Mon, Jun 21 PM 13:00 - 13:05 |
|
13:00-13:05 |
Break ( 5 min. ) |
Mon, Jun 21 PM 13:05 - 14:30 |
(1) |
13:05-13:30 |
Post-Quantum Commitment Scheme with Extending Message Length |
Hideaki Miyaji (OU), Yuntao Wang (JAIST), Atsuko Miyaji (OU) |
(2) |
13:30-13:55 |
secure isogeny-based cryptosystem CSIDH for side-channel attacks |
Hayato Arai, Atusko Miyaji (Osaka Univ.) |
(3) |
13:55-14:20 |
An initial evaluation between C language and PRSafe for developing eBPF programs |
Mahadevan Sai Veerya, Takano Yuuki, Miyaji Atsuko (Handai) |
|
14:20-14:30 |
Break ( 10 min. ) |
Mon, Jun 21 PM 14:30 - 15:25 |
(4) |
14:30-14:55 |
Development and evaluation of growth estimation sensing system for aquaponics using multiple types of depth cameras |
Ryota Murakami, Hiroshi Yamamoto (Ritsumeikan Univ.) |
(5) |
14:55-15:20 |
Development and evaluation of fatigue level estimation system using spatio-temporal analysis of Web camera images |
Takuro Nonomura (Ritsumei Univ.), Takashi Hayakawa (NEC Solution Innovators, Ltd.), Hiroshi Yamamoto (Ritsumei Univ.) |
|
15:20-15:25 |
Break ( 5 min. ) |
Mon, Jun 21 PM 15:25 - 16:25 |
(6) |
15:25-15:50 |
Development and evaluation of condition detection system of harmful animals by interlocking a doppler sensor and a thermal camera |
Uchiyama Keigo, Yamamoto Hiroshi (Ritsumeikan Univ.), Utsunomiya Eiji, Yoshihara Kiyohito (KDDI Research) |
(7) |
15:50-16:15 |
Verification of Applying Plumtree Algorithm to Blockchain Networks |
Yusuke Kitagawa (Kogakuin Univ.), Kazuyuki Shudo (Tokyo Tech), Osamu Mizuno, Ryohei Banno (Kogakuin Univ.) |
|
16:15-16:25 |
Break ( 10 min. ) |
Mon, Jun 21 PM 16:25 - 17:30 |
(8) |
16:25-17:10 |
[Invited Talk]
An Authentication Scheme for WLAN Physical Layer |
Miyuki Hirose (KIT) |
|
17:10-17:20 |
( 10 min. ) |
|
17:20-17:30 |
( 10 min. ) |
Tue, Jun 22 AM 09:00 - 10:25 |
(9) |
09:00-09:25 |
Feature analysis of phishing website and phishing detection based on machine learning algorithms |
Yi Wei, Yuji Sekiya (Todai) |
(10) |
09:25-09:50 |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal |
Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) |
(11) |
09:50-10:15 |
Etherpot: A honeypot for observing cyberattacks on Ethereum client |
Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) |
|
10:15-10:25 |
Break ( 10 min. ) |
Tue, Jun 22 AM 10:25 - 11:40 |
(12) |
10:25-10:50 |
Performance Evaluation of MPTCP Scheduler for Video Streaming in Mobile Networks |
Masayoshi Kondo, Dirceu Cavendish, Daiki Nobayashi, Takeshi Ikenaga (KIT) |
(13) |
10:50-11:15 |
Simulation Evaluation of Incentives for RPKI Deployment |
Tatsuya Oryu, Ishibashi Keisuke (ICU) |
(14) |
11:15-11:40 |
A Solution for Recovering Missing Links in Network Topology using Sparse Modeling |
Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) |
Tue, Jun 22 AM 11:40 - 12:00 |
|
11:40-11:50 |
( 10 min. ) |
|
11:50-12:00 |
( 10 min. ) |