IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:25
Kochi Kochi University of Technology A simulation of a 3-D visual cryptography using holography
Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37
pp.187-192
ET 2017-03-10
13:10
Ehime National Institute of Technology, Niihama College Calculation Method of Expression's Plainness to Estimate Understandability for Learning Resource Recommendation
Yuri Fujisaki, Yasuo Miyoshi, Kazuhiro Suzuki, Ken-ichi Shiota, Ryo Okamoto (Kochi Univ.) ET2016-122
 [more] ET2016-122
pp.163-166
LOIS, ISEC, SITE 2015-11-06
09:25
Kanagawa Kanagawa Univ. An approach to assess the risk of information leakage by inference -- A pilot study of methods using a breadth first search in digraphs and mutual information --
Kazuhiro Suzuki, Shohei Kitamura, Noriki Hirai (Kochi Univ.) ISEC2015-37 SITE2015-24 LOIS2015-31
 [more] ISEC2015-37 SITE2015-24 LOIS2015-31
pp.7-10
ISEC, LOIS, SITE 2014-11-22
10:15
Hyogo   An approach to assess the risk of information leakage by inference -- A pilot study of a visualization tool and an algorithm using local connectivity in digraphs --
Kazuhiro Suzuki, Haruka Uchima, Miki Kondo (Kochi Univ.) ISEC2014-63 SITE2014-54 LOIS2014-33
We study a graph-based model against information leakage from multiple pieces of information, where a relationship among... [more] ISEC2014-63 SITE2014-54 LOIS2014-33
pp.45-50
ET 2014-03-08
16:40
Kochi Kochi National College of Technology Creation of Correct Data to Evaluate a Difficulty Estimation Algorithm for Recommendation of Learning Contents
Yasuo Miyoshi, Kazunobu Hamada, Kazuhiro Suzuki, Ken-ichi Shiota, Ryo Okamoto (Kochi Univ.) ET2013-119
The popular technology for the information recommendation of books or web pages is based on taste information from many ... [more] ET2013-119
pp.161-164
IMQ 2013-12-13
15:25
Shizuoka Hamamatsu Campus, Shizuoka Univ. Comparison between subjective and objective evaluations using VSNR for 3-D image
Kazuhiro Suzuki, Yuji Sakamoto (Hokkaido Univ.) IMQ2013-21
Some three-dimensional display technology has been noted. Various techniques are proposed and utilized for three-dimensi... [more] IMQ2013-21
pp.21-26
IA, SITE, IPSJ-IOT [detail] 2012-03-15
15:25
Hokkaido Hokkaido Univ. A study of implementation for A 1-Round Almost Secure Message Transmission Protocol
Tomoya Kuriyama (Kanagawa Univ.), Kazuhiro Suzuki (Kochi Univ.), Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co , Ltd.) SITE2011-36 IA2011-86
A public key cryptosystem needs a trusted third party that proves the legitimacy of public keys.
However,an n-channel s... [more]
SITE2011-36 IA2011-86
pp.37-42
IA, SITE, IPSJ-IOT [detail] 2012-03-16
10:00
Hokkaido Hokkaido Univ. The improvement of a hypergraph-based model against information leakage by inference
Ryo Suzuki (Kanagawa Univ.), Kazuhiro Suzuki (Kochi Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-49 IA2011-99
With the advance of internet technology, there has been an explosive increase in information. SNS and cloud services mak... [more] SITE2011-49 IA2011-99
pp.197-202
SITE, IPSJ-CE 2011-12-17
16:45
Shimane   About "swarm intelligence parameters" as a "mirror of an act" for "good life"
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki (Kochi University), Masato Noto, Hirotsugu Kinoshita (KU) SITE2011-31
The swarm intelligence system which considers that the chains of acts are a mass of particles could have Wittgenstein "l... [more] SITE2011-31
pp.35-40
SITE 2011-10-18
14:00
Tokyo   About the behavior of the agent-object that describes action unit, and ethics of the swarm
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki (Kouchi University), Masato Noto, Hirotsugu Kinoshita (KU) SITE2011-24
We have studied until now the system that realizes circulation of the value of self and the value of the public in "chan... [more] SITE2011-24
pp.1-6
SITE, IPSJ-EIP 2011-05-19
10:50
Tokyo Tokyo Univ. of Science Genetic Access Matrix Analysis Based on Multi Agent Model
Tetsuya Morizumi (Toyo Nets. & S. I. Co. Ltd.), Kazuhiro Suzuki, Masato Noto, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-3
How should individuals contribute to the public good? Conversely, how does the public help the individual? We should ana... [more] SITE2011-3
pp.11-16
SITE 2010-10-15
10:50
Tokyo Nihon Univ. (Surugadai) Floating Order Concept of the Cloud -- Proposal of Community Provisioning --
Tetsuya Morizumi (TNSi), Naoya Kubo, Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) SITE2010-36
This paper aims the construction of a conceptual frame that achieves floating order that always adjusts to the changing ... [more] SITE2010-36
pp.13-18
SITE, IPSJ-EIP 2010-05-28
11:05
Tokyo   About an Ethical Meaning To Control Information Flows, and to Obstruct Covert Channels
Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2010-2
 [more] SITE2010-2
pp.13-18
IA, SITE, IPSJ-IOT [detail] 2010-03-02
15:25
Miyagi   About A Semantics for Multi-Agent System to Control Information Flows
Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-70 IA2009-122
We describe a system which controls information flows and prevents the information leakages and the information falsific... [more] SITE2009-70 IA2009-122
pp.283-288
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
16:10
Akita Akita University About the Security Model built in the Search Engine
Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) ISEC2009-22 SITE2009-14 ICSS2009-36
The Cloud is the logic system with name space where relationships among resources in the Internet are represented by pre... [more] ISEC2009-22 SITE2009-14 ICSS2009-36
pp.45-49
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
16:35
Akita Akita University Logical Structure of the Cloud Which Projects Various Values onto Oneself -- From the Aspect of the Agent of Self-Referred Social Systems --
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2009-23 SITE2009-15 ICSS2009-37
The semantics cloud is a logical system that the relation of the object world is described by the predicate logic, and t... [more] ISEC2009-23 SITE2009-15 ICSS2009-37
pp.51-56
SITE, IPSJ-EIP 2009-06-05
14:25
Tokyo   About Ethics of the Internet Transformed to the Clouds -- From the Aspect of the Access Control --
Tetsuya Morizumi (Toyo Networks & System Integration Co., LTD.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-1
In this paper ethical problems of the cloud in the Internet is shown. The cloud is defined as follows; the cloud is a lo... [more] SITE2009-1
pp.45-50
SITE, IPSJ-EIP 2009-06-05
14:50
Tokyo   Web push proposal upon the information flow control -- Implimentaion of the filter information in the application server --
Akihito Toda (Kanagawa Univ.), Hiroshi Ichise (UNITEC Co.,Ltd.), Kazuhiro Suzuki (Kanagawa Univ.), Tetsuya Morizumi (Toyo Netwarks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-2
Cloud is defined as follows; cloud is a pair of the meta-language and the address. Cloud is used to control covert chann... [more] SITE2009-2
pp.51-56
ISEC 2007-09-07
11:15
Tokyo Kikai-Shinko-Kaikan Bldg. How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2007-79
The hash function HAVAL
is a well known Merkle-Damg\r{a}rd hash function such as MD4 and MD5.
It has three variants, $... [more]
ISEC2007-79
pp.41-48
ISEC 2007-05-18
12:50
Tokyo Kikai-Shinko-Kaikan Bldg. Birthday Paradox for Multi-Collisions
Kazuhiro Suzuki (Ibaraki Univ.), Dongvu Tonien (Uni.y of Wollongong), Kaoru Kurosawa, Koji Toyota (Ibaraki Univ.) ISEC2007-6
In this paper, we study multi-collision probability.
For a hash function $H:D \rightarrow R$
with $|R|=n$,
it has be... [more]
ISEC2007-6
pp.39-44
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan