IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2022)

Search Results: Keywords 'from:2022-11-18 to:2022-11-18'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, LOIS 2022-11-18
09:00
Online Online Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher
Shigeo Tsuii, Osamu Hirota (Chuo Univ.) ISEC2022-31 SITE2022-35 LOIS2022-15
This paper describes total constructive structure of PQC (Post-quantum cryptography) including mathematical public key c... [more] ISEC2022-31 SITE2022-35 LOIS2022-15
pp.9-15
ISEC, SITE, LOIS 2022-11-18
09:25
Online Online International Trend of Development on Y-00 Quantum Cryptography -- Cryptologic Perspective --
Shigeo Tsujii (Chuo Univ.), Kentaro Kato (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) ISEC2022-30 SITE2022-34 LOIS2022-14
Cryptography has developed based on mathematics and has now become an indispensable technology in society. In order to c... [more] ISEC2022-30 SITE2022-34 LOIS2022-14
pp.1-8
ISEC, SITE, LOIS 2022-11-18
09:00
Online Online On the CEN Workshop Agreement (CWA) concerning the trust and trustworthiness of Journalism -- Introduction and analysis of CWA17493 --
Takushi Otani (Kibi International Univ.)
 [more]
ISEC, SITE, LOIS 2022-11-18
09:25
Online Online Analysis of EU Cyber Resilience Act -- from a Perspective of Cyber Supply Chain Security --
Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] ISEC2022-32 SITE2022-36 LOIS2022-16
pp.16-19
ISEC, SITE, LOIS 2022-11-18
10:05
Online Online [Invited Talk] About "Ctrl + Z: Right to be forgotten"(1)
Hideyuki Fujii (NRI Secure)
 [more]
ISEC, SITE, LOIS 2022-11-18
10:30
Online Online [Invited Talk] About "Ctrl + Z: Right to be forgotten" (2)
Naonori Kato (KDDI RI/NFI)
 [more]
ISEC, SITE, LOIS 2022-11-18
11:05
Online Online [Invited Talk] Artificiality, Complexity and Feasibility of The Right to Be Forgotten -- Reviewing Meg Leta Jones' Ctrl+Z: The Right to Be Forgotten --
Akiyoshi Kabeya (Toyo Eiwa Univ.) ISEC2022-33 SITE2022-37 LOIS2022-17
 [more] ISEC2022-33 SITE2022-37 LOIS2022-17
pp.20-25
ISEC, SITE, LOIS 2022-11-18
13:00
Online Online [Invited Talk] Quantum Computation and Cryptography
Takashi Yamakawa (NTT) ISEC2022-34 SITE2022-38 LOIS2022-18
Recently, there have been many exciting works in the interdisciplinary field of quantum computations and cryptography. T... [more] ISEC2022-34 SITE2022-38 LOIS2022-18
p.26
ISEC, SITE, LOIS 2022-11-18
13:50
Online Online [Invited Talk] Two-Layered QR Codes and Their Principles -- Development of Hologram QR Codes --
Masakatsu Morii (Kobe University)
 [more]
ISEC, SITE, LOIS 2022-11-18
14:30
Online Online Investigating the Use of Latent Representations in Federated Learning Using Normalizing Flow and Optimal Transport Algorithms
Motonobu Uchikoshi, Takeshi Mori (JRI) ISEC2022-35 SITE2022-39 LOIS2022-19
(To be available after the conference date) [more] ISEC2022-35 SITE2022-39 LOIS2022-19
pp.27-31
ISEC, SITE, LOIS 2022-11-18
14:55
Online Online Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) ISEC2022-36 SITE2022-40 LOIS2022-20
Type-2 Generalized Feistel Structure (GFS) is known as a way to construct a secure block cipher. It is a $dm$-bit ($d ge... [more] ISEC2022-36 SITE2022-40 LOIS2022-20
pp.32-38
ISEC, SITE, LOIS 2022-11-18
15:20
Online Online On the difficulty of the 2nd MeDLP
Masaaki Shirase (FUN) ISEC2022-37 SITE2022-41 LOIS2022-21
The Me scalar multiplication is defined for the Me operations on elliptic curves over finite fields, and Me version of t... [more] ISEC2022-37 SITE2022-41 LOIS2022-21
pp.39-46
ISEC, SITE, LOIS 2022-11-18
14:30
Online Online Development of QR Code with superimposed Kanji font
Naoya Tahara, Hiroshi Kai (Ehime Univ.), Masakatu Morii (Kobe Univ.) ISEC2022-38 SITE2022-42 LOIS2022-22
 [more] ISEC2022-38 SITE2022-42 LOIS2022-22
pp.47-52
ISEC, SITE, LOIS 2022-11-18
14:55
Online Online A Study on Document Classification of National Nursing Examination Using BERT
Takao Nishi, Yu Ichifuji (Nagasaki Univ.) ISEC2022-39 SITE2022-43 LOIS2022-23
 [more] ISEC2022-39 SITE2022-43 LOIS2022-23
pp.53-58
ISEC, SITE, LOIS 2022-11-18
15:55
Online Online Secure Computation of Symmetric Functions Using Four Types of Cards
Hayato Shikata, Takaaki Mizuki (Tohoku Univ.) ISEC2022-40 SITE2022-44 LOIS2022-24
(To be available after the conference date) [more] ISEC2022-40 SITE2022-44 LOIS2022-24
pp.59-65
ISEC, SITE, LOIS 2022-11-18
16:20
Online Online Decentralization of Revocation Process Using Intermediate Servers in Revocable Group Signatures
Kai Kimura, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2022-41 SITE2022-45 LOIS2022-25
A group signature is a signature method that allows a user who belongs to a group to prove that he or she ”belongs to th... [more] ISEC2022-41 SITE2022-45 LOIS2022-25
pp.66-72
ISEC, SITE, LOIS 2022-11-18
15:55
Online Online Token-Controlled Token Circulation
Ko Fujimura (Otsuma Univ.) ISEC2022-42 SITE2022-46 LOIS2022-26
This paper presents a general-purpose token circulating system for circulating various types of rights such as tickets, ... [more] ISEC2022-42 SITE2022-46 LOIS2022-26
pp.73-78
ISEC, SITE, LOIS 2022-11-18
16:20
Online Online Efficient workers' behavior segmentation with GP-HSMM
Toshiyuki Hatta, Tsubasa Tomoda, Tetsuya Tamaki, Shotaro Miwa (Mitsubishi Electric Corp.) ISEC2022-43 SITE2022-47 LOIS2022-27
(To be available after the conference date) [more] ISEC2022-43 SITE2022-47 LOIS2022-27
pp.79-84
ISEC, SITE, LOIS 2022-11-18
16:55
Online Online Reducing Authentication Data Size in Decentralized Blacklistable Anonymous Credential System Using DualRing
Atsuki Iriboshi, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2022-44 SITE2022-48 LOIS2022-28
For privacy protection, blacklistable anonymous credential systems have been proposed, where a user is authenticated wit... [more] ISEC2022-44 SITE2022-48 LOIS2022-28
pp.85-91
ISEC, SITE, LOIS 2022-11-18
17:20
Online Online Security Proof and Parameters for a Lattice-based Fuzzy Signature Scheme
Yuichi Hasegawa, Shingo Sato, Junji Shikata (Yokohama National Univ.) ISEC2022-45 SITE2022-49 LOIS2022-29
Recently, password-based authentication is often used for entity authentication of systems. However, because recently cy... [more] ISEC2022-45 SITE2022-49 LOIS2022-29
pp.92-99
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan