Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
R |
2024-07-27 13:20 |
Hokkaido |
|
Optimal Proof-Testing Intervals for E/E/PE Safety-Related Systems Under Safety Constraint Shinji Inoue (Kansai Univ.), Shigeru Yamada (Tottori Univ.) |
(To be available after the conference date) [more] |
|
KBSE |
2024-03-14 13:45 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
Consideration on System Safety Verification Based on User Personality Traits Ruka Narisawa, Shinpei Ogata (Shinshu Univ.), Yoshitaka Aoki (BIPROGY), Hiroyuki Nakagawa (Osaka Univ.), Kazuki Kobayashi, Kozo Okano (Shinshu Univ.) KBSE2023-72 |
(To be available after the conference date) [more] |
KBSE2023-72 pp.43-48 |
KBSE |
2024-03-14 15:40 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
An approach for improving perceived safety in autonomous driving using personalized shielding Ryotaro Abe, Jialong Li, Jinyu Cai (Waseda Univ.), Shinichi Honiden (NII), Kenji Tei (Tokyo Tech) KBSE2023-76 |
This research introduces an innovative Reinforcement Learning (RL) approach tailored for autonomous driving systems, ter... [more] |
KBSE2023-76 pp.67-72 |
KBSE |
2024-03-14 16:20 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
Automated Stepwise Policy Design for Stepwise Discrete Controller Synthesis Takuto Yamauchi (Waseda Univ.), Kenji Tei (Tokyo Tech.), Shinichi Honiden (Waseda Univ.) KBSE2023-77 |
Discrete Controller Synthesis (DCS) automatically synthesizes a safety-guaranteed behavioral specification for a given o... [more] |
KBSE2023-77 pp.73-75 |
KBSE |
2024-03-14 16:45 |
Okinawa |
Okinawa Prefectual General Welfare Center (Primary: On-site, Secondary: Online) |
Dynamic update controller synthesis using on-the-fly exploration Takanori Hirano, Takuto Yamauchi (Waseda Univ.), Kenji Tei (Tokyo Tech.), Shinichi Honiden (NII) KBSE2023-78 |
In discrete event systems that require continuous operation, it is necessary to update the system without stopping opera... [more] |
KBSE2023-78 pp.76-78 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Revisiting the Soundness of 5-Pass Identification Scheme Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 |
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more] |
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64 pp.44-51 |
ITS, WBS, RCC |
2023-12-22 11:45 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Study on Simulation for Safety Verification in Automated Bus Driving Hyo Okawa, Jeyeon Kim (NITTC), Yanbin Wu, Kouya Takahashi, Toru Kumagai, Naohisa Hashimoto (AIST) WBS2023-55 ITS2023-38 RCC2023-49 |
Safety verification under real-world conditions in automated driving involves various problems such as cost and physical... [more] |
WBS2023-55 ITS2023-38 RCC2023-49 pp.138-143 |
LOIS, SITE, ISEC |
2023-11-09 13:30 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature Motonari Honda, Yuichi Kaji (NU) ISEC2023-57 SITE2023-51 LOIS2023-15 |
Winternitz one-time signature (OTS) plays a core role in practical quantum-secure hash-based digital signature schemes. ... [more] |
ISEC2023-57 SITE2023-51 LOIS2023-15 pp.18-25 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Secure communication based on high precision space-time synchronization Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 |
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] |
IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 pp.97-102 |
RCC, ISEC, IT, WBS |
2023-03-15 13:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Generalized Unicity Distance and its Application to Y-00 Quantum Stream Cipher Masaki Sohma (Tamagawa Univ.), Osamu Hirota (Chuo Univ.) IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125 |
Shannon proposed a theory to evaluate cryptographic functions based on the entropy theory he had developed in order to a... [more] |
IT2022-128 ISEC2022-107 WBS2022-125 RCC2022-125 pp.378-385 |
ITS, IEE-ITS |
2023-03-13 16:45 |
Chiba |
Nihon Univ., Funabashi Campus (Primary: On-site, Secondary: Online) |
On the safety of the Mode-separated-multi-layered type roundabout Daiki Takagi, Takaaki Hasegawa (Saitama Univ.) ITS2022-84 |
In this paper, for the evaluation of the safety of the traffic mode- separated-multilayered type roundabout, we construc... [more] |
ITS2022-84 pp.28-32 |
IN, NS (Joint) |
2023-03-03 14:10 |
Okinawa |
Okinawa Convention Centre + Online (Primary: On-site, Secondary: Online) |
Considering Safety and Security in Chainless Multi-Layer Consensus Takaaki Yanagihara, Akihiro Fujihara (CIT) NS2022-240 |
The diversification of crypto assets in recent years has increased the demand for decentralized finance. In order to rea... [more] |
NS2022-240 pp.418-423 |
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] |
2023-02-22 14:40 |
Hokkaido |
Hokkaido Univ. |
Simulation-based studies of traffic flow and crash related phenomena under the COVID-19 pandemic
-- Including time-varying traffic demands -- Akira Kasahara, Takaaki Hasegawa (Saitama Univ.) ITS2022-73 IE2022-90 |
This paper compares the worldwide various traffic accident data affected in the COVID-19 pandemic period with our simula... [more] |
ITS2022-73 IE2022-90 pp.173-178 |
SANE |
2023-01-20 13:50 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Analysis Results of LIDAR Observation for Aircraft Wake Vortices on Approach at Haneda Airport Naoki Fujii, Takayuki Yoshihara, Atsushi Senoguchi (ENRI) SANE2022-96 |
In response to increasing of worldwide aviation demand, it is required to expand the airport capacity of congested airpo... [more] |
SANE2022-96 pp.40-45 |
MVE, VRSJ-SIG-MR, IPSJ-EC, HI-SIG-DeMO, VRSJ-SIG-CS |
2022-10-06 14:50 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A Study of Gaze-Responsive Active Patterns for Directional Guidance Hiroki Kawada, Hidehiko Shishido, Yoshinari Kameda (U-Tsukuba) MVE2022-21 |
As an AR-based direction guidance method for pedestrians, we propose a gaze-responsive active patterns that satisfies al... [more] |
MVE2022-21 pp.18-23 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
ISEC |
2022-05-18 15:35 |
Online |
Online |
[Invited Talk]
Forward Secure Message Franking (from ICISC 2021) Hiroki Yamamuro (Tokyo Tech), Keisuke Hara (AIST/YNU), Masayuki Tezuka (NIT, Tsuruoka College), Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) ISEC2022-5 |
Message franking is introduced by Facebook in end-to-end encrypted messaging services.
It allows to produce verifiable... [more] |
ISEC2022-5 p.20 |
IT, ISEC, RCC, WBS |
2022-03-10 09:40 |
Online |
Online |
Construction GKW Transformation for Arithmetic Circuits Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 |
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] |
IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 pp.31-37 |
IT, ISEC, RCC, WBS |
2022-03-11 09:40 |
Online |
Online |
[Invited Talk]
Fundamentals and Security of Encrypted Control Systems Kiminao Kogiso, Kaoru Teranishi (UEC) IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85 |
Networked control systems are constantly exposed to the threat of cyberattacks by malicious third parties. Cyberattacks ... [more] |
IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85 p.161 |