 - 16:10 |
(16) |
14:10-14:40 |
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme |
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) |
(17) |
14:40-15:10 |
Proposal of Anonymous Attribute Credential System that can Prove CNF Formulas includeing Negative Attribute |
Ryo Okishima, Toru Nakanishi (Hiroshima Univ.) |
(18) |
15:10-15:40 |
Pairing-based Zero-Knowledge Proof of Graph Information |
Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) |
(19) |
15:40-16:10 |
An improvement on Winternitz OTS with puncturing of signing keys |
Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) |