Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 14:30 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Proposal on Secure Hint System for Password Authentication Using Bloom Filter Kazumu Kaneko, Hiroyuki Inaba (KIT) SITE2023-102 IA2023-108 |
[more] |
SITE2023-102 IA2023-108 pp.211-218 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-02 14:30 |
Online |
Online |
Proposal of Anomaly Based Attack Detection System for IoT Devices Using Deep Metric Learning Tatsuya Takimoto, Hiroyuki Inaba (KIT) SITE2019-90 IA2019-68 |
In recent years, with the development of the Internet, many IoT devices are used in all aspects of life. On the other ha... [more] |
SITE2019-90 IA2019-68 pp.13-18 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
Proposal and Implementation of Password Reminder System for Partial Forgetting Ryota Hosoda, Hiroyuki Inaba (KIT) ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34 |
[more] |
ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34 pp.163-170 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 |
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] |
ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 pp.171-178 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:00 |
Kochi |
Kochi University of Technology |
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 |
Copyright infringement such as illegal copying and uploading video contents frequently happen in many
video distributio... [more] |
ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 pp.179-186 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:50 |
Hokkaido |
Sapporo Convention Center |
A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 |
Recently, Wi-Fi access points have been installed in public places, with increasing demand for Internet access by mobile... [more] |
ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 pp.137-142 |
SITE, IPSJ-EIP |
2018-06-01 14:45 |
Kanagawa |
|
Implementation and Evaluation of Intrusion Detection System for Malicious PC by Sensor Hosts Hiroaki Kuno, Satoshi Kimura, Hiroyuki Inaba (KIT) SITE2018-4 |
In recent years, Intrusion Detection System(IDS) is not able to catch the unknown attack
as malware and its variant ar... [more] |
SITE2018-4 pp.95-99 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
Performance Analysis of Video Watermarking Using Patchwork Method on Frequency Domain Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16 |
Video watermarking using patchwork method is proposed as one of the video watermarking. This method can defend embedded ... [more] |
ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16 pp.1-4 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:40 |
Tokyo |
|
Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain Kohei Miura, Hiroyuki Inaba (KIT) ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 |
We have proposed a digital contents circulation system on Blockchain. The system can protect user’s privacy from both co... [more] |
ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 pp.5-8 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:25 |
Tokyo |
|
Proposal of Personal Authentication Method by Visual Secret Scheme Using Smart Phone Ryo Mizuno, Hiroyuki Inaba (KIT) ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38 |
[more] |
ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38 pp.259-266 |
SITE, IPSJ-EIP |
2017-05-31 16:35 |
Tokyo |
|
A Proposal of Reliable Car Sharing System Using Ethereum's Smart Contract Tomoya Ogami, Hiroyuki Inaba (KIT) SITE2017-2 |
Recently, car sharing services which we can lend and rent our own cars or campany's cars spread widely. That is because... [more] |
SITE2017-2 pp.37-40 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:00 |
Yamaguchi |
|
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing Motoi Tanaka, Hiroyuki Inaba (KIT) ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 |
A personal authentication system using PIN or password is widely used in various information terminals. However these au... [more] |
ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 pp.29-32 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:25 |
Yamaguchi |
|
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time Hiroaki Kuno, Hiroyuki Inaba (KIT) ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27 |
IDS (Intrusion Detection System) is one of the countermeasures for illegal access to the network. Since IDS reports all ... [more] |
ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27 pp.33-36 |
SITE, IPSJ-EIP |
2016-06-02 13:55 |
Kanagawa |
Institute of Information Security |
Privacy Preserving Digital Contents Circulation System Using Bitcoin 2.0 Kohei Miura, Hiroyuki Inaba (KIT) SITE2016-2 |
[more] |
SITE2016-2 pp.29-32 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 14:20 |
Fukushima |
|
Fast Searchable Encryption Scheme Using Single Bloom Filter and Its Evalustion Shunsuke Kimura, Hiroyuki Inaba (KIT) SITE2014-79 IA2014-111 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
SITE2014-79 IA2014-111 pp.227-232 |