Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2020-03-10 11:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
How can blockchain technology contribute to the SDGs? Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) IT2019-90 ISEC2019-86 WBS2019-39 |
[more] |
IT2019-90 ISEC2019-86 WBS2019-39 pp.1-5 |
ISEC, IT, WBS |
2020-03-10 11:55 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Consideration on Kleptographic Attack on Cryptocurrency Monero Sho Minami, Takashi Nishide (Tsukuba Univ.) IT2019-91 ISEC2019-87 WBS2019-40 |
Kleptographic attacks involves embedding the attacker's public key in the attack target encryption/signature system, and... [more] |
IT2019-91 ISEC2019-87 WBS2019-40 pp.7-14 |
ISEC, IT, WBS |
2020-03-10 13:20 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Delegatable zero-knowledge proof systems with NIZap Naoya Shiratori, Mitsuru Tada (Chiba Univ.) IT2019-92 ISEC2019-88 WBS2019-41 |
(To be available after the conference date) [more] |
IT2019-92 ISEC2019-88 WBS2019-41 pp.15-22 |
ISEC, IT, WBS |
2020-03-10 13:45 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A lattice aggregate signature scheme without trapdoor Koji Oi, Mitsuru Tada (Chiba Univ.) IT2019-93 ISEC2019-89 WBS2019-42 |
(To be available after the conference date) [more] |
IT2019-93 ISEC2019-89 WBS2019-42 pp.23-30 |
ISEC, IT, WBS |
2020-03-10 14:10 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
IT2019-94 ISEC2019-90 WBS2019-43 |
[more] |
IT2019-94 ISEC2019-90 WBS2019-43 pp.31-37 |
ISEC, IT, WBS |
2020-03-10 14:45 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security of K(+)MVPKC Based on Message-Dependent Transformation
-- Along With Proposal of K(++)CBPKC -- Masao Kasahara (Waseda Univ.) IT2019-95 ISEC2019-91 WBS2019-44 |
[more] |
IT2019-95 ISEC2019-91 WBS2019-44 pp.39-44 |
ISEC, IT, WBS |
2020-03-10 15:10 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Efficient modular inversion by reducing Division Step Masaya Ikeda, Atsuko Miyaji (Osaka Univ.) IT2019-96 ISEC2019-92 WBS2019-45 |
[more] |
IT2019-96 ISEC2019-92 WBS2019-45 pp.45-50 |
ISEC, IT, WBS |
2020-03-10 15:35 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Improved Threshold Signature with Anonymity Takuya Inomoto, Atsuko Miyaji (Osaka Univ.) IT2019-97 ISEC2019-93 WBS2019-46 |
Today, we can exchange information at remote locations via the Internet. It is very important to distinguish whether or ... [more] |
IT2019-97 ISEC2019-93 WBS2019-46 pp.51-58 |
ISEC, IT, WBS |
2020-03-10 16:10 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
[Invited Talk]
Development of Path Shadowing Number Model and Prediction of Transmission Capacity in a 5G's Small Cell Tokio Taga (Kwansei Gakuin Univ.) IT2019-98 ISEC2019-94 WBS2019-47 |
The standardization and technology development of 5th generation (5G) mobile communication system have been completed an... [more] |
IT2019-98 ISEC2019-94 WBS2019-47 pp.59-64 |
ISEC, IT, WBS |
2020-03-10 17:10 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
[Invited Talk]
IMHO: connecting information theory to cybersecurity Masakatsu Morii (Kobe Univ.) IT2019-99 ISEC2019-95 WBS2019-48 |
[more] |
IT2019-99 ISEC2019-95 WBS2019-48 p.65 |
ISEC, IT, WBS |
2020-03-10 11:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Effectiveness of Image Steganography using Coding with Cost Function Ryo Nakazawa, Shun Watanabe (TUAT) IT2019-100 ISEC2019-96 WBS2019-49 |
[more] |
IT2019-100 ISEC2019-96 WBS2019-49 pp.67-72 |
ISEC, IT, WBS |
2020-03-10 11:55 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
An Improved Learning Method for Weighted-BP using MAP-based Training Data Filtering Ryota Yoshizawa, Kenichiro Furuta, Yuma Yoshinaga, Osamu Torii, Tomoya Kodama (Kioxia) IT2019-101 ISEC2019-97 WBS2019-50 |
Weighted-BP has been proposed so as to compensate the shortcoming of BP decoding of high-density parity-check (HDPC) cod... [more] |
IT2019-101 ISEC2019-97 WBS2019-50 pp.73-78 |
ISEC, IT, WBS |
2020-03-10 13:00 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
(2,3)-Threshold Extended Visual Secret Sharing Schemes for QR Code Naoya Okawa, Kouya Tochikubo (Nihon Univ.) IT2019-102 ISEC2019-98 WBS2019-51 |
[more] |
IT2019-102 ISEC2019-98 WBS2019-51 pp.79-86 |
ISEC, IT, WBS |
2020-03-10 13:25 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Research on DNS tunnel detection by machine learning using appearance characters
-- Consideration of implementation of evaluation program -- Tetsuya Asakura, Takeo Tatsumi (OUJ) IT2019-103 ISEC2019-99 WBS2019-52 |
In this study, we considered an implementation a detection technique of DNS tunnel.
This detection techniqe is likely t... [more] |
IT2019-103 ISEC2019-99 WBS2019-52 pp.87-94 |
ISEC, IT, WBS |
2020-03-10 13:50 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2019-104 ISEC2019-100 WBS2019-53 |
In this paper, we deal with the problem of database statistics publishing with privacy and utility guarantees. While var... [more] |
IT2019-104 ISEC2019-100 WBS2019-53 pp.95-100 |
ISEC, IT, WBS |
2020-03-10 14:25 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Encoding Algorithm for Run Length-Limited Single Insertion/Deletion Correcting Code Reona Takemoto, Takayuki Nozaki (Yamaguchi Univ.) IT2019-105 ISEC2019-101 WBS2019-54 |
Synchronization errors cause insertion and deletion in transmitted sequences.Schoeny et al. constructed codes correcting... [more] |
IT2019-105 ISEC2019-101 WBS2019-54 pp.101-106 |
ISEC, IT, WBS |
2020-03-10 14:50 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Construction of Efficient Decodable Sequence-Subset Codes Based on Constant Weight Codes Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.) IT2019-106 ISEC2019-102 WBS2019-55 |
Each codeword of sequence-subset codes is represented by a set of sequences.
The subset-sequence codes are used for err... [more] |
IT2019-106 ISEC2019-102 WBS2019-55 pp.107-112 |
ISEC, IT, WBS |
2020-03-10 15:15 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes Hiroki Koga (Univ. Tsukuba) IT2019-107 ISEC2019-103 WBS2019-56 |
[more] |
IT2019-107 ISEC2019-103 WBS2019-56 pp.113-120 |
ISEC, IT, WBS |
2020-03-11 09:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Evaluation of Differential Attacks against KCipher-2 Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57 |
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] |
IT2019-108 ISEC2019-104 WBS2019-57 pp.121-126 |
ISEC, IT, WBS |
2020-03-11 09:55 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Toward Differential Characteristic Search of AES by Annealing Haruka Hirano, Shugo Kakimoto, Kazuki Yoneyama (Ibaraki Univ.), Junpei Yamaguchi (Fujitsu Lab.) IT2019-109 ISEC2019-105 WBS2019-58 |
At Inscypt 2011, Mouha et al. firstly proposed an application of mixed-integer linear programming (MILP) to cryptanalysi... [more] |
IT2019-109 ISEC2019-105 WBS2019-58 pp.127-133 |