Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, IPSJ-DC |
2024-07-11 14:15 |
Hyogo |
Mikage Kokaido (Hyogo) |
On Development of Cyber Training Contents using MITRE CALDERA Shingo Ujita, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Ichiro Suji, Masami Mohri (Kindai Univ.) LOIS2024-4 |
In developing cybersecurity personnel, it is effective to use an experiential security training system, but the cost of ... [more] |
LOIS2024-4 pp.19-24 |
LOIS, IPSJ-DC |
2024-07-12 09:30 |
Hyogo |
Mikage Kokaido (Hyogo) |
Security Ontology for Representing the Knowledge of Risk Assessment Masanori Hirotomo, Ryusuke Ogawa (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) LOIS2024-5 |
In order to conduct implement security measures effectively, risk assessment is necessary to correctly analyze and evalu... [more] |
LOIS2024-5 pp.25-30 |
LOIS |
2024-03-14 13:40 |
Okinawa |
Okinawa Pref Danjyo-Kyoudou-Sankaku Center (Okinawa, Online) (Primary: On-site, Secondary: Online) |
LOIS2023-64 |
Targeted attacks on specific organizations have become a significant issue due to their sophistication and the extensive... [more] |
LOIS2023-64 pp.96-101 |
RCC, ISEC, IT, WBS |
2023-03-15 14:15 |
Yamaguchi |
(Yamaguchi, Online) (Primary: On-site, Secondary: Online) |
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ) IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135 |
[more] |
IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135 pp.445-450 |
ICSS |
2022-11-07 13:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Hokkaido, Online) (Primary: On-site, Secondary: Online) |
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) ICSS2022-39 |
[more] |
ICSS2022-39 pp.7-12 |
ICM, LOIS |
2021-01-21 17:50 |
Online |
Online (Online) |
Reproduction of Malware Behavior by Using Windows API Call Logs
-- Support for Major Win32 APIs and State Restoration After the Reproduction -- Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35 |
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] |
ICM2020-47 LOIS2020-35 pp.75-80 |
IT |
2020-09-04 11:35 |
Online |
Online (Online) |
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23 |
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] |
IT2020-23 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-02 11:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Log Storing System Using Blockchain Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2019-73 |
[more] |
ICSS2019-73 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-03 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Effective single-sided RAMBleed Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ) ICSS2019-91 |
There is a phenomenon called Rowhammer in which bit flip occurs in the neighboring row by repeatedly accessing the row o... [more] |
ICSS2019-91 pp.145-150 |
IT |
2018-12-18 16:35 |
Fukushima |
Spa Resort Hawaiians (Fukushima) |
[Invited Talk]
Construction and Decoding of Codes over Symbol-Pair Read Channels Masanori Hirotomo (Saga Univ.), Makoto Takita, Masakatu Morii (Kobe Univ.) IT2018-34 |
In this paper, we explain construction and decoding of codes over symbol-pair red channels. [more] |
IT2018-34 pp.19-24 |
ICSS |
2018-11-22 10:50 |
Kagoshima |
(Kagoshima) |
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62 |
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] |
ICSS2018-62 pp.49-54 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
On the Ring Signature Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85 |
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] |
ICSS2017-85 pp.215-220 |
SIP, IT, RCS |
2018-01-23 16:25 |
Kagawa |
Sunport Hall Takamatsu (Kagawa) |
Evaluation of Coded Caching Scheme in Multi-rate Wireless Network Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-102 SIP2017-110 RCS2017-316 |
The network load is increasing due to the spread of content distribution services.
Caching is known as a technique to r... [more] |
IT2017-102 SIP2017-110 RCS2017-316 pp.273-278 |
ICSS |
2017-11-21 09:30 |
Oita |
Beppu International Convention Center (Oita) |
ICSS2017-42 |
[more] |
ICSS2017-42 pp.23-27 |
IT |
2017-09-08 15:50 |
Yamaguchi |
Centcore Yamaguchi Hotel (Yamaguchi) |
Coded Caching for Hierarchical Networks with Different Number of Layers (II) Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-49 |
Coded caching is a technique to reduce network loads.
Recent works have discussed single-layer caching systems, but ma... [more] |
IT2017-49 pp.61-66 |
IA, ICSS |
2017-06-08 15:40 |
Kochi |
Kochi University of Technolo, Eikokuji Campus (Kochi) |
On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7 |
[more] |
IA2017-7 ICSS2017-7 pp.37-42 |
ISEC, WBS, IT |
2017-03-09 13:35 |
Tokyo |
TOKAI University (Tokyo) |
On the Design of Locally Repairable Codes Based on Code Modification Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-106 ISEC2016-96 WBS2016-82 |
Locally repairable codes (LRCs) are a class of codes designed for the local correction of erasures.
Locality and Availa... [more] |
IT2016-106 ISEC2016-96 WBS2016-82 pp.49-53 |
IT |
2016-09-02 10:00 |
Saga |
New Heartpia (Saga) |
On Error Correction Capability of Irregular LDPC Codes under the Bit-Flipping Decoding Algorithm Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-35 |
The error-correction capability of LDPC codes for iterative decoding algorithms have been investigated. However, it is d... [more] |
IT2016-35 pp.7-12 |
ICSS, IA |
2016-06-06 15:00 |
Saga |
Saga University (Saga) |
Development of Network Forensic System Using Filter Drivers Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IA |
2016-06-07 13:00 |
Saga |
Saga University (Saga) |
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11 |
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] |
IA2016-11 ICSS2016-11 pp.57-62 |