Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
Performance Analysis of Video Watermarking Using Patchwork Method on Frequency Domain Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16 |
Video watermarking using patchwork method is proposed as one of the video watermarking. This method can defend embedded ... [more] |
ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16 pp.1-4 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:40 |
Tokyo |
|
Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain Kohei Miura, Hiroyuki Inaba (KIT) ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 |
We have proposed a digital contents circulation system on Blockchain. The system can protect user’s privacy from both co... [more] |
ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 pp.5-8 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 11:05 |
Tokyo |
|
the Role of trust in the privacy problems Takushi Otani (Kibi International Univ.) |
[more] |
|
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 11:30 |
Tokyo |
|
Semantic Properties of Multi-layered Logic of Agency Yuko Murakami (Tohoku Univ.) ISEC2017-15 SITE2017-7 ICSS2017-14 EMM2017-18 |
[more] |
ISEC2017-15 SITE2017-7 ICSS2017-14 EMM2017-18 pp.9-10 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
In recent years, web-based cyber attacks, which exploit web browsers and compromise computers, are prevailing. In many c... [more] |
ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 pp.33-38 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:40 |
Tokyo |
|
Identifying bottlenecks on social implementation of advanced cryptography Hiroki Kunii, Hiroyuki Date (SECOM) ISEC2017-17 SITE2017-9 ICSS2017-16 EMM2017-20 |
Advanced cryptography is expected as next-generation cryptosystems and has been investigated by many researchers. In thi... [more] |
ISEC2017-17 SITE2017-9 ICSS2017-16 EMM2017-20 pp.39-44 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
|
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:50 |
Tokyo |
|
File Access Analysis of Ransomware using Dynamic Binary Instrumentation Shun Yonamine, Yuki Kadobayashi (NAIST) ISEC2017-19 SITE2017-11 ICSS2017-18 EMM2017-22 |
Malware are one of the biggest threats on the Internet as they can illegally browse, manipulate or delete user's persona... [more] |
ISEC2017-19 SITE2017-11 ICSS2017-18 EMM2017-22 pp.87-92 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 14:15 |
Tokyo |
|
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 |
[more] |
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 pp.93-98 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:20 |
Tokyo |
|
Presentation of fundamental schemes for augmenting several public key cryptosystems Masao Kasahara (Waseda Univ.) ISEC2017-21 SITE2017-13 ICSS2017-20 EMM2017-24 |
[more] |
ISEC2017-21 SITE2017-13 ICSS2017-20 EMM2017-24 pp.99-106 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:45 |
Tokyo |
|
Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method. Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25 |
In side channel attacks, the secret keys are obtained from physical data in the implementation of the cryptosystem. For ... [more] |
ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25 pp.107-114 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 16:10 |
Tokyo |
|
Report of solving SVP's by using DeepLLL Junpei Yamaguchi, Masaya Yasuda (Kyushu Univ.) ISEC2017-23 SITE2017-15 ICSS2017-22 EMM2017-26 |
Lattice-based cryptography is based on the computational herdbess of lattice problems such as Shortest vector problem (S... [more] |
ISEC2017-23 SITE2017-15 ICSS2017-22 EMM2017-26 pp.115-122 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 16:35 |
Tokyo |
|
PUF based Device Authentication without Error Correction Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 |
[more] |
ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 pp.123-130 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:20 |
Tokyo |
|
Considering Usability in the Discussions about Central Bank Issued Digital Currency Vanessa Bracamonte, Hitoshi Okada (NII) ISEC2017-25 SITE2017-17 ICSS2017-24 EMM2017-28 |
The use of blockchain technology has the potential to achieve virtual currency with characteristics similar to cash, suc... [more] |
ISEC2017-25 SITE2017-17 ICSS2017-24 EMM2017-28 pp.131-133 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 15:45 |
Tokyo |
|
Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study
-- In the case to see latent texts as random variables -- Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 |
This paper is linked to the theme of database creation of "HIMOJI data" which has been studied at Kanagawa University. H... [more] |
ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 pp.135-140 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 16:10 |
Tokyo |
|
Secrecy Law and Information Processing Makoto Koike (Micro Patent) ISEC2017-27 SITE2017-19 ICSS2017-26 EMM2017-30 |
Intelligence agency collects, process and utilize information, and information processor for the intelligence agency may... [more] |
ISEC2017-27 SITE2017-19 ICSS2017-26 EMM2017-30 pp.141-147 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 10:15 |
Tokyo |
|
A Study on Copyright Education Required in School Education Takahiro Haga (GSGU), Junko Azuma, Yoko Usui (Schwan), Takusi Otani (KIU), Haruki Ono (NU), Tsugumasa Suzuki (Keio Yochisya), Hiroyuki Takase (Wanagawa JHS), Hatsue Tsukamoto (ICT Kobo), Sinpei Toyofuku (GLOCOM), Yasuhiro Nakada (FSI), Takuro Nisio (Sakuradai), Ryuichi Morimune (Shirayuri JSHS), Yoshikazu Miwa (Gakusyu Kaihatsu), Sakiko Kudo (Bunri), Koki Watanabe (Ochanomizu JHS) ISEC2017-28 SITE2017-20 ICSS2017-27 EMM2017-31 |
The situation surrounding copyright these days is in the midst of tremendous change. Ensuring that legislation and licen... [more] |
ISEC2017-28 SITE2017-20 ICSS2017-27 EMM2017-31 pp.205-210 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 10:40 |
Tokyo |
|
Development of IT Enabled Services
-- For Regional Vitalization -- Shiro Uesugi (Mstsuyama J.C.) ISEC2017-29 SITE2017-21 ICSS2017-28 EMM2017-32 |
IT Enabled Services are revisited in consideration with the relationship with regional vitalization. Today's popular te... [more] |
ISEC2017-29 SITE2017-21 ICSS2017-28 EMM2017-32 pp.211-214 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 11:05 |
Tokyo |
|
Theoretical Consideration on Innovation Dissemination of Wide Area Brands
-- Microeconomic Aspects -- Masahiro Morita (Matsuyama Univ.) ISEC2017-30 SITE2017-22 ICSS2017-29 EMM2017-33 |
"Regional revitalization" is considered as one of the most important tasks of Japan. Consequently, "Regional brands" ini... [more] |
ISEC2017-30 SITE2017-22 ICSS2017-29 EMM2017-33 pp.215-218 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 11:30 |
Tokyo |
|
Consideration on Innovation Dissemination of "Wide Area Brands" Using Multi-Agent Simulation Masahiro Morita (Matsuyama Univ.) ISEC2017-31 SITE2017-23 ICSS2017-30 EMM2017-34 |
The previous study developed and presented a theoretical model of diffusion of innovation in the context of promoting "W... [more] |
ISEC2017-31 SITE2017-23 ICSS2017-30 EMM2017-34 pp.219-222 |