|
|
Technical Committee on Social Implications of Technology and Information Ethics (SITE) (Searched in: 2021)
|
|
Search Results: Keywords 'from:2021-11-12 to:2021-11-12'
|
[Go to Official SITE Homepage (Japanese)] |
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Ascending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, ISEC, LOIS |
2021-11-12 13:00 |
Online |
Online |
A Revocable Anonymous Reputation System for Crowd Sensing Haruki Kobayashi, Toru Nakanishi, Teruaki Kitasuka (Hiroshima Univ.) ISEC2021-41 SITE2021-35 LOIS2021-24 |
In crowdsensing, since the data gathered by the server includes user's GPS locations and moving paths, the anonymity of ... [more] |
ISEC2021-41 SITE2021-35 LOIS2021-24 pp.1-6 |
SITE, ISEC, LOIS |
2021-11-12 13:25 |
Online |
Online |
Zero-Knowledge Proof of Isolation in Graph with Strong Secrecy Tomoki Murakami, Toru Nakanishi, Katsunobu Imai (Hiroshima Univ.) ISEC2021-42 SITE2021-36 LOIS2021-25 |
Network systems can be represented using graphs. What is important for a tenant is that his system is well connected (co... [more] |
ISEC2021-42 SITE2021-36 LOIS2021-25 pp.7-12 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
SITE, ISEC, LOIS |
2021-11-12 14:25 |
Online |
Online |
A theory of designing two factor authentications: Google’s FIDO/U2F as an example Kouichi Sakurai (Kyushu Univ.) ISEC2021-44 SITE2021-38 LOIS2021-27 |
[more] |
ISEC2021-44 SITE2021-38 LOIS2021-27 pp.18-19 |
SITE, ISEC, LOIS |
2021-11-12 14:50 |
Online |
Online |
A Study of Deep Learning based Side-Channel Analysis on Lightweight Cryptography GIMLI-AEAD Keigo Ito, Akira Ito, Rei Ueno (Tohoku Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research Inc.), Naofumi Homma (Tohoku Univ.) ISEC2021-45 SITE2021-39 LOIS2021-28 |
In this paper, we describe a side-channel analysis for the lightweight cipher Gimli-AEAD.
In particular, we apply a De... [more] |
ISEC2021-45 SITE2021-39 LOIS2021-28 pp.20-25 |
SITE, ISEC, LOIS |
2021-11-12 15:40 |
Online |
Online |
[Invited Talk]
Integrating ELSI responses into business activities
-- Practice of industry-academia collaboration in the humanities and social sciences -- Atsuo Kishimoto (Osaka Univ.) ISEC2021-46 SITE2021-40 LOIS2021-29 |
In April 2020, Osaka University established a university-wide organization called ELSI Center, which was established in ... [more] |
ISEC2021-46 SITE2021-40 LOIS2021-29 pp.26-29 |
SITE, ISEC, LOIS |
2021-11-12 16:05 |
Online |
Online |
[Invited Talk]
Consensus Building on Cutting-edge Science and Society and Engineering Design Ryoju Hamada (ANCT) |
[more] |
|
SITE, ISEC, LOIS |
2021-11-12 16:30 |
Online |
Online |
[Invited Talk]
ICT-ELSI in Graduate Level
-- Case of "Ethics of Advanced Science and Technology" course -- Yuko Murakami (Rikkyo U) ISEC2021-47 SITE2021-41 LOIS2021-30 |
Considering artificial intelligence (AI) to be "advanced science and technology for information and knowledge," AI ethic... [more] |
ISEC2021-47 SITE2021-41 LOIS2021-30 pp.30-37 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|