IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Special Interest Group on Computer Security (IPSJ-CSEC)  (Searched in: 2018)

Search Results: Keywords 'from:2018-07-25 to:2018-07-25'

[Go to Official IPSJ-CSEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 37 of 37 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
09:55
Hokkaido Sapporo Convention Center Effects of high frequency components on steganalysis of data hiding in low-order bits of an audio waveform
Akira Nishimura (Tokyo Univ. Info. Sci.) ISEC2018-33 SITE2018-25 HWS2018-30 ICSS2018-36 EMM2018-32
Steganalysis, which identifies the presence or absence of information hiding in
digital contents, is important in orde... [more]
ISEC2018-33 SITE2018-25 HWS2018-30 ICSS2018-36 EMM2018-32
pp.229-236
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:20
Hokkaido Sapporo Convention Center Regulatory Policies Regarding Mobile Spectrum Holdings in the United States and EU Countries
Tomoko Yamajo (KDDI Research) ISEC2018-34 SITE2018-26 HWS2018-31 ICSS2018-37 EMM2018-33
While spectrum auction and second market transactions would promote efficient use of spectrum, they might distort compet... [more] ISEC2018-34 SITE2018-26 HWS2018-31 ICSS2018-37 EMM2018-33
pp.269-274
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:45
Hokkaido Sapporo Convention Center A Study on Limitation on Copyright in Machine Learning -- Review of the reform bill in Japan --
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yosuke Murakami (KDDI Research) ISEC2018-35 SITE2018-27 HWS2018-32 ICSS2018-38 EMM2018-34
 [more] ISEC2018-35 SITE2018-27 HWS2018-32 ICSS2018-38 EMM2018-34
pp.275-280
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
12:10
Hokkaido Sapporo Convention Center About Access Control with the Deconstruction Device in Probability Measures on Metric Spaces
Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35
The word of Socrates: "Not life, but good life, is to be chiefly valued" is the dichotomy between the two, if we see tha... [more] ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35
pp.281-287
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:20
Hokkaido Sapporo Convention Center
Kenta Watanabe, Miwako Mishima (Gifu Univ.) ISEC2018-37 SITE2018-29 HWS2018-34 ICSS2018-40 EMM2018-36
(To be available after the conference date) [more] ISEC2018-37 SITE2018-29 HWS2018-34 ICSS2018-40 EMM2018-36
pp.289-295
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
11:45
Hokkaido Sapporo Convention Center Real-time Botnet Detection Using Nonnegative Tucker Decomposition
Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT) ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
This study focuses on darknet traffic analysis and applies tensor factorization in order to detect coordinated group act... [more] ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37
pp.297-304
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
12:10
Hokkaido Sapporo Convention Center ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38
pp.305-310
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
13:45
Hokkaido Sapporo Convention Center Consideration on Crypto Key Management Devices on the Market.
Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM) ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39
Cryptographic key management devices have been widely used to hire crypt-technologies securely. Most of these cryptograp... [more] ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39
pp.327-332
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:10
Hokkaido Sapporo Convention Center Compensation of Temperature Induced Flipping-Bits in CMOS SRAM PUF by NMOS Body-Bias
Xuanhao Zhang, Xiang Chen, Hanfeng Sun, Hirofumi Shinohara (Waseda Univ.) ISEC2018-41 SITE2018-33 HWS2018-38 ICSS2018-44 EMM2018-40
PUF suffers from flipping-bits caused by temperature changes which degrade the stability of output. This paper proposes ... [more] ISEC2018-41 SITE2018-33 HWS2018-38 ICSS2018-44 EMM2018-40
pp.333-336
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:35
Hokkaido Sapporo Convention Center Side-Channel Countermeasure for XOR based PUF and Its Evaluation
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
XOR based physical unclonable functions (PUFs) have been proposed as countermeasures against modeling attacks. On the ot... [more] ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41
pp.337-342
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:00
Hokkaido Sapporo Convention Center Side-Channel Attacks on an Error-Correction Circuit of Fuzzy Extractor
Yuta Goto, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ) ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42
(To be available after the conference date) [more] ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42
pp.343-348
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:25
Hokkaido Sapporo Convention Center A Study on Systematic Insertion of Hardware Trojan Based on Path Delay
Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.) ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43
This paper presents a non-reversible and analytical method for inserting a path delay hardware Trojan (PDHT). The conven... [more] ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43
pp.349-356
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
13:45
Hokkaido Sapporo Convention Center Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT
Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo Univ.) ISEC2018-45 SITE2018-37 HWS2018-42 ICSS2018-48 EMM2018-44
 [more] ISEC2018-45 SITE2018-37 HWS2018-42 ICSS2018-48 EMM2018-44
pp.357-362
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:10
Hokkaido Sapporo Convention Center A New Embedding Method for Generalized LWE
Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45
pp.363-370
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
14:35
Hokkaido Sapporo Convention Center The Precise Security Analysis of Block Ciphers Enhanced by FX-Construction against a Quantum Algorithm
Syo Yasui, Noboru Kunihiro (UTokyo) ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46
 [more] ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46
pp.371-378
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:00
Hokkaido Sapporo Convention Center Plaintext Recovery Attacks against WPA-TKIP Using Iterated RC4 Key Correlations
Ryoma Ito, Atsuko Miyaji (Osaka Univ.) ISEC2018-48 SITE2018-40 HWS2018-45 ICSS2018-51 EMM2018-47
 [more] ISEC2018-48 SITE2018-40 HWS2018-45 ICSS2018-51 EMM2018-47
pp.379-386
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:25
Hokkaido Sapporo Convention Center A construction of generic Multiparty Private Set Intersection
Katsunari Shishido, Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ISEC2018-49 SITE2018-41 HWS2018-46 ICSS2018-52 EMM2018-48
Nowadays, many organizations, such as companies and hospitals store and use a lot of data, that includes Personal Inform... [more] ISEC2018-49 SITE2018-41 HWS2018-46 ICSS2018-52 EMM2018-48
pp.387-394
 Results 21 - 37 of 37 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan