Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:25 |
Tokyo |
|
Investigation of spikegram-based signal representation for speech fingerprints Dung Kim Tran, Masashi Unoki (JAIST) ISEC2017-32 SITE2017-24 ICSS2017-31 EMM2017-35 |
This paper investigates the ability of spikegrams in representing the speech content and voice identications of speech s... [more] |
ISEC2017-32 SITE2017-24 ICSS2017-31 EMM2017-35 pp.241-246 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Study of template matching application of steganography ANGO Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36 |
We propose a method ANGO(=Asymmetric Nondestractive steGanOgraphy) to extract different third information by two(o... [more] |
ISEC2017-33 SITE2017-25 ICSS2017-32 EMM2017-36 pp.247-252 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 14:15 |
Tokyo |
|
A Data Embedding for NGS Data Motoshige Takagi (SST) ISEC2017-34 SITE2017-26 ICSS2017-33 EMM2017-37 |
We have proposed a data hiding method for DNA and RNA data outputted from Next Generation Sequencer(NGS). The data of ne... [more] |
ISEC2017-34 SITE2017-26 ICSS2017-33 EMM2017-37 pp.253-258 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:25 |
Tokyo |
|
Proposal of Personal Authentication Method by Visual Secret Scheme Using Smart Phone Ryo Mizuno, Hiroyuki Inaba (KIT) ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38 |
[more] |
ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38 pp.259-266 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:50 |
Tokyo |
|
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 |
It emerges that the use of security systems which separate device resources into Trusted Execution Environment (TEE) and... [more] |
ISEC2017-36 SITE2017-28 ICSS2017-35 EMM2017-39 pp.267-274 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 14:15 |
Tokyo |
|
Zynq-based Coprocessor Development Environment for Cryptography with Advanced Functionality and Its Evaluation Takanori Miyoshi, Tsutomu Matsumoto (YNU) ISEC2017-37 SITE2017-29 ICSS2017-36 EMM2017-40 |
Bilinear pairing has a potential to produce a lot of new cryptographic protocols enabling advanced functionalities such ... [more] |
ISEC2017-37 SITE2017-29 ICSS2017-36 EMM2017-40 pp.275-280 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 14:40 |
Tokyo |
|
Proof Of Retrievability for Lightweight Secure Cloud Storage Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba) ISEC2017-38 SITE2017-30 ICSS2017-37 EMM2017-41 |
Cloud storage has been gaining in popularity as an on-line service for archiving or backup. However, due to the data out... [more] |
ISEC2017-38 SITE2017-30 ICSS2017-37 EMM2017-41 pp.281-288 |