Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 16:05 |
Hokkaido |
Sapporo Convention Center |
CAPT-AI: Study on AI identification using differences in ability (part 2) Seiya Kajihara, Takumi Takaiwa, Tsubasa Shibata (Shizuoka Univ.), Nami Ashizawa (NTT/Shizuoka Univ.), Naoto Kiribuchi, Toshiki Shibahara (NTT), Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
[more] |
|
HIP, HCS, HI-SIGCOASTER [detail] |
2024-05-13 13:40 |
Okinawa |
Okinawa Industry Support Center |
A Preliminary Analysis Using Dialogue Logs for Predicting Continuation of Action Plans in Health Guidance Eiji Kumakawa, Masami Takahashi, Reiko Aruga, Taiga Sano, Kaori Fujimura (NTT) HCS2024-13 HIP2024-13 |
(To be available after the conference date) [more] |
HCS2024-13 HIP2024-13 pp.61-66 |
HIP, HCS, HI-SIGCOASTER [detail] |
2024-05-13 14:00 |
Okinawa |
Okinawa Industry Support Center |
Does self-disclosure and trust in the interviewer during interviews relate to behavioral change?
-- An attempt to analyze results of a questionnaire -- Tae Sato, Taiga Sano, Kaori Fujimura, Reiko Aruga (NTT) HCS2024-14 HIP2024-14 |
(To be available after the conference date) [more] |
HCS2024-14 HIP2024-14 pp.67-72 |
HIP, HCS, HI-SIGCOASTER [detail] |
2024-05-14 12:10 |
Okinawa |
Okinawa Industry Support Center |
Preliminary Study on Information Presentation to Promote Healthy Behavior in Individuals with a Strong Tendency to Procrastinate due to Present Bias
-- A Use Case of Weight Management -- Masami Takahashi, Tae Sato, Yurika Katagiri (NTT) HCS2024-26 HIP2024-26 |
People with a strong tendency for present bias, which leads to procrastination, tend to experience health-related issues... [more] |
HCS2024-26 HIP2024-26 pp.135-140 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure Identity-Based Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
LOIS, SITE, ISEC |
2023-11-10 11:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24 |
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] |
ISEC2023-66 SITE2023-60 LOIS2023-24 pp.78-85 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30 |
The Peregrine signature scheme, which is a high-speed variant of Falcon, is one of the candidates in the ongoing Korean ... [more] |
ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30 pp.105-112 |
QIT (2nd) |
2023-05-29 10:25 |
Kyoto |
Katsura Campus, Kyoto University |
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions Fuyuki Kitagawa (NTT), Tomoyuki Morimae (Kyoto Univ.), Ryo Nishimaki, Takashi Yamakawa (NTT) |
[more] |
|
RCC, ISEC, IT, WBS |
2023-03-14 14:15 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
FPGA implementation of PQC Signature Algorithm QR-UOV using High Level Synthesis Kimihiro Yamakoshi, Tsunekaze Saito (NTT) IT2022-92 ISEC2022-71 WBS2022-89 RCC2022-89 |
QR-UOV has been proposed by Furue et al. as a signature scheme with security tolerance gainst quantum computers. QR-UOV... [more] |
IT2022-92 ISEC2022-71 WBS2022-89 RCC2022-89 pp.149-154 |
RCC, ISEC, IT, WBS |
2023-03-15 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution Sakae Chikara, Tsunekazu Saito (NTT) IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 |
This paper discusses the issues involved in combining key-sharing schemes with different security rationales, such as qu... [more] |
IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 pp.386-392 |
ICSS, IPSJ-SPT |
2023-03-13 14:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.) ICSS2022-80 |
[more] |
ICSS2022-80 pp.193-198 |
ICSS, IPSJ-SPT |
2023-03-13 15:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-59 |
(To be available after the conference date) [more] |
ICSS2022-59 pp.67-72 |
ICSS, IPSJ-SPT |
2023-03-14 10:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Port-aware IPv6 Scanning and Large-scale Security Surveys Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) ICSS2022-73 |
(To be available after the conference date) [more] |
ICSS2022-73 pp.151-156 |
SITE, IPSJ-CE |
2022-12-04 14:20 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Please fill in this blank. Katasumi Takahashi (NTT Social Informatics Laboratories) |
[more] |
|
SITE, IPSJ-CE |
2022-12-04 15:05 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
** Please fill in this blank. ** Mitsuaki Akiyama (NTT Social Informatics Laboratories) |
[more] |
|
ISEC, SITE, LOIS |
2022-11-18 13:00 |
Online |
Online |
[Invited Talk]
Quantum Computation and Cryptography Takashi Yamakawa (NTT) ISEC2022-34 SITE2022-38 LOIS2022-18 |
Recently, there have been many exciting works in the interdisciplinary field of quantum computations and cryptography. T... [more] |
ISEC2022-34 SITE2022-38 LOIS2022-18 p.26 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
HCS |
2022-08-27 10:30 |
Hyogo |
(Primary: On-site, Secondary: Online) |
An attempt to analyze dialogue process in health guidance for lifestyle-related diseases prevention Tae Sato, Kaori Fujimura, Reiko Aruga, Yasuo Ishigure, Asami Miyajima (NTT), Tamae Ogata, Akina Mine, Emiko Kikuchi, Yasuhiro Nishizaki (Tokai Univ.) HCS2022-41 |
Lifestyle-related diseases need to be prevented for people to maintain quality of life (QOL) and both physical and menta... [more] |
HCS2022-41 pp.27-32 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] |
2022-06-27 14:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
AI knowledge forgetting based on the importance of model parameters Tomoya Yamashita, Masanori Yamada (NTT) NC2022-3 IBISML2022-3 |
The accuracy of Deep Learning has been greatly improved by the progress of research in computer technology and Deep Lear... [more] |
NC2022-3 IBISML2022-3 pp.14-19 |