Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 09:55 |
Hokkaido |
Sapporo Convention Center |
Effects of high frequency components on steganalysis of data hiding in low-order bits of an audio waveform Akira Nishimura (Tokyo Univ. Info. Sci.) ISEC2018-33 SITE2018-25 HWS2018-30 ICSS2018-36 EMM2018-32 |
Steganalysis, which identifies the presence or absence of information hiding in
digital contents, is important in orde... [more] |
ISEC2018-33 SITE2018-25 HWS2018-30 ICSS2018-36 EMM2018-32 pp.229-236 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:20 |
Hokkaido |
Sapporo Convention Center |
Regulatory Policies Regarding Mobile Spectrum Holdings in the United States and EU Countries Tomoko Yamajo (KDDI Research) ISEC2018-34 SITE2018-26 HWS2018-31 ICSS2018-37 EMM2018-33 |
While spectrum auction and second market transactions would promote efficient use of spectrum, they might distort compet... [more] |
ISEC2018-34 SITE2018-26 HWS2018-31 ICSS2018-37 EMM2018-33 pp.269-274 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:45 |
Hokkaido |
Sapporo Convention Center |
A Study on Limitation on Copyright in Machine Learning
-- Review of the reform bill in Japan -- Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yosuke Murakami (KDDI Research) ISEC2018-35 SITE2018-27 HWS2018-32 ICSS2018-38 EMM2018-34 |
[more] |
ISEC2018-35 SITE2018-27 HWS2018-32 ICSS2018-38 EMM2018-34 pp.275-280 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
About Access Control with the Deconstruction Device in Probability Measures on Metric Spaces Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35 |
The word of Socrates: "Not life, but good life, is to be chiefly valued" is the dichotomy between the two, if we see tha... [more] |
ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35 pp.281-287 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:20 |
Hokkaido |
Sapporo Convention Center |
Kenta Watanabe, Miwako Mishima (Gifu Univ.) ISEC2018-37 SITE2018-29 HWS2018-34 ICSS2018-40 EMM2018-36 |
(To be available after the conference date) [more] |
ISEC2018-37 SITE2018-29 HWS2018-34 ICSS2018-40 EMM2018-36 pp.289-295 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:45 |
Hokkaido |
Sapporo Convention Center |
Real-time Botnet Detection Using Nonnegative Tucker Decomposition Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 |
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] |
ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 pp.297-304 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 |
This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 pp.305-310 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 13:45 |
Hokkaido |
Sapporo Convention Center |
Consideration on Crypto Key Management Devices on the Market. Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM) ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39 |
Cryptographic key management devices have been widely used to hire crypt-technologies securely. Most of these cryptograp... [more] |
ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39 pp.327-332 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
Compensation of Temperature Induced Flipping-Bits in CMOS SRAM PUF by NMOS Body-Bias Xuanhao Zhang, Xiang Chen, Hanfeng Sun, Hirofumi Shinohara (Waseda Univ.) ISEC2018-41 SITE2018-33 HWS2018-38 ICSS2018-44 EMM2018-40 |
PUF suffers from flipping-bits caused by temperature changes which degrade the stability of output. This paper proposes ... [more] |
ISEC2018-41 SITE2018-33 HWS2018-38 ICSS2018-44 EMM2018-40 pp.333-336 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:35 |
Hokkaido |
Sapporo Convention Center |
Side-Channel Countermeasure for XOR based PUF and Its Evaluation Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 |
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] |
ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 pp.337-342 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:00 |
Hokkaido |
Sapporo Convention Center |
Side-Channel Attacks on an Error-Correction Circuit of Fuzzy Extractor Yuta Goto, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ) ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42 |
(To be available after the conference date) [more] |
ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42 pp.343-348 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:25 |
Hokkaido |
Sapporo Convention Center |
A Study on Systematic Insertion of Hardware Trojan Based on Path Delay Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 |
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] |
ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 pp.349-356 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 13:45 |
Hokkaido |
Sapporo Convention Center |
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo Univ.) ISEC2018-45 SITE2018-37 HWS2018-42 ICSS2018-48 EMM2018-44 |
[more] |
ISEC2018-45 SITE2018-37 HWS2018-42 ICSS2018-48 EMM2018-44 pp.357-362 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 |
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] |
ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 pp.363-370 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:35 |
Hokkaido |
Sapporo Convention Center |
The Precise Security Analysis of Block Ciphers Enhanced by FX-Construction against a Quantum Algorithm Syo Yasui, Noboru Kunihiro (UTokyo) ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46 |
[more] |
ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46 pp.371-378 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:00 |
Hokkaido |
Sapporo Convention Center |
Plaintext Recovery Attacks against WPA-TKIP Using Iterated RC4 Key Correlations Ryoma Ito, Atsuko Miyaji (Osaka Univ.) ISEC2018-48 SITE2018-40 HWS2018-45 ICSS2018-51 EMM2018-47 |
[more] |
ISEC2018-48 SITE2018-40 HWS2018-45 ICSS2018-51 EMM2018-47 pp.379-386 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:25 |
Hokkaido |
Sapporo Convention Center |
A construction of generic Multiparty Private Set Intersection Katsunari Shishido, Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ISEC2018-49 SITE2018-41 HWS2018-46 ICSS2018-52 EMM2018-48 |
Nowadays, many organizations, such as companies and hospitals store and use a lot of data, that includes Personal Inform... [more] |
ISEC2018-49 SITE2018-41 HWS2018-46 ICSS2018-52 EMM2018-48 pp.387-394 |