IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Special Interest Group on Security Psychology and Trust (IPSJ-SPT)  (Searched in: 2013)

Search Results: Keywords 'from:2013-07-18 to:2013-07-18'

[Go to Official IPSJ-SPT Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 40 of 40 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:15
Hokkaido   On a Data-Hiding Technique Based on Complete Complementary Codes
Ryusuke Mayuzumi (Univ. of Electro-Comm.), Tetsuya Kojima (Tokyo National College of Tech.) ISEC2013-31 SITE2013-26 ICSS2013-36 EMM2013-33
Information hiding schemes using direct sequence spread spectrum techniques have been developed. It has been considered ... [more] ISEC2013-31 SITE2013-26 ICSS2013-36 EMM2013-33
pp.227-232
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:40
Hokkaido   Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection
Shengbei Wang, Masashi Unoki (JAIST) ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34
Digital watermarking for speech signals can effectively protect speech signals from malicious tampering. This paper prop... [more] ISEC2013-32 SITE2013-27 ICSS2013-37 EMM2013-34
pp.233-238
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
16:05
Hokkaido   An Approach to Amplitude Scaling Partial Encryption for Compressed Audio
Twe Ta Oo, Takao Onoye (Osaka Univ.), Kilho Shin (Univ. of Hyogo) ISEC2013-33 SITE2013-28 ICSS2013-38 EMM2013-35
 [more] ISEC2013-33 SITE2013-28 ICSS2013-38 EMM2013-35
pp.239-244
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
16:40
Hokkaido   [Invited Talk] Research on Information and Physical Security Technologies for Embedded Systems
Tsutomu Matsumoto (Yokohama National Univ.) ISEC2013-34 SITE2013-29 ICSS2013-39 EMM2013-36
I describe a personal view on the information and physical security technologies for embedded systems available in sever... [more] ISEC2013-34 SITE2013-29 ICSS2013-39 EMM2013-36
p.245
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
09:10
Hokkaido   A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
Password-based authenticated key exchange (PAKE) allowing users to utilize passwords as secret information is suitable f... [more] ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
pp.247-254
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
09:35
Hokkaido   Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
Daisuke Moriyama (NICT) ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38
Radio Frequency IDenti cations (RFID) are useful low-cost devices for identi cation or authentication systems through wi... [more] ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38
pp.255-261
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
10:15
Hokkaido   A Knapsack Cryptosystem Using Super-Decreasing Sequence
Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.) ISEC2013-37 SITE2013-32 ICSS2013-42 EMM2013-39
Merkle-Hellman proposed a knapsack public-key cryptosystem(MH scheme). However, MH scheme was broken by Shamir’s attack ... [more] ISEC2013-37 SITE2013-32 ICSS2013-42 EMM2013-39
pp.263-268
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
10:40
Hokkaido   An Attack Against ID-Based Non-Interactive Key Sharing Scheme Using RSA Problem
Yasuyuki Murakami, Shinsuke Hamasho (Osaka Electro-Comm. Univ.) ISEC2013-38 SITE2013-33 ICSS2013-43 EMM2013-40
 [more] ISEC2013-38 SITE2013-33 ICSS2013-43 EMM2013-40
pp.269-274
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:05
Hokkaido   Cryptanalysis of Rainbow Signature -- Enrico, you should have hacked further --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
Thomae et al. have proposed cryptanalysis of Rainbow, a multivariate public key signature system.
The methodology of so... [more]
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
pp.275-279
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:30
Hokkaido   Cryptosystems for Social Organizations Managed by Receiving Administrator -- TSK-MPKC for Hierarchical Organizations and ECC for Flat type Organizations --
Shigeo Tsujii, Hiroshi Yamaguchi, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.) ISEC2013-40 SITE2013-35 ICSS2013-45 EMM2013-42
 [more] ISEC2013-40 SITE2013-35 ICSS2013-45 EMM2013-42
pp.281-288
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
12:55
Hokkaido   On Identification Methods for Visible-Light Paper Artifact-Metric Systems
Ryosuke Suzuki, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2013-41 SITE2013-36 ICSS2013-46 EMM2013-43
A visible-light paper artifact-metric system authenticates a piece of paper using its individual pattern of entangled fi... [more] ISEC2013-41 SITE2013-36 ICSS2013-46 EMM2013-43
pp.289-295
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
13:20
Hokkaido   A proposal of key binding technology using lattice masking
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki (Fujitsu Lab.) ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44
Recently, the biometric template protection technology has been actively researched in biometrics.
In this technology, ... [more]
ISEC2013-42 SITE2013-37 ICSS2013-47 EMM2013-44
pp.297-304
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
14:50
Hokkaido   TLS with Pre-shared Key Extended by Identity-based Encryption
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.) ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45
TLS-PSK is a protocol to support mutual authentication based on pre-shared keys (PSKs). Since TLS-PSK does not need any ... [more] ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45
pp.315-321
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
15:15
Hokkaido   Application of Efficient Forms of Elliptic Curves to Ate-like Pairings
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46
 [more] ISEC2013-44 SITE2013-39 ICSS2013-49 EMM2013-46
pp.323-330
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
15:40
Hokkaido   On Side-Channel Information Using Signal Toggles in AES Circuit
Arisa Matsubara, Yunfeng Kuai, Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama (UEC) ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47
 [more] ISEC2013-45 SITE2013-40 ICSS2013-50 EMM2013-47
pp.331-338
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
16:05
Hokkaido   Recovering RSA Secret Keys from Observed Analog Data (I)
Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo) ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48
 [more] ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48
pp.339-343
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:05
Hokkaido   Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities
Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.) ISEC2013-47 SITE2013-42 ICSS2013-52 EMM2013-49
 [more] ISEC2013-47 SITE2013-42 ICSS2013-52 EMM2013-49
pp.373-380
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:30
Hokkaido   Network Observation and Analysis Report on nicter -- Malware infection to embedded systems --
Junji Nakazato (NICT), Jumpei Shimamura (clwit), Masashi Eto, Daisuke Inoue, Koji Nakao (NICT) ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50
 [more] ISEC2013-48 SITE2013-43 ICSS2013-53 EMM2013-50
pp.381-385
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
13:20
Hokkaido   Generalization of Noises in Differential Privacy
Akihiro Yamanaka, Ryo Kikuchi, Dai Ikarashi (NTT) ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51
In this note we verify a sufficient condition of noises for satisfying Differential Privacy and introduce some new noise... [more] ISEC2013-49 SITE2013-44 ICSS2013-54 EMM2013-51
pp.395-402
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
13:45
Hokkaido   Attacks on Authenticated Encryption Based on E-MACs
Hayato Kobayashi, Hiraku Morita, Tetsu Iwata (Nagoya Univ.) ISEC2013-50 SITE2013-45 ICSS2013-55 EMM2013-52
 [more] ISEC2013-50 SITE2013-45 ICSS2013-55 EMM2013-52
pp.403-410
 Results 21 - 40 of 40 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan