Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS |
2013-11-28 13:30 |
Miyagi |
Tohoku Univ. |
A Proposal of Method for Access Logs on Medical Information System Tsuneko Kura, Yoshihiro Yoshida, Asami Miyajima, Junko Hashimoto, Kazuo Morimura, Yuji Maeda (NTT) ISEC2013-59 LOIS2013-25 |
It is considered that medical information is personal information. There is an idea that a medical institution should sh... [more] |
ISEC2013-59 LOIS2013-25 pp.1-8 |
ISEC, LOIS |
2013-11-28 13:55 |
Miyagi |
Tohoku Univ. |
Classifying Questions of Product Accidents in Help desk Questions
-- Using Semantic Orientations of Words and Judicial Precedents of Product Liability law -- Koji Wajima (AIIT), Tomomi Ogawa, Toshihiro Furukawa (TUS) ISEC2013-60 LOIS2013-26 |
This paper proposes the methods which classify the kind of questions relative to product accidents as negativedocuments.... [more] |
ISEC2013-60 LOIS2013-26 pp.9-14 |
ISEC, LOIS |
2013-11-28 14:20 |
Miyagi |
Tohoku Univ. |
Support of Recording Food Intake using Eating Behavior Estimation and Advice from a Social Robot for Self-Monitoring Keisuke Ishiguro, Masayuki Kanbara (NAIST), Norihiro Hagita (NAIST/ATR) ISEC2013-61 LOIS2013-27 |
Self-monitoring that records and evaluates user's behavior is well known as behavior improvement voluntary for fine heal... [more] |
ISEC2013-61 LOIS2013-27 pp.15-20 |
ISEC, LOIS |
2013-11-28 15:00 |
Miyagi |
Tohoku Univ. |
A Note on Attacks against Card-Based Cryptographic Protocols Takaaki Mizuki, Hiroki Shizuya (Tohoku Univ.) ISEC2013-62 LOIS2013-28 |
It has been known that Secure Multi-Party Computations can be conducted using a number of black and red physical cards (... [more] |
ISEC2013-62 LOIS2013-28 pp.21-28 |
ISEC, LOIS |
2013-11-28 15:25 |
Miyagi |
Tohoku Univ. |
Efficient Multi-Party Private Set Intersection Protocol Tomoaki Mimoto, Atsuko Miyaji (JAIST) ISEC2013-63 LOIS2013-29 |
Private Set Intersection Protocol(PSI) is a protocol by which two or more players with each data sets can compute some i... [more] |
ISEC2013-63 LOIS2013-29 pp.29-34 |
ISEC, LOIS |
2013-11-28 16:05 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
On the Privacy Issues in Lifelog and Privacy-Preserving Data Mining Hiroaki Kikuchi (Meiji Univ.) ISEC2013-64 LOIS2013-30 |
[more] |
ISEC2013-64 LOIS2013-30 pp.35-38 |
ISEC, LOIS |
2013-11-29 10:30 |
Miyagi |
Tohoku Univ. |
A Proposal of Multi-screen System focused on Findability Toru Kobayashi (Nagasaki Univ.) ISEC2013-65 LOIS2013-31 |
[more] |
ISEC2013-65 LOIS2013-31 pp.39-44 |
ISEC, LOIS |
2013-11-29 10:55 |
Miyagi |
Tohoku Univ. |
on evaluation for estimating link loss rates by using network coding Youji Fukuta (Aichi Univ. of Education), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.) ISEC2013-66 LOIS2013-32 |
Monitoring or inference of internal network characteristics, such as transmission topology, link losses and delay, from ... [more] |
ISEC2013-66 LOIS2013-32 pp.45-50 |
ISEC, LOIS |
2013-11-29 11:20 |
Miyagi |
Tohoku Univ. |
A Framework for Personal Sensor Box in Mobile Environmental Sensing Akihiro Okushi, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) ISEC2013-67 LOIS2013-33 |
[more] |
ISEC2013-67 LOIS2013-33 pp.51-56 |
ISEC, LOIS |
2013-11-29 13:05 |
Miyagi |
Tohoku Univ. |
A Lossy Identification Scheme from the Subgroup Decision Shingo Hasegawa, Shuji Isobe (Tohoku Univ.) ISEC2013-68 LOIS2013-34 |
Lossy identification schemes are used to construct tightly secure signature schemes via the Fiat-Shamir heuristic in the... [more] |
ISEC2013-68 LOIS2013-34 pp.57-63 |
ISEC, LOIS |
2013-11-29 13:30 |
Miyagi |
Tohoku Univ. |
The proposal on a vulnerability evaluation method according to information system environment Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35 |
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] |
ISEC2013-69 LOIS2013-35 pp.65-70 |
ISEC, LOIS |
2013-11-29 14:10 |
Miyagi |
Tohoku Univ. |
Implementing Execution Platform for Managing Context-Aware Services Based on Heterogeneous and Distributed Web Services Hiroki Takatsuka, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) ISEC2013-70 LOIS2013-36 |
With the spread of Machine-to-Machine (M2M) and cloud services, we have become to be able to use heterogeneous and distr... [more] |
ISEC2013-70 LOIS2013-36 pp.71-76 |
ISEC, LOIS |
2013-11-29 14:35 |
Miyagi |
Tohoku Univ. |
Studying Context-Aware Services Using House Log in Home Network System Yuichi Watanabe, Tetsuya Masuda, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) ISEC2013-71 LOIS2013-37 |
In order to develop context-aware services which provide automated appliance operation and operation recommendation by u... [more] |
ISEC2013-71 LOIS2013-37 pp.77-82 |
ISEC, LOIS |
2013-11-29 15:00 |
Miyagi |
Tohoku Univ. |
Service Framework for Virtual Agents in Home Network System Hiroyasu Horiuchi, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) ISEC2013-72 LOIS2013-38 |
The home network system (HNS), which provides value added services by connecting networked home appliances, equipments a... [more] |
ISEC2013-72 LOIS2013-38 pp.83-88 |