Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-14 14:15 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
FPGA implementation of PQC Signature Algorithm QR-UOV using High Level Synthesis Kimihiro Yamakoshi, Tsunekaze Saito (NTT) IT2022-92 ISEC2022-71 WBS2022-89 RCC2022-89 |
QR-UOV has been proposed by Furue et al. as a signature scheme with security tolerance gainst quantum computers. QR-UOV... [more] |
IT2022-92 ISEC2022-71 WBS2022-89 RCC2022-89 pp.149-154 |
RCC, ISEC, IT, WBS |
2023-03-15 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution Sakae Chikara, Tsunekazu Saito (NTT) IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 |
This paper discusses the issues involved in combining key-sharing schemes with different security rationales, such as qu... [more] |
IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 pp.386-392 |
ICSS, IPSJ-SPT |
2023-03-13 14:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study of Security Control Schemes in Fog Computing Based on TPO Conditions Yushi Hosokawa, Kanai Atushi, qian wu (Hosei Univ.), hatasima ryu (NTT), tanimoto sigeaki (ChibaTech Univ.) ICSS2022-80 |
[more] |
ICSS2022-80 pp.193-198 |
ICSS, IPSJ-SPT |
2023-03-13 15:20 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
ICSS2022-59 |
(To be available after the conference date) [more] |
ICSS2022-59 pp.67-72 |
ICSS, IPSJ-SPT |
2023-03-14 10:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Port-aware IPv6 Scanning and Large-scale Security Surveys Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) ICSS2022-73 |
(To be available after the conference date) [more] |
ICSS2022-73 pp.151-156 |
SITE, IPSJ-CE |
2022-12-04 14:20 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Please fill in this blank. Katasumi Takahashi (NTT Social Informatics Laboratories) |
[more] |
|
SITE, IPSJ-CE |
2022-12-04 15:05 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
** Please fill in this blank. ** Mitsuaki Akiyama (NTT Social Informatics Laboratories) |
[more] |
|
ISEC, SITE, LOIS |
2022-11-18 13:00 |
Online |
Online |
[Invited Talk]
Quantum Computation and Cryptography Takashi Yamakawa (NTT) ISEC2022-34 SITE2022-38 LOIS2022-18 |
Recently, there have been many exciting works in the interdisciplinary field of quantum computations and cryptography. T... [more] |
ISEC2022-34 SITE2022-38 LOIS2022-18 p.26 |
ICSS |
2022-11-07 15:25 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Analysis of Environmental Sensitivity of Persistent IoT Malware using Sandboxes with File Systems from Various IoT Devices Takahiro Inoue (YNU), Eizo Okada, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2022-45 |
(To be available after the conference date) [more] |
ICSS2022-45 pp.43-48 |
HCS |
2022-08-27 10:30 |
Hyogo |
(Primary: On-site, Secondary: Online) |
An attempt to analyze dialogue process in health counseling for lifestyle-related diseases prevention Tae Sato, Kaori Fujimura, Reiko Aruga, Yasuo Ishigure, Asami Miyajima (NTT), Tamae Ogata, Akina Mine, Emiko Kikuchi, Yasuhiro Nishizaki (Tokai Univ.) HCS2022-41 |
Lifestyle-related diseases need to be prevented for people to maintain quality of life (QOL) and both physical and menta... [more] |
HCS2022-41 pp.27-32 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
NC, IBISML, IPSJ-BIO, IPSJ-MPS [detail] |
2022-06-27 14:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
AI knowledge forgetting based on the importance of model parameters Tomoya Yamashita, Masanori Yamada (NTT) NC2022-3 IBISML2022-3 |
The accuracy of Deep Learning has been greatly improved by the progress of research in computer technology and Deep Lear... [more] |
NC2022-3 IBISML2022-3 pp.14-19 |
R |
2022-05-28 13:00 |
Online |
Online |
Correlation analysis of reviewer rating trends and trustworthiness on EC site Ryohei Suzuki, Iifan Tyou, Naoto Kiribuchi, Nami Ashizawa (NTT), Kazutoshi Sasahara (Tokyo Tech) R2022-1 |
E-commerce sites have a system to evaluate the reputation of products by the number of stars and reviews. When purchasin... [more] |
R2022-1 pp.1-6 |
ICSS, IPSJ-SPT |
2022-03-08 10:00 |
Online |
Online |
Input predictive attack by keyboard acoustic emanations using BERT and its countermeasures Masahiro Iida (Teikyo Univ.), Mitsuaki Akiyama (NTT), Masaki Kamizono (DTCY), Takahiro Kasama (NICT), Yuichi Hattori (Secure Cycle Inc.), Hiroyuki Inoue (Kyoto Sangyo Univ.), Atsuo Inomata (Osaka Univ.) ICSS2021-67 |
The Keyboard Acoustic Emanations has been proposed to estimate the input key from keystroke sounds as a kind of side-cha... [more] |
ICSS2021-67 pp.49-54 |
QIT (2nd) |
2021-11-30 16:20 |
Online |
Online |
Certified Deletion for Public Key Encryption and Classical Communication Taiga Hiroka, Tomoyuki Morimae (Kyoto Univ.), Ryo Nishimaki, Takashi Yamakawa (NTT) |
Broadbent and Islam (TCC’20) proposed a quantum cryptographic primitive called quantum encryption with certified deletio... [more] |
|