Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2021-06-21 13:05 |
Online |
Online |
Post-Quantum Commitment Scheme with Extending Message Length Hideaki Miyaji (OU), Yuntao Wang (JAIST), Atsuko Miyaji (OU) IA2021-1 ICSS2021-1 |
[more] |
IA2021-1 ICSS2021-1 pp.1-7 |
IA, ICSS |
2021-06-21 13:30 |
Online |
Online |
secure isogeny-based cryptosystem CSIDH for side-channel attacks Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IA2021-2 ICSS2021-2 pp.8-13 |
IA, ICSS |
2021-06-21 13:55 |
Online |
Online |
An initial evaluation between C language and PRSafe for developing eBPF programs Mahadevan Sai Veerya, Takano Yuuki, Miyaji Atsuko (Handai) IA2021-3 ICSS2021-3 |
The eBPF ( Berkeley Packet Filter) in the Linux OS is a virtual machine for running user-space programs written in C lan... [more] |
IA2021-3 ICSS2021-3 pp.14-19 |
IA, ICSS |
2021-06-21 14:30 |
Online |
Online |
Development and evaluation of growth estimation sensing system for aquaponics using multiple types of depth cameras Ryota Murakami, Hiroshi Yamamoto (Ritsumeikan Univ.) IA2021-4 ICSS2021-4 |
The traditional agricultural work is a heavy burden for the elderly, hence there is an urgent need to automate and impro... [more] |
IA2021-4 ICSS2021-4 pp.20-26 |
IA, ICSS |
2021-06-21 14:55 |
Online |
Online |
Development and evaluation of fatigue level estimation system using spatio-temporal analysis of Web camera images Takuro Nonomura (Ritsumei Univ.), Takashi Hayakawa (NEC Solution Innovators, Ltd.), Hiroshi Yamamoto (Ritsumei Univ.) IA2021-5 ICSS2021-5 |
[more] |
IA2021-5 ICSS2021-5 pp.27-32 |
IA, ICSS |
2021-06-21 15:25 |
Online |
Online |
Development and evaluation of condition detection system of harmful animals by interlocking a doppler sensor and a thermal camera Uchiyama Keigo, Yamamoto Hiroshi (Ritsumeikan Univ.), Utsunomiya Eiji, Yoshihara Kiyohito (KDDI Research) IA2021-6 ICSS2021-6 |
In recent years, damage to crops and injuries to humans by harmful birds and beasts have increased in various parts of J... [more] |
IA2021-6 ICSS2021-6 pp.33-38 |
IA, ICSS |
2021-06-21 15:50 |
Online |
Online |
Verification of Applying Plumtree Algorithm to Blockchain Networks Yusuke Kitagawa (Kogakuin Univ.), Kazuyuki Shudo (Tokyo Tech), Osamu Mizuno, Ryohei Banno (Kogakuin Univ.) IA2021-7 ICSS2021-7 |
Blockchain is gaining attention as a technology to support cryptocurrency. It is a system that prevents internal and ext... [more] |
IA2021-7 ICSS2021-7 pp.39-42 |
IA, ICSS |
2021-06-21 16:25 |
Online |
Online |
[Invited Talk]
An Authentication Scheme for WLAN Physical Layer Miyuki Hirose (KIT) IA2021-8 ICSS2021-8 |
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] |
IA2021-8 ICSS2021-8 p.43 |
IA, ICSS |
2021-06-22 09:00 |
Online |
Online |
Feature analysis of phishing website and phishing detection based on machine learning algorithms Yi Wei, Yuji Sekiya (Todai) IA2021-9 ICSS2021-9 |
Phishing is a kind of cybercrime that uses disguised websites to trick people into providing personally sensitive inform... [more] |
IA2021-9 ICSS2021-9 pp.44-49 |
IA, ICSS |
2021-06-22 09:25 |
Online |
Online |
Analtsis of cost-effectiveness in malicious site detection using VirusTotal Kyohei Takao (YNU), Hiroshi Mori (Deloitte Tohmatsu Cyber LLC), Rui Tanabe, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) IA2021-10 ICSS2021-10 |
VirusTotal receives to-be-tested files and URLs and provides scan results by more than 70 security software.
Its incre... [more] |
IA2021-10 ICSS2021-10 pp.50-55 |
IA, ICSS |
2021-06-22 09:50 |
Online |
Online |
Etherpot: A honeypot for observing cyberattacks on Ethereum client Wang Jia, Sasaki Takayuki (Yokohama National Univ.), Omote Kazumasa (Univ. of Tsukuba), Yoshioka Katsunari, Matsumoto Tsutomu (Yokohama National Univ.) IA2021-11 ICSS2021-11 |
In recent years, Ethereum has received a great deal of attention with the functionality to perform arbitrary programmabl... [more] |
IA2021-11 ICSS2021-11 pp.56-61 |
IA, ICSS |
2021-06-22 10:25 |
Online |
Online |
Performance Evaluation of MPTCP Scheduler for Video Streaming in Mobile Networks Masayoshi Kondo, Dirceu Cavendish, Daiki Nobayashi, Takeshi Ikenaga (KIT) IA2021-12 ICSS2021-12 |
With the increasing of the demand for video contents, the amount of video streaming traffic occupies the large portion o... [more] |
IA2021-12 ICSS2021-12 pp.62-67 |
IA, ICSS |
2021-06-22 10:50 |
Online |
Online |
Simulation Evaluation of Incentives for RPKI Deployment Tatsuya Oryu, Ishibashi Keisuke (ICU) IA2021-13 ICSS2021-13 |
The effectiveness of Resource Public Key Infrastructure (RPKI) has been proposed as a countermeasure against BGP route h... [more] |
IA2021-13 ICSS2021-13 pp.68-73 |
IA, ICSS |
2021-06-22 11:15 |
Online |
Online |
A Solution for Recovering Missing Links in Network Topology using Sparse Modeling Ryotaro Matsuo, Hiroyuki Ohsaki (Kwansei Gakuin Univ.) IA2021-14 ICSS2021-14 |
In recent years, sparse modeling, which is a statistical approach, has been applied to many practical problems mostly in... [more] |
IA2021-14 ICSS2021-14 pp.74-79 |