IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev EMM Conf / Next EMM Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Enriched MultiMedia (EMM) [schedule] [select]
Chair Masaki Kawamura (Yamaguchi Univ.)
Vice Chair Motoi Iwata (Osaka Prefecture Univ.), Tetsuya Kojima (NIT,Tokyo College)
Secretary Hiroko Akiyama (NIT, Nagano College), キタヒロ カネダ (Nagase)
Assistant Masaki Inamura (Tokyo Denki Univ.), Kazuhiro Kono (Kansai Univ.)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Shiho Moriai (NICT)
Vice Chair Shoichi Hirose (Univ. of Fukui), Tetsuya Izu (Fujitsu Labs.)
Secretary Keita Emura (NICT), Kazunari Omote (Tsukuba Univ.)
Assistant Dai Yamamoto (Fujitsu Labs.), Yuuji Suga (IIJ)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Tetsuya Morizumi (Kanagawa Univ.)
Vice Chair Masaru Ogawa (Kobe Gakuin Univ.), Takushi Otani (Kibi International Univ.)
Secretary Akiyoshi Kabeya (Toyo Eiwa Univ.), Hisanori Kato (KDDI Research)
Assistant Nobuyuki Yoshinaga (Yamaguchi Pref Univ.), Daisuke Suzuki (Hokuriku Univ.)

Technical Committee on Biometrics (BioX) [schedule] [select]
Chair Akira Otsuka (IISEC)
Vice Chair Tetsushi Ohki (Shizuoka Univ.), Takahiro Aoki (Fujitsu Labs.)
Secretary Masatsugu Ichino (Univ. of Electro-Comm.), Naoyuki Takada (SECOM)
Assistant Daishi Watabe (Saitama Inst. of Tech.), Ryota Horie (Shibaura Inst. of Tech.)

Technical Committee on Hardware Security (HWS) [schedule] [select]
Chair Shinichi Kawamura (Toshiba)
Vice Chair Makoto Ikeda (Univ. of Tokyo), Yasuhisa Shimazaki (Renesas Electronics)
Secretary Hiroki Kunii (SECOM), Takatsugu Ono (Kyushu Univ.)

Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Hiroki Takakura (NII)
Vice Chair Katsunari Yoshioka (Yokohama National Univ.), Kazunori Kamiya (NTT)
Secretary Takahiro Kasama (NICT), Akira Yamada (KDDI labs.)
Assistant Keisuke Kito (Mitsubishi Electric), Toshihiro Yamauchi (Okayama Univ.)

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Tue, Jul 23, 2019 09:55 - 18:00
Wed, Jul 24, 2019 09:05 - 15:50
Topics Security, etc. 
Conference Place Eikokuji Campus, Kochi University of Technology 
Transportation Guide It is about 15minute walk from JR Kochi Station.
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on ISEC, SITE, ICSS, EMM, HWS, BioX.

Tue, Jul 23 AM  A-1:ISEC(1):101
09:55 - 12:00
(1)
ISEC
09:55-10:20 Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15 Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.)
(2)
ISEC
10:20-10:45 An Approach to Attack Scenario Generation for Simulation of Targeted Attacks ISEC2019-13 SITE2019-7 BioX2019-5 HWS2019-8 ICSS2019-11 EMM2019-16 Yusuke Takahashi, Shigeyoshi Shima, Atsunori Naito (NEC), Rui Tanabe, Katsunari Yoshioka (YNU)
(3)
ISEC
10:45-11:10 Profiling of malicious users towards honeypot installation in the blockchain network ISEC2019-14 SITE2019-8 BioX2019-6 HWS2019-9 ICSS2019-12 EMM2019-17 Kazuki Hara, Teppei Sato, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)
(4)
ISEC
11:10-11:35 Risk analysis of zero downtime mechanism by dispersibility in blockchain technology ISEC2019-15 SITE2019-9 BioX2019-7 HWS2019-10 ICSS2019-13 EMM2019-18 Wataru Taguchi, Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (uba Univ./NICT)
(5)
ISEC
11:35-12:00 A method of giving trust to users in Bitcoin ISEC2019-16 SITE2019-10 BioX2019-8 HWS2019-11 ICSS2019-14 EMM2019-19 Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT)
Tue, Jul 23 AM  B-1:CSEC(1):213
09:55 - 12:00
(6) 09:55-10:20 金融サービスにおける機械学習システムの適切な活用について:セキュリティと品質に焦点を当てて
○清藤 武暢・宇根 正志(日本銀行)
(7) 10:20-10:45 対象者の人数と人間関係に制約のない移動履歴とSNSアカウントの照合
○大岡 拓斗・松本 瞬・市野 将嗣・吉浦 裕(電通大)
(8) 10:45-11:10 マルウェア対策のための研究用データセット~MWS Datasets 2019~
荒木 粧子(ソリトンシステムズ)・○笠間 貴弘(NICT)・押場 博光(FFRI)千葉 大紀(NTTセキュアプラットフォーム研究所)・畑田 充弘(NTT)・寺田 真敏(電機大学)
(9) 11:10-11:35 擬似C&Cサーバを用いたIoTマルウェア駆除手法の検討
○三須 剛史・高田 一樹(セキュアブレイン)
(10) 11:35-12:00 観測ロケットMOMO3号機によるセキュア通信方式の基礎実験
○吉田 真紀(NICT)・森岡 澄夫(インターステラテクノロジズ)・尾花 賢(法政大学)
Tue, Jul 23 AM  D-1:BioX:328
09:55 - 11:35
(11)
BioX
09:55-10:20 Evaluation of Similarity Calculation Methods for Image Clustering based on PRNU Noise ISEC2019-17 SITE2019-11 BioX2019-9 HWS2019-12 ICSS2019-15 EMM2019-20 Mai Uchida, Yoichi Tomioka (UoA)
(12)
BioX
10:20-10:45 Development of 2,400ppi fingerprint sensor for capturing neonate fingerprint within 24 hours after Birth ISEC2019-18 SITE2019-12 BioX2019-10 HWS2019-13 ICSS2019-16 EMM2019-21 Yoshinori Koda, Ai Takahashi, Koichi Ito, Takafumi Aoki (Tohoku Univ.)
(13)
BioX
10:45-11:10 Introduction of Second-order Differential Phase Spectrum into Person Authentication using Intra-Palm Propagation Signal ISEC2019-19 SITE2019-13 BioX2019-11 HWS2019-14 ICSS2019-17 EMM2019-22 Kohei Fujita, Yuya Isimoto, Isao Nakanishi (Tottori Univ)
(14)
BioX
11:10-11:35 Empirical Evaluation on Face-Detection Prevention Technologies ISEC2019-20 SITE2019-14 BioX2019-12 HWS2019-15 ICSS2019-18 EMM2019-23 Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.)
Tue, Jul 23 PM  A-2:ISEC(2):104
13:10 - 15:15
(15)
ISEC
13:10-13:35 Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security ISEC2019-21 SITE2019-15 BioX2019-13 HWS2019-16 ICSS2019-19 EMM2019-24 Atsushi Takayasu (Univ. Tokyo)
(16)
ISEC
13:35-14:00 A Revocable Group Signature Scheme with Strong Anonymity for Crowdsensing ISEC2019-22 SITE2019-16 BioX2019-14 HWS2019-17 ICSS2019-20 EMM2019-25 Yuto Nakazawa, Toru Nakanishi (Hiroshima Univ.)
(17)
ISEC
14:00-14:25 Generic Even-Mansour Construction Based on Group Actions ISEC2019-37 SITE2019-31 BioX2019-29 HWS2019-32 ICSS2019-35 EMM2019-40 Hector Hougaard, Chen-Mou Cheng, Miyaji Atsuko (Graduate School of Engineering, Osaka Univ.)
(18)
ISEC
14:25-14:50 New Quantum Algorithms for Modular Inverse and Their Application on the Elliptic Curve Discrete Logarithm Problem ISEC2019-24 SITE2019-18 BioX2019-16 HWS2019-19 ICSS2019-22 EMM2019-27 Ryo Kurama (Univ. of Tokyo), Noboru Kunihiro (Tsukuba Univ.)
(19)
ISEC
14:50-15:15 Attribute-Based Group Signatures for Revocable Members ISEC2019-25 SITE2019-19 BioX2019-17 HWS2019-20 ICSS2019-23 EMM2019-28 Maharage Nisansala Sevwandi Perera, Toru Nakamura, Masayuki Hashimoto, Hiroyuki Yokoyama (ATR)
Tue, Jul 23 PM  B-2:HWS(1):213
13:10 - 15:15
(20)
HWS
13:10-13:35 A Formal Approach to Verifying Trojan-freeness of Cryptographic Circuits Based on Galois-Field Arithmetic ISEC2019-26 SITE2019-20 BioX2019-18 HWS2019-21 ICSS2019-24 EMM2019-29 Akira Ito, Rei Ueno, Naofumi Homma (Tohoku Univ.)
(21)
HWS
13:35-14:00 Side-channel leakage evaluation of cryptographic module by IC chip level consumption simulation ISEC2019-27 SITE2019-21 BioX2019-19 HWS2019-22 ICSS2019-25 EMM2019-30 Kazuki Yasuda, Kazuki Monta, Akihiro Tsukioka, Noriyuki Miura, Makoto Nagata (Kobe Univ.)
(22)
HWS
14:00-14:25 A Countermeasure against Side-Channel Analysis using Dynamic Power Control ISEC2019-28 SITE2019-22 BioX2019-20 HWS2019-23 ICSS2019-26 EMM2019-31 Tomoaki Ukezono (Fukuoka Univ.)
(23)
HWS
14:25-14:50 Side Channel Security of an FPGA Pairing Implementation with Pipelined Modular Multiplier ISEC2019-29 SITE2019-23 BioX2019-21 HWS2019-24 ICSS2019-27 EMM2019-32 Mitsufumi Yamazaki, Junichi Sakamoto, Yuta Okuaki, Tsutomu Matsumoto (YNU)
(24)
HWS
14:50-15:15 An FPGA Implementation of Aggregate Signature Schemes with Pipelined Modular Multiplier ISEC2019-30 SITE2019-24 BioX2019-22 HWS2019-25 ICSS2019-28 EMM2019-33 Yota Okuaki, Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)
Tue, Jul 23 PM  D-2:SITE(1):328
13:10 - 14:50
(25)
SITE
13:10-13:35 Proposal and Implementation of Password Reminder System for Partial Forgetting ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34 Ryota Hosoda, Hiroyuki Inaba (KIT)
(26)
SITE
13:35-14:00 Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT)
(27)
SITE
14:00-14:25 Video Watermarking Using Difference of Persistent Homology in Consecutive Frames ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 Takaya Kimura, Hiroyuki Inaba (KIT)
(28)
SITE
14:25-14:50 A simulation of a 3-D visual cryptography using holography ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.)
Tue, Jul 23 PM 
15:30 - 16:30
(29) 15:30-16:30  
Tue, Jul 23 PM 
16:30 - 17:30
(30) 16:30-17:30  
Tue, Jul 23 PM 
17:30 - 18:00
(31) 17:30-18:00  
Wed, Jul 24 AM  A-3:ISEC(3):104
09:30 - 10:45
(32)
ISEC
09:30-09:55 SecureHID: Securing the USB Interface ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38 Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.)
(33)
ISEC
09:55-10:20 A Performance Analysis of Supersingular Isogeny Diffie-Hellman with Several Classes of the Quadratic Extension Fields ISEC2019-36 SITE2019-30 BioX2019-28 HWS2019-31 ICSS2019-34 EMM2019-39 Yuki Nanjo (Okayama Univ.), Masaaki Shirase (Future Univ. Hakodate), Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.)
(34)
ISEC
10:20-10:45 Privacy for Documents and Prototype of Risk Evaluation Tool ISEC2019-23 SITE2019-17 BioX2019-15 HWS2019-18 ICSS2019-21 EMM2019-26 Tomoaki Mimoto, Shinsaku Kiyomoto (KDDI Research), Koji Kitamura (AIST), Atsuko Miyaji (Osaka Univ.)
Wed, Jul 24 AM  B-3:HWS(2):213
09:05 - 10:45
(35)
HWS
09:05-09:30 Instruction Replacement Fault Attack for TVC using Double Laser Station ISEC2019-38 SITE2019-32 BioX2019-30 HWS2019-33 ICSS2019-36 EMM2019-41 Tomoro Suzuki, Junichi Sakamoto, Tsutomu Matsumoto (YNU)
(36)
HWS
09:30-09:55 Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF ISEC2019-39 SITE2019-33 BioX2019-31 HWS2019-34 ICSS2019-37 EMM2019-42 Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ.)
(37)
HWS
09:55-10:20 Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43 Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)
(38)
HWS
10:20-10:45 Instrumentation Security of Ranging Pulse LIDARs Using Multiple Photodetectors ISEC2019-41 SITE2019-35 BioX2019-33 HWS2019-36 ICSS2019-39 EMM2019-44 Tatsuya Suehiro, Ryuya Ichinose, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU)
Wed, Jul 24 AM  C-3:SITE(2):210
09:30 - 10:45
(39)
SITE
09:30-09:55 Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU)
(40)
SITE
09:55-10:20 Implicit Guidance & Control at OODA Loop using as Countermeasures
-- against SMS phishing --
ISEC2019-43 SITE2019-37 BioX2019-35 HWS2019-38 ICSS2019-41 EMM2019-46
Yuidhi Takigawa (N.D.A.), Takeo Tatsumi (O.U.J/)
(41)
SITE
10:20-10:45 Server Configuration Training Including Vulnerability Assessment and Remediation process ISEC2019-44 SITE2019-38 BioX2019-36 HWS2019-39 ICSS2019-42 EMM2019-47 Daisuke Suzuki (Hokuriku Univ.)
Wed, Jul 24 AM  A-4:CSEC(2):104
10:55 - 12:35
(42) 10:55-11:20 n<2k-1において計算結果の正当性を検証可能な秘密分散を用いた秘匿計算
○落合 将吾・岩村 惠市(理科大)
(43) 11:20-11:45 ブロックチェーンを用いたIoTシステム向け証明サービス基盤の提案
○大久保 隆夫(情報セキュリティ大学院大学)・田嶋 健・上原 敏幸(アイビーシー)
(44) 11:45-12:10 ブロックチェーンを用いた公正なオンラインゲームの確立手法
○佐古 健太郎(早稲田大学)・森 達哉(早稲田大学)・松尾 真一郎(ジョージタウン大学)
(45) 12:10-12:35 Ethereumブロックチェーンで綿菓子を巻く方法
○須賀 祐治(IIJ)
Wed, Jul 24 AM  B-4:EMM/ICSS:213
10:55 - 12:35
(46)
ICSS
10:55-11:20 Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System ISEC2019-45 SITE2019-39 BioX2019-37 HWS2019-40 ICSS2019-43 EMM2019-48 Ryusei Fuji, Shotaro Usuzaki, Kentaro Aburada, Hisaaki Yamaba, Tetsuro Katayama (Univ. of Miyazaki), Mirang Park (Kanagawa Inst. of Tech.), Norio Shiratori (Chuo Univ.), Naonobu Okazaki (Univ. of Miyazaki)
(47)
ICSS
11:20-11:45 Automatic Node Manipulation System for Active Monitoring Environment ISEC2019-46 SITE2019-40 BioX2019-38 HWS2019-41 ICSS2019-44 EMM2019-49 Shingo Yasuda, Nobuyuki Kanaya, Yu Tsuda, Satoshi Ohta, Ryosuke Miura, Daisuke Inoue (NICT)
(48)
EMM
11:45-12:10 A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence ISEC2019-47 SITE2019-41 BioX2019-39 HWS2019-42 ICSS2019-45 EMM2019-50 Hiroki Yamaguchi, Kazuhiro Kono (Kansai Univ.)
(49)
EMM
12:10-12:35 Recording device identification based on audio distortion depending on system-on-chip ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51 Akira Nishimura (Tokyo Univ. Info. Sci.)
Wed, Jul 24 AM  C-4:SITE(3):210
10:55 - 12:10
(50)
SITE
10:55-11:20 Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games
-- Limitations of Security Models and the Possibility of Artificial Intelligence --
ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52
Tetsuya Morizumi (KU)
(51)
SITE
11:20-11:45 International regulatory trend survey report on AI
-- Focusing on the OECD Principles on AI --
ISEC2019-50 SITE2019-44 BioX2019-42 HWS2019-45 ICSS2019-48 EMM2019-53
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yoichiro Itakura (Hikari Sogoh Law Offices/RIKEN), Yosuke Murakami (KDDI Research)
(52)
SITE
11:45-12:10 Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1)
-- Background and Outline --
ISEC2019-51 SITE2019-45 BioX2019-43 HWS2019-46 ICSS2019-49 EMM2019-54
Takushi Otani (Kibi International Univ.), Hirotaka Osawa (Tsukuba Univ.), Minao Kukita (Nagoya Univ.), Reina Saijo (Kyoto Univ.)
Wed, Jul 24 PM  A-5:ISEC(4):104
13:45 - 15:50
(53)
ISEC
13:45-14:10 3 Layers Public Key Cryptosystem with a Short Tandem Repeat DNA for Ultimate Personal Identification
-- Introduction of Short Tandem Repeat Coupled with Mai Nanbaa and its Application --
ISEC2019-52 SITE2019-46 BioX2019-44 HWS2019-47 ICSS2019-50 EMM2019-55
Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Ko Shikata (Chuo Univ.), Koji Sasaki, Nobuharu Suzuki (Ad.)
(54)
ISEC
14:10-14:35 Anonymous Public-Key Certificates based on Elliptic Curve ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56 Kazuomi Oishi (SIST)
(55)
ISEC
14:35-15:00 A Method for Key-Updatable Symmetric Searchable Encryption ISEC2019-54 SITE2019-48 BioX2019-46 HWS2019-49 ICSS2019-52 EMM2019-57 Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki)
(56)
ISEC
15:00-15:25 Participation Report of the 9th BIU Winter School on Cryptography ISEC2019-55 SITE2019-49 BioX2019-47 HWS2019-50 ICSS2019-53 EMM2019-58 Hiroaki Anada (Univ. Nagasaki)
(57)
ISEC
15:25-15:50 Garbled Circuit by three valued logics by Bochvar ISEC2019-56 SITE2019-50 BioX2019-48 HWS2019-51 ICSS2019-54 EMM2019-59 Shunsuke Hayashi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ.)
Wed, Jul 24 PM  B-5:HWS(3):213
13:45 - 15:50
(58)
HWS
13:45-14:10 Design Space Search Applying Bayesian Optimization to High-level Design Flow ISEC2019-57 SITE2019-51 BioX2019-49 HWS2019-52 ICSS2019-55 EMM2019-60 Ryohei Nakayama (UTokyo), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo)
(59)
HWS
14:10-14:35 Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset ISEC2019-58 SITE2019-52 BioX2019-50 HWS2019-53 ICSS2019-56 EMM2019-61 Rei Ueno (Tohoku Univ.), Sumio Morioka (IST), Noriyuki Miura, Kohei Matsuda, Makoto Nagata (Kobe Univ.), Shivam Bhasin (NTU), Yves Mathieu, Tarik Graba, Jean-Luc Danger (TPT), Naofumi Homma (Tohoku Univ.)
(60)
HWS
14:35-15:00 Design of High Performance Processor for Paillier Algorithm With Homomorphism ISEC2019-59 SITE2019-53 BioX2019-51 HWS2019-54 ICSS2019-57 EMM2019-62 Chun Cai, Hiromitsu Awano, Makoto Ikeda (Tokyo Univ.)
(61)
HWS
15:00-15:25 Potential Method to Extract Uniqueness from Non-Ideality of Sensor Device ISEC2019-60 SITE2019-54 BioX2019-52 HWS2019-55 ICSS2019-58 EMM2019-63 Thibaut Constant, Makoto Nagata, Noriyuki Miura (Kobe Univ.)
(62)
HWS
15:25-15:50 Possibility of Identifying USB Device by Voltage Changing ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU)
Wed, Jul 24 PM  C-5:SPT:210
13:45 - 15:25
(63) 13:45-14:10 メールにおける誘導手口の推定手法に関する検討
○山本匠・西川弘毅・岩崎亜衣子(三菱電機)・上原 航汰(静岡大学)・Harsham Bret・WangYe・HoriChiori・河内清人(三菱電機)・西垣正勝(静岡大学)
(64) 14:10-14:35 新聞で報道される情報漏えい事故の属性分析
○新原功一・菊池浩明(明治大学)
(65) 14:35-15:00 セキュリティやプライバシーに関するSoK論文やサーベイ論文をSoKする
○金岡晃(東邦大学)
(66) 15:00-15:25 情報セキュリティに関連するガイドラインのDoc2Vecを用いた文書内容の可視化手法の提案とその評価
○尾崎敏司(筑波大学/トレンドマイクロ)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.
Invited TalkEach speech will have 50 minutes for presentation and 10 minutes for discussion.

Contact Address and Latest Schedule Information
EMM Technical Committee on Enriched MultiMedia (EMM)   [Latest Schedule]
Contact Address  
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Kazumasa Omote (University of Tsukuba)
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
BioX Technical Committee on Biometrics (BioX)   [Latest Schedule]
Contact Address  
HWS Technical Committee on Hardware Security (HWS)   [Latest Schedule]
Contact Address Noriyuki Miura(Kobe University), Hiroki Kunii(SECOM)
E--mail:hws-c 
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Hiroki Takakura(National Institute of Informatics)
E--mail: is-adm-q 
Announcement Latest information will be presented on the homepage:
https://www.ieice.org/iss/icss/index-en.html
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2019-07-06 20:49:13


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to BioX Schedule Page]   /   [Return to HWS Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev EMM Conf / Next EMM Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan