Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, LOIS, SITE |
2014-11-21 13:25 |
Hyogo |
|
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26 |
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] |
ISEC2014-56 SITE2014-47 LOIS2014-26 pp.1-6 |
ISEC, LOIS, SITE |
2014-11-21 13:50 |
Hyogo |
|
Extension of NTRU scheme using non-commutative groups II Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-57 SITE2014-48 LOIS2014-27 |
[more] |
ISEC2014-57 SITE2014-48 LOIS2014-27 pp.7-11 |
ISEC, LOIS, SITE |
2014-11-21 14:15 |
Hyogo |
|
Card-based Generation of Random Permutations without Fixed Points Rie Ishikawa, Eikoh Chida (NIT, Ichinoseki Colleage), Takaaki Mizuki (Tohoku Univ.) ISEC2014-58 SITE2014-49 LOIS2014-28 |
Consider a scenario where there are $n$ players who want to exchange gifts.
That is, we want to generate a random permu... [more] |
ISEC2014-58 SITE2014-49 LOIS2014-28 pp.13-18 |
ISEC, LOIS, SITE |
2014-11-21 14:40 |
Hyogo |
|
Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) ISEC2014-59 SITE2014-50 LOIS2014-29 |
One of the most powerful attacks to elliptic curve and hyperelliptic based cryptosystems defined over an extension of a ... [more] |
ISEC2014-59 SITE2014-50 LOIS2014-29 pp.19-26 |
ISEC, LOIS, SITE |
2014-11-21 15:20 |
Hyogo |
|
estimating situations of a room using presence sensing log Yuki Kashio, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) ISEC2014-60 SITE2014-51 LOIS2014-30 |
In the home network system (HNS), the advanced services can be provided by using human presence.
In our previous resear... [more] |
ISEC2014-60 SITE2014-51 LOIS2014-30 pp.27-32 |
ISEC, LOIS, SITE |
2014-11-21 15:45 |
Hyogo |
|
[Invited Talk]
Information sharing technologies for disaster situations
-- design principles and field evaluations -- Masayuki Ihara (NTT) |
[more] |
|
ISEC, LOIS, SITE |
2014-11-22 09:00 |
Hyogo |
|
Harms and Offenses of Moral Wrongdoings on Personal Information
-- Why Is Sensitive Information Sensitive? -- Takushi Otani (Kibi International Univ.) |
[more] |
|
ISEC, LOIS, SITE |
2014-11-22 09:25 |
Hyogo |
|
Proposal of the measure behavior intention model in measure against a computer virus. Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-61 SITE2014-52 LOIS2014-31 |
In the field of information security, even though an individual might intend to take protective action under the virus i... [more] |
ISEC2014-61 SITE2014-52 LOIS2014-31 pp.33-37 |
ISEC, LOIS, SITE |
2014-11-22 09:50 |
Hyogo |
|
Study on Network Community Analysis.
-- High Speed Computing Algorithm and it's Characteristics -- Mayako Sato, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-62 SITE2014-53 LOIS2014-32 |
The rapid spread of the SNS makes many people sharing information with each other and working in the community. However,... [more] |
ISEC2014-62 SITE2014-53 LOIS2014-32 pp.39-43 |
ISEC, LOIS, SITE |
2014-11-22 10:15 |
Hyogo |
|
An approach to assess the risk of information leakage by inference
-- A pilot study of a visualization tool and an algorithm using local connectivity in digraphs -- Kazuhiro Suzuki, Haruka Uchima, Miki Kondo (Kochi Univ.) ISEC2014-63 SITE2014-54 LOIS2014-33 |
We study a graph-based model against information leakage from multiple pieces of information, where a relationship among... [more] |
ISEC2014-63 SITE2014-54 LOIS2014-33 pp.45-50 |
ISEC, LOIS, SITE |
2014-11-22 10:55 |
Hyogo |
|
Hands-free voice command input system using voice power adapted standard patterns Yuji Yoshida, Hiroyuki Nishi, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ) ISEC2014-64 SITE2014-55 LOIS2014-34 |
Hands-free voice command input system have problems when the distance between the microphone and a user increases, as de... [more] |
ISEC2014-64 SITE2014-55 LOIS2014-34 pp.51-54 |
ISEC, LOIS, SITE |
2014-11-22 11:20 |
Hyogo |
|
Interactive System for Supporting Decision of Transportation Path According to User's Preference Eko Sakai (Otani Univ.), Ken Nakayama (Tsuda College) ISEC2014-65 SITE2014-56 LOIS2014-35 |
Transportation path search systems minimize time and expense for movement.But the users sometimes need various paths lik... [more] |
ISEC2014-65 SITE2014-56 LOIS2014-35 pp.55-58 |
ISEC, LOIS, SITE |
2014-11-22 11:45 |
Hyogo |
|
Behavior Prediction from Lifelog Data Using A Virtual Communication-Network System Yusuke Omori, Ryoichi Shinkuma (Kyoto Univ.), Kazuhiro Yamaguchi (KDL), Tatsuro Takahashi (Kyoto Univ.) ISEC2014-66 SITE2014-57 LOIS2014-36 |
Along with the development of mobile devices, users' daily activities like purchase histories or online access histroies... [more] |
ISEC2014-66 SITE2014-57 LOIS2014-36 pp.59-64 |
ISEC, LOIS, SITE |
2014-11-22 13:20 |
Hyogo |
|
Improving certificate validation in SSL/TLS implementations Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST) ISEC2014-67 SITE2014-58 LOIS2014-37 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ISEC2014-67 SITE2014-58 LOIS2014-37 pp.65-70 |
ISEC, LOIS, SITE |
2014-11-22 13:45 |
Hyogo |
|
How to Utilize Location Information for Distinguishing Users Takuya Funakoshi, Masahiro Mambo (Kanazawa Univ.) ISEC2014-68 SITE2014-59 LOIS2014-38 |
Lifelig, log of individual daily activity, is a valuable resource useful for decision making, recommendation or statisti... [more] |
ISEC2014-68 SITE2014-59 LOIS2014-38 pp.71-76 |