IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 22  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, LOIS 2021-01-21
17:50
Online Online Reproduction of Malware Behavior by Using Windows API Call Logs -- Support for Major Win32 APIs and State Restoration After the Reproduction --
Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] ICM2020-47 LOIS2020-35
pp.75-80
IT 2020-09-04
11:35
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
pp.31-36
ICSS, IPSJ-SPT 2020-03-02
11:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Log Storing System Using Blockchain
Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2019-73
 [more] ICSS2019-73
pp.31-36
ICSS 2018-11-22
10:50
Kagoshima   Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] ICSS2018-62
pp.49-54
ICSS 2017-11-21
09:30
Oita Beppu International Convention Center ICSS2017-42  [more] ICSS2017-42
pp.23-27
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
13:25
Tokyo   A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
pp.81-86
IA, ICSS 2017-06-08
15:40
Kochi Kochi University of Technolo, Eikokuji Campus On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7
 [more] IA2017-7 ICSS2017-7
pp.37-42
ICSS, IA 2016-06-06
15:00
Saga Saga University Development of Network Forensic System Using Filter Drivers
Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
 [more]
ICSS, IA 2016-06-07
13:00
Saga Saga University On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] IA2016-11 ICSS2016-11
pp.57-62
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-03
11:30
Aichi NAGOYA TRADE & INDUSTRY CENTER On Anxiety Factors in Indirect Use for Cloud Type Medical Systems
Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32
We have conducted questionnaire survey for our university students in order to clarify anxiety factors in indirect use f... [more] ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32
pp.143-149
LOIS 2015-03-05
09:40
Okinawa   On a Decentralization Function for Deposited Data
Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) LOIS2014-63
It is considered to be important that linkable anonymized data and its correspondence table between anonymous number and... [more] LOIS2014-63
pp.13-17
ICSS, IA 2014-06-06
15:15
Hyogo Takikawa Memorial Hall, Kobe University A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication
Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-13 ICSS2014-13
In the case of sending and receiving files which need secret via the Internet, files get encrypted. Encrypting files req... [more] IA2014-13 ICSS2014-13
pp.67-72
ICSS, IPSJ-SPT 2014-03-27
14:55
Okinawa Meio Univiersity SSL Client Authentication with TPM -- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate --
Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-66
TPM-embedded terminals can be used as authentication tokens by issuing certificates to signature keys generated by TPM. ... [more] ICSS2013-66
pp.25-30
LOIS 2014-03-08
16:20
Okinawa   Linkable System Using Encrypted Personal Identification Information for Clinical Research
Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] LOIS2013-79
pp.149-154
ISEC, LOIS 2013-11-29
10:55
Miyagi Tohoku Univ. on evaluation for estimating link loss rates by using network coding
Youji Fukuta (Aichi Univ. of Education), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.) ISEC2013-66 LOIS2013-32
Monitoring or inference of internal network characteristics, such as transmission topology, link losses and delay, from ... [more] ISEC2013-66 LOIS2013-32
pp.45-50
LOIS, ICM 2012-01-20
11:30
Kumamoto Sojo Univ. Development of software to present the same tests of physical strength of visuomotor transformation at the cognitive processing of concept formation for the analysis in brain activity using fMRI
Kei Sugiura (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Ayuko Tanaka (NIPH), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICM2011-39 LOIS2011-64
It has been focused for effect of exercise on dementia. We want to clarify the relationship between exercise and brain f... [more] ICM2011-39 LOIS2011-64
pp.45-50
WBS, IT, ISEC 2009-03-09
16:20
Hokkaido Hakodate Mirai Univ. Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks
Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.) IT2008-53 ISEC2008-111 WBS2008-66
Stream cipher is one of primitive classes in symmetric key ciphers where plaintext symbols are combined with pseudo rand... [more] IT2008-53 ISEC2008-111 WBS2008-66
pp.57-64
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System
Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] IT2008-55 ISEC2008-113 WBS2008-68
pp.71-78
WBS, IT, ISEC 2009-03-10
11:40
Hokkaido Hakodate Mirai Univ. Improvement of LFSR Initial State Reconstruction Algorithm in Fast Correlation Attack Using Dynamically Constructed Parity Check Equations
Hiroaki Saitoh, Masami Mohri (Gifu Univ.), Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-84 ISEC2008-142 WBS2008-97
Fast correlation attack (FCA) has been known as a method of cryptanalysis for the unpredictability of Nonlinear Combiner... [more] IT2008-84 ISEC2008-142 WBS2008-97
pp.259-266
ISEC, LOIS 2008-11-13
13:00
Aichi Nagoya Noh Theater On Host-based Packet Capturing Mechanism for Network Forensics
Shunsuke Inai (Nagoya Institute of Technology), Youji Fukuta (Aichi Univ. of Edu.), Shoji Mizobuchi (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Institute of Technology), Ryoji Noguchi (Toyotsu Syscom Corp.) ISEC2008-73 OIS2008-49
Digital forensics is application of computer crime investigation and analysis techniques in the interests of determing p... [more] ISEC2008-73 OIS2008-49
pp.1-6
 Results 1 - 20 of 22  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan