Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2022-05-18 13:25 |
Online |
Online |
[Invited Talk]
Vulnerability Exploiting SMS Push Notifications (from AsiaJCIS 2021) Rina Shibayama, Hiroaki Kikuchi (Meiji Univ.) ISEC2022-1 |
[more] |
ISEC2022-1 pp.1-2 |
ICSS, IPSJ-SPT |
2021-03-01 11:05 |
Online |
Online |
A proposal of model for scale and frequency of cyber incidents based on organizational attributes Kazuki Ikegami, Hiroaki Kikuchi (Meiji Univ.) ICSS2020-30 |
[more] |
ICSS2020-30 pp.25-30 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 11:10 |
Kochi |
Kochi University of Technology |
Empirical Evaluation on Face-Detection Prevention Technologies Kazuki Eto, Kazushi Waki, Takafumi Mori, Hiroaki Kikuchi (Meiji Univ.) ISEC2019-20 SITE2019-14 BioX2019-12 HWS2019-15 ICSS2019-18 EMM2019-23 |
(To be available after the conference date) [more] |
ISEC2019-20 SITE2019-14 BioX2019-12 HWS2019-15 ICSS2019-18 EMM2019-23 pp.93-98 |
ISEC |
2019-05-17 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Risk of Re-identification from Payment Card Histories in Multiple Domains (from AINA 2018) Satoshi Ito, Reo Harada, Hiroaki Kikuchi (Meiji Univ.) ISEC2019-9 |
De-identification is the process of modifying a data set to prevent the identification of individual people from the dat... [more] |
ISEC2019-9 pp.45-46 |
ICSS |
2015-03-03 17:05 |
Okinawa |
Meio Univiersity |
A Study on CAPTCHA System Using Differential Awkwardness-Objects Michitomo Yamguchi (Meiji Univ.), Takeshi Okamoto (Tsukuba Univ. of Tech.), Hiroaki Kikuchi (Meiji Univ.) ICSS2014-72 |
CAPTCHAs have been accepted as a technique which prevents unauthorized access by bots. Several researchers point out tha... [more] |
ICSS2014-72 pp.55-60 |
ISEC, LOIS |
2013-11-28 16:05 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
On the Privacy Issues in Lifelog and Privacy-Preserving Data Mining Hiroaki Kikuchi (Meiji Univ.) ISEC2013-64 LOIS2013-30 |
[more] |
ISEC2013-64 LOIS2013-30 pp.35-38 |
ICSS |
2013-11-12 14:35 |
Fukuoka |
Nishijin Plaza |
On the Risk of DNS Cache Vulnerability "Ghost Domain Name" Hiroaki Kikuchi (Meiji Univ.), Tomohiro Arimizu (Tokai Univ.) ICSS2013-58 |
[more] |
ICSS2013-58 pp.9-12 |
IBISML |
2013-07-18 15:10 |
Tokyo |
Nishiwaseda Campus (Waseda univ.) |
Privacy-preserving Online Logistic Regression Based on Homomorphic Encryption Shuang Wu, Junpei Kawamoto (Univ. of Tsukuba), Hiroaki Kikuchi (Meiji Univ.), Jun Sakuma (Univ. of Tsukuba) IBISML2013-10 |
Preserve the privacy of personal information when conducting statistical analysis has attracted much attention in machin... [more] |
IBISML2013-10 pp.67-74 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 11:05 |
Hokkaido |
|
Time Zone Analysis on IIJ Network Trac for Malicious Botnet Activities Khamphao Sisaat (Tokai Univ.), Hiroaki Kikuchi (Meiiji Univ.), Surin Kittitornkun, Chaxiong Yukonhiatou (KMITL), Masato Terada (Hitachi), Hiroshi Ishii (Tokai Univ.) ISEC2013-47 SITE2013-42 ICSS2013-52 EMM2013-49 |
[more] |
ISEC2013-47 SITE2013-42 ICSS2013-52 EMM2013-49 pp.373-380 |
SSS |
2012-11-22 14:20 |
Tokyo |
|
On fail-safeness of user authentication schemes Hiroaki Kikuchi (Tokai Univ.) SSS2012-19 |
This paper studies the relation between a user authentication and the risk of failure. [more] |
SSS2012-19 pp.11-15 |
ICSS |
2012-11-22 16:25 |
Hiroshima |
Miyajima Mori-no-Yado |
Implementation and Evaluation of Privacy-Preserving Epidemic Analysis System Tomoki Sato, Hiroaki Kikuchi (Tokai Univ.), Jun Sakuma (UT) ICSS2012-55 |
This paper studies privacy issues about epidemiological study. Epidemiological study needs to preserve the privacy of su... [more] |
ICSS2012-55 pp.61-66 |
ICSS |
2009-05-15 16:40 |
Hyogo |
Kobe University |
Private List Matching Protocol and its Application Hiroaki Kikuchi, Daisuke Kagawa (Tokai Univ.) ICSS2009-7 |
We may collaborate with someone with common preference in particular fields, e.g.,
sharing, exchange useful information... [more] |
ICSS2009-7 pp.33-36 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:20 |
Hokkaido |
Future University-Hakodate |
Orthogonal expansion of port-scan packets Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitachi) |
Observation of port-scan packets performed over the Internet is involved with so many parameters including time,
port ... [more] |
ISEC2007-51 pp.43-49 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:45 |
Hokkaido |
Future University-Hakodate |
Consideration from the viewpoint of social layer about the distribution of malicious hosts on the internet Tetsuro Kito, Hirofumi Nakakoji, Masato Terada (Hitachi, Ltd.), Hiroaki Kikuchi (Univ. of Tokai) |
We try to analyze access logs from multiple sensors to get information about distribution of malicious hosts. We use the... [more] |
ISEC2007-52 pp.51-56 |
IT, ISEC, WBS |
2007-03-16 08:55 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On a Secure Function Evaluation for Comparator Networks Koji Chida (NTT), Hiroaki Kikuchi (Tokai Univ.), Gembu Morohashi, Keiichi Hirota (NTT) |
[more] |
IT2006-94 ISEC2006-149 WBS2006-91 pp.53-58 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 10:45 |
Okayama |
Okayama Univ. |
Macro and Micro Analysis on Vulnerability Scanning Activities via Distributed Observation over the Internet Naoya Fukuno, Tomohiro Kobori, Hiroaki Kikuchi (Tokai Univ.), Masato Terada (Hitach), Norihisa Doi (Chuo Univ.) |
Computer virus and worms perform randomly spyware and port-scanning to nd a vulnerability in the
Internet. The fractio... [more] |
ISEC2006-49 pp.69-74 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 13:50 |
Iwate |
Iwate Prefectural University |
An Enhanced Secure Detection of Asymmetric Patchwork Digital Watermarking Mitsuo Okada, Hiroaki Kikuchi (Tokai Univ) |
A new method of efficient multi-bit asymmetric watermark algorithm is proposed in this paper. Our methodology applies to... [more] |
ISEC2005-67 pp.167-173 |
ISEC, IPSJ-CSEC |
2004-07-20 15:10 |
Tokushima |
Tokushima Univ. |
A report on 3rd annual PKI R&D workshop Satoshi Koga (Kyushu Univ.), Hiroaki Kikuchi (Tokai Univ.) |
This paper reports the 3rd annual PKI R&D workshop, held on April 12-14, 2004 at NIST. (URL:http://middleware.internet2.... [more] |
ISEC2004-36 pp.159-164 |