Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:25 |
Kochi |
Kochi University of Technology |
A simulation of a 3-D visual cryptography using holography Takumi Takazawa, Kazuhiro Suzuki, Naoki Takada (Kochi Univ.) ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 |
With the development of technologies for acquiring and recording data of 3-D objects, their security and privacy protect... [more] |
ISEC2019-34 SITE2019-28 BioX2019-26 HWS2019-29 ICSS2019-32 EMM2019-37 pp.187-192 |
ET |
2017-03-10 13:10 |
Ehime |
National Institute of Technology, Niihama College |
Calculation Method of Expression's Plainness to Estimate Understandability for Learning Resource Recommendation Yuri Fujisaki, Yasuo Miyoshi, Kazuhiro Suzuki, Ken-ichi Shiota, Ryo Okamoto (Kochi Univ.) ET2016-122 |
[more] |
ET2016-122 pp.163-166 |
LOIS, ISEC, SITE |
2015-11-06 09:25 |
Kanagawa |
Kanagawa Univ. |
An approach to assess the risk of information leakage by inference
-- A pilot study of methods using a breadth first search in digraphs and mutual information -- Kazuhiro Suzuki, Shohei Kitamura, Noriki Hirai (Kochi Univ.) ISEC2015-37 SITE2015-24 LOIS2015-31 |
[more] |
ISEC2015-37 SITE2015-24 LOIS2015-31 pp.7-10 |
ISEC, LOIS, SITE |
2014-11-22 10:15 |
Hyogo |
|
An approach to assess the risk of information leakage by inference
-- A pilot study of a visualization tool and an algorithm using local connectivity in digraphs -- Kazuhiro Suzuki, Haruka Uchima, Miki Kondo (Kochi Univ.) ISEC2014-63 SITE2014-54 LOIS2014-33 |
We study a graph-based model against information leakage from multiple pieces of information, where a relationship among... [more] |
ISEC2014-63 SITE2014-54 LOIS2014-33 pp.45-50 |
ET |
2014-03-08 16:40 |
Kochi |
Kochi National College of Technology |
Creation of Correct Data to Evaluate a Difficulty Estimation Algorithm for Recommendation of Learning Contents Yasuo Miyoshi, Kazunobu Hamada, Kazuhiro Suzuki, Ken-ichi Shiota, Ryo Okamoto (Kochi Univ.) ET2013-119 |
The popular technology for the information recommendation of books or web pages is based on taste information from many ... [more] |
ET2013-119 pp.161-164 |
IMQ |
2013-12-13 15:25 |
Shizuoka |
Hamamatsu Campus, Shizuoka Univ. |
Comparison between subjective and objective evaluations using VSNR for 3-D image Kazuhiro Suzuki, Yuji Sakamoto (Hokkaido Univ.) IMQ2013-21 |
Some three-dimensional display technology has been noted. Various techniques are proposed and utilized for three-dimensi... [more] |
IMQ2013-21 pp.21-26 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-15 15:25 |
Hokkaido |
Hokkaido Univ. |
A study of implementation for A 1-Round Almost Secure Message Transmission Protocol Tomoya Kuriyama (Kanagawa Univ.), Kazuhiro Suzuki (Kochi Univ.), Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co , Ltd.) SITE2011-36 IA2011-86 |
A public key cryptosystem needs a trusted third party that proves the legitimacy of public keys.
However,an n-channel s... [more] |
SITE2011-36 IA2011-86 pp.37-42 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 10:00 |
Hokkaido |
Hokkaido Univ. |
The improvement of a hypergraph-based model against information leakage by inference Ryo Suzuki (Kanagawa Univ.), Kazuhiro Suzuki (Kochi Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-49 IA2011-99 |
With the advance of internet technology, there has been an explosive increase in information. SNS and cloud services mak... [more] |
SITE2011-49 IA2011-99 pp.197-202 |
SITE, IPSJ-CE |
2011-12-17 16:45 |
Shimane |
|
About "swarm intelligence parameters" as a "mirror of an act" for "good life" Tetsuya Morizumi (TNSi), Kazuhiro Suzuki (Kochi University), Masato Noto, Hirotsugu Kinoshita (KU) SITE2011-31 |
The swarm intelligence system which considers that the chains of acts are a mass of particles could have Wittgenstein "l... [more] |
SITE2011-31 pp.35-40 |
SITE |
2011-10-18 14:00 |
Tokyo |
|
About the behavior of the agent-object that describes action unit, and ethics of the swarm Tetsuya Morizumi (TNSi), Kazuhiro Suzuki (Kouchi University), Masato Noto, Hirotsugu Kinoshita (KU) SITE2011-24 |
We have studied until now the system that realizes circulation of the value of self and the value of the public in "chan... [more] |
SITE2011-24 pp.1-6 |
SITE, IPSJ-EIP |
2011-05-19 10:50 |
Tokyo |
Tokyo Univ. of Science |
Genetic Access Matrix Analysis Based on Multi Agent Model Tetsuya Morizumi (Toyo Nets. & S. I. Co. Ltd.), Kazuhiro Suzuki, Masato Noto, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-3 |
How should individuals contribute to the public good? Conversely, how does the public help the individual? We should ana... [more] |
SITE2011-3 pp.11-16 |
SITE |
2010-10-15 10:50 |
Tokyo |
Nihon Univ. (Surugadai) |
Floating Order Concept of the Cloud
-- Proposal of Community Provisioning -- Tetsuya Morizumi (TNSi), Naoya Kubo, Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) SITE2010-36 |
This paper aims the construction of a conceptual frame that achieves floating order that always adjusts to the changing ... [more] |
SITE2010-36 pp.13-18 |
SITE, IPSJ-EIP |
2010-05-28 11:05 |
Tokyo |
|
About an Ethical Meaning To Control Information Flows, and to Obstruct Covert Channels Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2010-2 |
[more] |
SITE2010-2 pp.13-18 |
IA, SITE, IPSJ-IOT [detail] |
2010-03-02 15:25 |
Miyagi |
|
About A Semantics for Multi-Agent System to Control Information Flows Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-70 IA2009-122 |
We describe a system which controls information flows and prevents the information leakages and the information falsific... [more] |
SITE2009-70 IA2009-122 pp.283-288 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 16:10 |
Akita |
Akita University |
About the Security Model built in the Search Engine Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) ISEC2009-22 SITE2009-14 ICSS2009-36 |
The Cloud is the logic system with name space where relationships among resources in the Internet are represented by pre... [more] |
ISEC2009-22 SITE2009-14 ICSS2009-36 pp.45-49 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 16:35 |
Akita |
Akita University |
Logical Structure of the Cloud Which Projects Various Values onto Oneself
-- From the Aspect of the Agent of Self-Referred Social Systems -- Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2009-23 SITE2009-15 ICSS2009-37 |
The semantics cloud is a logical system that the relation of the object world is described by the predicate logic, and t... [more] |
ISEC2009-23 SITE2009-15 ICSS2009-37 pp.51-56 |
SITE, IPSJ-EIP |
2009-06-05 14:25 |
Tokyo |
|
About Ethics of the Internet Transformed to the Clouds
-- From the Aspect of the Access Control -- Tetsuya Morizumi (Toyo Networks & System Integration Co., LTD.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-1 |
In this paper ethical problems of the cloud in the Internet is shown. The cloud is defined as follows; the cloud is a lo... [more] |
SITE2009-1 pp.45-50 |
SITE, IPSJ-EIP |
2009-06-05 14:50 |
Tokyo |
|
Web push proposal upon the information flow control
-- Implimentaion of the filter information in the application server -- Akihito Toda (Kanagawa Univ.), Hiroshi Ichise (UNITEC Co.,Ltd.), Kazuhiro Suzuki (Kanagawa Univ.), Tetsuya Morizumi (Toyo Netwarks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-2 |
Cloud is defined as follows; cloud is a pair of the meta-language and the address. Cloud is used to control covert chann... [more] |
SITE2009-2 pp.51-56 |
ISEC |
2007-09-07 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
How To Find Many Collisions of 3-Pass HAVAL Kazuhiro Suzuki, Kaoru Kurosawa (Ibaraki Univ.) ISEC2007-79 |
The hash function HAVAL
is a well known Merkle-Damg\r{a}rd hash function such as MD4 and MD5.
It has three variants, $... [more] |
ISEC2007-79 pp.41-48 |
ISEC |
2007-05-18 12:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Birthday Paradox for Multi-Collisions Kazuhiro Suzuki (Ibaraki Univ.), Dongvu Tonien (Uni.y of Wollongong), Kaoru Kurosawa, Koji Toyota (Ibaraki Univ.) ISEC2007-6 |
In this paper, we study multi-collision probability.
For a hash function $H:D \rightarrow R$
with $|R|=n$,
it has be... [more] |
ISEC2007-6 pp.39-44 |