Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, ISEC, SITE |
2017-11-09 09:00 |
Kyoto |
|
A proposal of precut vegetable search algorithm for homemade cooking Risa Matsuoka, Yukiko Matsushima (NIT, Tsuyama Col.) ISEC2017-49 SITE2017-31 LOIS2017-26 |
In this paper, we propose a precut vegetable search algorithm for busy people to make homemade cooking without a heavy w... [more] |
ISEC2017-49 SITE2017-31 LOIS2017-26 pp.1-5 |
LOIS, ISEC, SITE |
2017-11-09 09:30 |
Kyoto |
|
Consciousness Investigation of Passwords Management in University Students
-- Questionnaire Design based on Friend Relationships -- Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27 |
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] |
ISEC2017-50 SITE2017-32 LOIS2017-27 pp.7-12 |
LOIS, ISEC, SITE |
2017-11-09 10:00 |
Kyoto |
|
User Authentication Keeping Method Using Watch Type Devices
-- Case of Acceleration Sensors -- Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) ISEC2017-51 SITE2017-33 LOIS2017-28 |
Wearable devices are going to be popular in near future. These devices also can be used in user authentications. In thes... [more] |
ISEC2017-51 SITE2017-33 LOIS2017-28 pp.13-18 |
LOIS, ISEC, SITE |
2017-11-09 10:40 |
Kyoto |
|
Application of ISO/IEC 29100:2011 to the evaluation criteria of privacy impact assessment Ryotaro Nakata, Sanggyu Shin, Yoichi Seto (AIIT) ISEC2017-52 SITE2017-34 LOIS2017-29 |
In the construction of an information system dealing with personal information, the conventional privacy impact assessme... [more] |
ISEC2017-52 SITE2017-34 LOIS2017-29 pp.19-26 |
LOIS, ISEC, SITE |
2017-11-09 11:10 |
Kyoto |
|
Verifing Individualities of Usage History in Digital Flyers Application Soki Nishiyama, Hiroya Susuki, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi (UTokyo) ISEC2017-53 SITE2017-35 LOIS2017-30 |
Movement of analyzing and utilizing behavioral history such as trajectory or purchase have become active in recent years... [more] |
ISEC2017-53 SITE2017-35 LOIS2017-30 pp.27-32 |
LOIS, ISEC, SITE |
2017-11-09 11:40 |
Kyoto |
|
Attempt to apply 3-Aufheben/MELT-UP for social issues "Realization of Safe and Secure E-mail Exchange Framework" Toshiaki Saisho, Shigeo Tshujii (Research and Development Initiative, Chuo University) ISEC2017-54 SITE2017-36 LOIS2017-31 |
The importance of "3-Shiyou(3-Aufheben)" on solving social problems (overcome), and the importance of the idea of MELT-U... [more] |
ISEC2017-54 SITE2017-36 LOIS2017-31 pp.33-40 |
LOIS, ISEC, SITE |
2017-11-09 13:10 |
Kyoto |
|
[Invited Talk]
Study about utilization of Wi-Fi log as location service Hideki Yoshii (SoftBank) |
[more] |
|
LOIS, ISEC, SITE |
2017-11-09 14:20 |
Kyoto |
|
ISEC2017-55 SITE2017-37 LOIS2017-32 |
(To be available after the conference date) [more] |
ISEC2017-55 SITE2017-37 LOIS2017-32 pp.41-44 |
LOIS, ISEC, SITE |
2017-11-09 14:50 |
Kyoto |
|
A Consideration on Information Legal Policy in Japan from the Digital Single Market Strategy in EU
-- Based on Mid-Term review of DSM -- Naonori Kato, Yosuke Murakami (KDDI Research) ISEC2017-56 SITE2017-38 LOIS2017-33 |
A comprehensive strategy on information legislation called the digital single market (DSM) strategy under the European C... [more] |
ISEC2017-56 SITE2017-38 LOIS2017-33 pp.45-50 |
LOIS, ISEC, SITE |
2017-11-09 15:20 |
Kyoto |
|
A study on Information
-- Tribute to Shannon and Dretski -- Ichiro Mizukoshi (IISEC/NTT East) ISEC2017-65 SITE2017-47 LOIS2017-42 |
In engineering sense, there is no argument that the definition of Information by Shannon is the foundation of current in... [more] |
ISEC2017-65 SITE2017-47 LOIS2017-42 pp.95-98 |
LOIS, ISEC, SITE |
2017-11-09 16:00 |
Kyoto |
|
Construction of code based PKC based on binary cyclic code realizing coding rate of exactly 1.0
-- Along with revised K(V)PKC -- Masao Kasahara (Waseda Univ.) ISEC2017-58 SITE2017-40 LOIS2017-35 |
In this paper we present a modified version of K(V)Scheme formerly presented by the author. The modified scheme will be ... [more] |
ISEC2017-58 SITE2017-40 LOIS2017-35 pp.57-62 |
LOIS, ISEC, SITE |
2017-11-09 16:30 |
Kyoto |
|
Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC) ISEC2017-59 SITE2017-41 LOIS2017-36 |
In a setting that a single user is given plural credentials on her attributes and related secret keys, an authentication... [more] |
ISEC2017-59 SITE2017-41 LOIS2017-36 pp.63-70 |
LOIS, ISEC, SITE |
2017-11-09 17:00 |
Kyoto |
|
HIBE based on Universal Sampler Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) ISEC2017-60 SITE2017-42 LOIS2017-37 |
In a system that participants use common parameters, the setup has to be executed honestly since a corrupt setup includi... [more] |
ISEC2017-60 SITE2017-42 LOIS2017-37 pp.71-77 |
LOIS, ISEC, SITE |
2017-11-10 10:00 |
Kyoto |
|
Prediction method of tumble using machine learning of footsteps. Takehiro Mori, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2017-61 SITE2017-43 LOIS2017-38 |
Along with the progress of super aged society, lonely elderly people are increasing. In addition, accidents in homes and... [more] |
ISEC2017-61 SITE2017-43 LOIS2017-38 pp.79-82 |
LOIS, ISEC, SITE |
2017-11-10 10:30 |
Kyoto |
|
Elderly people observation system based on the detection of untrained acoustic data Akihiro Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2017-62 SITE2017-44 LOIS2017-39 |
Along with the progress of super aged society, the number of lonelihood elderly people is increasing. Therefore, the dem... [more] |
ISEC2017-62 SITE2017-44 LOIS2017-39 pp.83-86 |
LOIS, ISEC, SITE |
2017-11-10 11:00 |
Kyoto |
|
Estimation of Office Worker Seated-State with Ambient Sensors Daisuke Ikeda, Yukihiro Tsuboshita, Takeshi Onishi (Fuji Xerox) ISEC2017-63 SITE2017-45 LOIS2017-40 |
Nowadays, approximately 75% of all employees in industrial countries are required to work in a seated position. Long-ter... [more] |
ISEC2017-63 SITE2017-45 LOIS2017-40 pp.87-91 |
LOIS, ISEC, SITE |
2017-11-10 11:30 |
Kyoto |
|
Consideration for Estimation of Accommodation State from Web big data with Deep Learning Noriaki Koide (ROIS) ISEC2017-64 SITE2017-46 LOIS2017-41 |
[more] |
ISEC2017-64 SITE2017-46 LOIS2017-41 pp.93-94 |
LOIS, ISEC, SITE |
2017-11-10 13:00 |
Kyoto |
|
Why Do We Need the Ethical Guideline for Internet Research?
-- The Development of Internet Research Ethics and Its Introduction to Japan -- Takushi Otani (Kibi International Univ.), Reina Saijo (Hokkaido Univ.), Akinori Kubo (Hitotsuabshi Univ.), Hirotaka Osawa (Tsukuba Univ.), Arisa Ema (Tokyo Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Hiromitsu Hattori (Ritsumeikan Univ.), Ryutaro Ichise (NII), Naonori Akiya (Yamaguchi Univ.), Kazunori Komatani (Osaka Univ.), Miyano Naoki (Kyoto Univ.) ISEC2017-57 SITE2017-39 LOIS2017-34 |
[more] |
ISEC2017-57 SITE2017-39 LOIS2017-34 pp.51-55 |
LOIS, ISEC, SITE |
2017-11-10 13:30 |
Kyoto |
|
Considering Privacy issue
-- based on Floridi's Philosophy of Information -- Hiroyuki Kinoshita (IISEC) ISEC2017-66 SITE2017-48 LOIS2017-43 |
The “Ontological Interpretation of Informational Privacy” introduced by Luciano Floridi is evaluated as useful theory to... [more] |
ISEC2017-66 SITE2017-48 LOIS2017-43 pp.99-102 |
LOIS, ISEC, SITE |
2017-11-10 14:00 |
Kyoto |
|
Implementation Planning of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2017-67 SITE2017-49 LOIS2017-44 |
In the information security class at the university, it is common to learn from the defender's perspective how to protec... [more] |
ISEC2017-67 SITE2017-49 LOIS2017-44 pp.103-106 |