IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 49  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS, IPSJ-DC 2024-07-11
14:15
Hyogo Mikage Kokaido On Development of Cyber Training Contents using MITRE CALDERA
Shingo Ujita, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Ichiro Suji, Masami Mohri (Kindai Univ.) LOIS2024-4
In developing cybersecurity personnel, it is effective to use an experiential security training system, but the cost of ... [more] LOIS2024-4
pp.19-24
LOIS, IPSJ-DC 2024-07-12
09:30
Hyogo Mikage Kokaido Security Ontology for Representing the Knowledge of Risk Assessment
Masanori Hirotomo, Ryusuke Ogawa (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) LOIS2024-5
In order to conduct implement security measures effectively, risk assessment is necessary to correctly analyze and evalu... [more] LOIS2024-5
pp.25-30
LOIS 2024-03-14
13:40
Okinawa Okinawa Pref Danjyo-Kyoudou-Sankaku Center
(Primary: On-site, Secondary: Online)
LOIS2023-64 Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] LOIS2023-64
pp.96-101
RCC, ISEC, IT, WBS 2023-03-15
14:15
Yamaguchi
(Primary: On-site, Secondary: Online)
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color
Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ) IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135
 [more] IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135
pp.445-450
ICSS 2022-11-07
13:55
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance
Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) ICSS2022-39
 [more] ICSS2022-39
pp.7-12
ICM, LOIS 2021-01-21
17:50
Online Online Reproduction of Malware Behavior by Using Windows API Call Logs -- Support for Major Win32 APIs and State Restoration After the Reproduction --
Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] ICM2020-47 LOIS2020-35
pp.75-80
IT 2020-09-04
11:35
Online Online A Secure Computation Protocal of Inner Product Using HQC Cryptosystem
Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] IT2020-23
pp.31-36
ICSS, IPSJ-SPT 2020-03-02
11:50
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Log Storing System Using Blockchain
Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2019-73
 [more] ICSS2019-73
pp.31-36
ICSS, IPSJ-SPT 2020-03-03
15:40
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Effective single-sided RAMBleed
Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ) ICSS2019-91
There is a phenomenon called Rowhammer in which bit flip occurs in the neighboring row by repeatedly accessing the row o... [more] ICSS2019-91
pp.145-150
IT 2018-12-18
16:35
Fukushima Spa Resort Hawaiians [Invited Talk] Construction and Decoding of Codes over Symbol-Pair Read Channels
Masanori Hirotomo (Saga Univ.), Makoto Takita, Masakatu Morii (Kobe Univ.) IT2018-34
In this paper, we explain construction and decoding of codes over symbol-pair red channels. [more] IT2018-34
pp.19-24
ICSS 2018-11-22
10:50
Kagoshima   Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] ICSS2018-62
pp.49-54
ICSS, IPSJ-SPT 2018-03-08
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center On the Ring Signature Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] ICSS2017-85
pp.215-220
SIP, IT, RCS 2018-01-23
16:25
Kagawa Sunport Hall Takamatsu Evaluation of Coded Caching Scheme in Multi-rate Wireless Network
Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-102 SIP2017-110 RCS2017-316
The network load is increasing due to the spread of content distribution services.
Caching is known as a technique to r... [more]
IT2017-102 SIP2017-110 RCS2017-316
pp.273-278
ICSS 2017-11-21
09:30
Oita Beppu International Convention Center ICSS2017-42  [more] ICSS2017-42
pp.23-27
IT 2017-09-08
15:50
Yamaguchi Centcore Yamaguchi Hotel Coded Caching for Hierarchical Networks with Different Number of Layers (II)
Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-49
Coded caching is a technique to reduce network loads.
Recent works have discussed single-layer caching systems, but ma... [more]
IT2017-49
pp.61-66
IA, ICSS 2017-06-08
15:40
Kochi Kochi University of Technolo, Eikokuji Campus On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7
 [more] IA2017-7 ICSS2017-7
pp.37-42
ISEC, WBS, IT 2017-03-09
13:35
Tokyo TOKAI University On the Design of Locally Repairable Codes Based on Code Modification
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-106 ISEC2016-96 WBS2016-82
Locally repairable codes (LRCs) are a class of codes designed for the local correction of erasures.
Locality and Availa... [more]
IT2016-106 ISEC2016-96 WBS2016-82
pp.49-53
IT 2016-09-02
10:00
Saga New Heartpia On Error Correction Capability of Irregular LDPC Codes under the Bit-Flipping Decoding Algorithm
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-35
The error-correction capability of LDPC codes for iterative decoding algorithms have been investigated. However, it is d... [more] IT2016-35
pp.7-12
ICSS, IA 2016-06-06
15:00
Saga Saga University Development of Network Forensic System Using Filter Drivers
Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
 [more]
ICSS, IA 2016-06-07
13:00
Saga Saga University On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] IA2016-11 ICSS2016-11
pp.57-62
 Results 1 - 20 of 49  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan