Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EA, ASJ-H, ASJ-AA |
2018-07-25 14:30 |
Hokkaido |
Hokkaido Univ. |
The possibility of cross-platform library “JUCE”
-- The reason why programmers for music production software choose JUCE -- Shigeru Tanabu, Yohta Watanabe (CFM) EA2018-25 |
“JUCE” is a very useful C++ cross platform application framework that is designed especially to develop audio applicatio... [more] |
EA2018-25 pp.147-151 |
EA, ASJ-H |
2017-07-21 13:40 |
Hokkaido |
Hokkaido Univ. |
EA2017-13 |
Crypton Future Media Co, Inc. started business as an import agent and has been distributing audio products over 20 years... [more] |
EA2017-13 pp.75-77 |
EA |
2013-07-19 09:00 |
Hokkaido |
Health Sci. Univ. of Hokkaido |
Possibility of Sound Programming for Acoustic Education Naofumi Aoki (Hokkaido Univ.), Keisuke Ai (Crypton Future Media) EA2013-43 |
Sound programming has a short history so that the sharing of its know-how is still capable of improvement. This paper in... [more] |
EA2013-43 pp.57-61 |
ICSS |
2011-03-25 10:45 |
Tokyo |
Suspended |
Proposal of an Order Preserving Encryption for Anonymity Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57 |
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] |
ICSS2010-57 pp.5-10 |
ICSS |
2010-11-05 11:20 |
Hiroshima |
Hiroshima City University |
Proposal of Time-limited Key Management Scheme Using One-way Functions Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46 |
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] |
ICSS2010-46 pp.11-15 |
IA, ICSS |
2010-06-17 15:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II) Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6 |
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] |
IA2010-6 ICSS2010-6 pp.31-36 |
IA, ICSS |
2010-06-17 15:45 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7 |
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] |
IA2010-7 ICSS2010-7 pp.37-42 |
LOIS, IE, ITE-ME, IEE-CMN |
2009-09-25 16:50 |
Hiroshima |
Hiroshima Univ. |
Evaluation of Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes Tatsuya Takehisa (Japan Datacom Co., Ltd), Masanori Hirotomo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) LOIS2009-39 IE2009-80 |
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the ... [more] |
LOIS2009-39 IE2009-80 pp.119-124 |
IA, ICSS |
2009-06-18 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13 |
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] |
IA2009-5 ICSS2009-13 pp.25-30 |
IA, ICSS |
2009-06-18 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14 |
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] |
IA2009-6 ICSS2009-14 pp.31-36 |
IA, ICSS |
2009-06-18 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15 |
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] |
IA2009-7 ICSS2009-15 pp.37-42 |
IA, ICSS |
2009-06-18 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16 |
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] |
IA2009-8 ICSS2009-16 pp.43-48 |
IA, ICSS |
2009-06-19 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Study on Classification of Malware and it Applications Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27 |
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] |
IA2009-19 ICSS2009-27 pp.103-108 |
IA, ICSS |
2009-06-19 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28 |
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more] |
IA2009-20 ICSS2009-28 pp.109-114 |