Fri, Jul 14 AM 10:15 - 11:55 |
(1) SITE |
10:15-10:40 |
Performance Analysis of Video Watermarking Using Patchwork Method on Frequency Domain ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16 |
Takaya Kimura, Hiroyuki Inaba (KIT) |
(2) SITE |
10:40-11:05 |
Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 |
Kohei Miura, Hiroyuki Inaba (KIT) |
(3) SITE |
11:05-11:30 |
the Role of trust in the privacy problems |
Takushi Otani (Kibi International Univ.) |
(4) SITE |
11:30-11:55 |
Semantic Properties of Multi-layered Logic of Agency ISEC2017-15 SITE2017-7 ICSS2017-14 EMM2017-18 |
Yuko Murakami (Tohoku Univ.) |
Fri, Jul 14 AM 10:15 - 11:30 |
(5) |
10:15-10:40 |
|
(6) |
10:40-11:05 |
|
(7) |
11:05-11:30 |
|
Fri, Jul 14 AM 10:15 - 11:05 |
(8) ICSS |
10:15-10:40 |
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments ISEC2017-16 SITE2017-8 ICSS2017-15 EMM2017-19 |
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) |
(9) ICSS |
10:40-11:05 |
Identifying bottlenecks on social implementation of advanced cryptography ISEC2017-17 SITE2017-9 ICSS2017-16 EMM2017-20 |
Hiroki Kunii, Hiroyuki Date (SECOM) |
Fri, Jul 14 PM 13:25 - 14:40 |
(10) |
13:25-13:50 |
|
(11) |
13:50-14:15 |
|
(12) |
14:15-14:40 |
|
Fri, Jul 14 PM 13:25 - 14:40 |
(13) |
13:25-13:50 |
|
(14) |
13:50-14:15 |
|
(15) |
14:15-14:40 |
|
Fri, Jul 14 PM 13:25 - 14:40 |
(16) ICSS |
13:25-13:50 |
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) |
(17) ICSS |
13:50-14:15 |
File Access Analysis of Ransomware using Dynamic Binary Instrumentation ISEC2017-19 SITE2017-11 ICSS2017-18 EMM2017-22 |
Shun Yonamine, Yuki Kadobayashi (NAIST) |
(18) ICSS |
14:15-14:40 |
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 |
|
Fri, Jul 14 PM 15:20 - 17:00 |
(19) ISEC |
15:20-15:45 |
Presentation of fundamental schemes for augmenting several public key cryptosystems ISEC2017-21 SITE2017-13 ICSS2017-20 EMM2017-24 |
Masao Kasahara (Waseda Univ.) |
(20) ISEC |
15:45-16:10 |
Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method. ISEC2017-22 SITE2017-14 ICSS2017-21 EMM2017-25 |
Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) |
(21) ISEC |
16:10-16:35 |
Report of solving SVP's by using DeepLLL ISEC2017-23 SITE2017-15 ICSS2017-22 EMM2017-26 |
Junpei Yamaguchi, Masaya Yasuda (Kyushu Univ.) |
(22) ISEC |
16:35-17:00 |
PUF based Device Authentication without Error Correction ISEC2017-24 SITE2017-16 ICSS2017-23 EMM2017-27 |
Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) |
Fri, Jul 14 PM 15:20 - 16:35 |
(23) SITE |
15:20-15:45 |
Considering Usability in the Discussions about Central Bank Issued Digital Currency ISEC2017-25 SITE2017-17 ICSS2017-24 EMM2017-28 |
Vanessa Bracamonte, Hitoshi Okada (NII) |
(24) SITE |
15:45-16:10 |
Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study
-- In the case to see latent texts as random variables -- ISEC2017-26 SITE2017-18 ICSS2017-25 EMM2017-29 |
Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) |
(25) SITE |
16:10-16:35 |
Secrecy Law and Information Processing ISEC2017-27 SITE2017-19 ICSS2017-26 EMM2017-30 |
Makoto Koike (Micro Patent) |
Fri, Jul 14 PM 15:20 - 17:00 |
(26) |
15:20-15:45 |
|
(27) |
15:45-16:10 |
|
(28) |
16:10-16:35 |
|
(29) |
16:35-17:00 |
|
Sat, Jul 15 AM 10:15 - 11:30 |
(30) |
10:15-10:40 |
|
(31) |
10:40-11:05 |
|
(32) |
11:05-11:30 |
|
Sat, Jul 15 AM 10:15 - 11:55 |
(33) SITE |
10:15-10:40 |
A Study on Copyright Education Required in School Education ISEC2017-28 SITE2017-20 ICSS2017-27 EMM2017-31 |
Takahiro Haga (GSGU), Junko Azuma, Yoko Usui (Schwan), Takusi Otani (KIU), Haruki Ono (NU), Tsugumasa Suzuki (Keio Yochisya), Hiroyuki Takase (Wanagawa JHS), Hatsue Tsukamoto (ICT Kobo), Sinpei Toyofuku (GLOCOM), Yasuhiro Nakada (FSI), Takuro Nisio (Sakuradai), Ryuichi Morimune (Shirayuri JSHS), Yoshikazu Miwa (Gakusyu Kaihatsu), Sakiko Kudo (Bunri), Koki Watanabe (Ochanomizu JHS) |
(34) SITE |
10:40-11:05 |
Development of IT Enabled Services
-- For Regional Vitalization -- ISEC2017-29 SITE2017-21 ICSS2017-28 EMM2017-32 |
Shiro Uesugi (Mstsuyama J.C.) |
(35) SITE |
11:05-11:30 |
Theoretical Consideration on Innovation Dissemination of Wide Area Brands
-- Microeconomic Aspects -- ISEC2017-30 SITE2017-22 ICSS2017-29 EMM2017-33 |
Masahiro Morita (Matsuyama Univ.) |
(36) SITE |
11:30-11:55 |
Consideration on Innovation Dissemination of "Wide Area Brands" Using Multi-Agent Simulation ISEC2017-31 SITE2017-23 ICSS2017-30 EMM2017-34 |
Masahiro Morita (Matsuyama Univ.) |
Sat, Jul 15 AM 10:15 - 11:30 |
(37) |
10:15-10:40 |
|
(38) |
10:40-11:05 |
|
(39) |
11:05-11:30 |
|
Sat, Jul 15 PM EMM 1 (Room A) Chair: Hirohisa HIOKI (Kyoto Univ.) 13:25 - 14:40 |
(40) EMM |
13:25-13:50 |
Investigation of spikegram-based signal representation for speech fingerprints ISEC2017-32 SITE2017-24 ICSS2017-31 EMM2017-35 |
Dung Kim Tran, Masashi Unoki (JAIST) |
(41) EMM |
13:50-14:15 |
Study of template matching application of steganography ANGO ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36 |
Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) |
(42) EMM |
14:15-14:40 |
A Data Embedding for NGS Data ISEC2017-34 SITE2017-26 ICSS2017-33 EMM2017-37 |
Motoshige Takagi (SST) |
Sat, Jul 15 PM 13:25 - 15:05 |
(43) ISEC |
13:25-13:50 |
Proposal of Personal Authentication Method by Visual Secret Scheme Using Smart Phone ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38 |
Ryo Mizuno, Hiroyuki Inaba (KIT) |
(44) ISEC |
13:50-14:15 |
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 |
Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
(45) ISEC |
14:15-14:40 |
Zynq-based Coprocessor Development Environment for Cryptography with Advanced Functionality and Its Evaluation ISEC2017-37 SITE2017-29 ICSS2017-36 EMM2017-40 |
Takanori Miyoshi, Tsutomu Matsumoto (YNU) |
(46) ISEC |
14:40-15:05 |
Proof Of Retrievability for Lightweight Secure Cloud Storage ISEC2017-38 SITE2017-30 ICSS2017-37 EMM2017-41 |
Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba) |
Sat, Jul 15 PM 13:25 - 14:40 |
(47) |
13:25-13:50 |
|
(48) |
13:50-14:15 |
|
(49) |
14:15-14:40 |
|
Contact Address and Latest Schedule Information |
ISEC |
Technical Committee on Information Security (ISEC) [Latest Schedule]
|
Contact Address |
Takaaki Mizuki (Tohoku University)
E-: ic-c (to ISEC secretaries) |
SITE |
Technical Committee on Social Implications of Technology and Information Ethics (SITE) [Latest Schedule]
|
Contact Address |
|
ICSS |
Technical Committee on Information and Communication System Security (ICSS) [Latest Schedule]
|
Contact Address |
Yutaka Miyake (KDDI R&D Laboratories, Inc.)
TEL: +81-49-278-7367, FAX: +81-49-278-7510
E-: is-qst |
Announcement |
Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html |
EMM |
Technical Committee on Enriched MultiMedia (EMM) [Latest Schedule]
|
Contact Address |
|
IPSJ-CSEC |
Special Interest Group on Computer Security (IPSJ-CSEC) [Latest Schedule]
|
Contact Address |
|
IPSJ-SPT |
Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [Latest Schedule]
|
Contact Address |
|