Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:30 |
Hokkaido |
Sapporo Convention Center (Hokkaido) |
Proposal of a Method for Evaluating the Authenticity of Seals Based on Judgment Criteria of Human Yuuki Kimura, Soma Sugahara, Atsumu Kida, Taisei Nakamura, Ayato Ishikawa, Tetsutaro Uehara (Ritsumeikan Univ.) ISEC2024-44 SITE2024-41 BioX2024-54 HWS2024-44 ICSS2024-48 EMM2024-50 |
In Japan,seals are used to leave a seal impression and to authenticate the seal owner by the seal impression. Leaving se... [more] |
ISEC2024-44 SITE2024-41 BioX2024-54 HWS2024-44 ICSS2024-48 EMM2024-50 pp.236-242 |
ICSS, IPSJ-SPT |
2023-03-13 14:40 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Preservation Techniques of Fileless Attack Artifacts using Customized PowerShell Masahito Kimura (Ritsumeikan Univ.), Chris Liu (DTCY), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-57 |
Many attackers use PowerShell in fileless attacks that do not generate files on the target machine.
When a fileless att... [more] |
ICSS2022-57 pp.55-60 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
ICSS, IPSJ-SPT |
2023-03-14 11:10 |
Okinawa |
Okinawaken Seinenkaikan (Okinawa, Online) (Primary: On-site, Secondary: Online) |
Investigating Server Fingerprints and Their Identifiability in Onion Service Yuuki Kimura, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ./Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-75 |
Anonymous network technology exists to ensure anonymous communication. Among the many anonymous networks that have been ... [more] |
ICSS2022-75 pp.163-168 |
IA, ICSS |
2022-06-24 11:00 |
Nagasaki |
Univ. of Nagasaki (Nagasaki, Online) (Primary: On-site, Secondary: Online) |
Identification of Information Security Issues in Small and Medium Enterprises - Interview Analysis Using M-GTA Keisuke Tanaka, Tetsutaro Uehara (Ritsumeikan Univ), Yoshikazu Furukawa, Motoki Noda (Osaka Chamber of Commerce and Industry) IA2022-12 ICSS2022-12 |
[more] |
IA2022-12 ICSS2022-12 pp.67-70 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 13:00 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Fukuoka, Online) (Primary: On-site, Secondary: Online) |
[Invited Talk]
Current Status of Research on Digital Forensics Tetsutaro Uehara (Ritsumeikan Univ.) |
NPO Institute of Digital Forensics was established in 2004 and has been working for the promotion of digital forensics a... [more] |
|
ICSS, IPSJ-SPT |
2018-03-07 13:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
Malware Detection by Anomaly of Traffic Data for IoT Devices Kana Sakano, Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-53 |
(To be available after the conference date) [more] |
ICSS2017-53 pp.13-18 |
ICSS, IPSJ-SPT |
2018-03-08 10:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
Darkweb Analysis System by Combining HSDir's Snooping and Active Scanning Akito Ono (Ritsumeikan Univ.), Masaki Kamizono (PwC Cyber Services), Takahiro Kasama (NICT), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2017-68 |
[more] |
ICSS2017-68 pp.103-108 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-06 09:00 |
Tochigi |
Kinugawa Onsen Hotel (Tochigi) |
Improper usage of ciphers on the wiretapping device defined by amendment wiretapping law and proposal of the improved device Satoshi Kosakatani, Tetsutaro Uehara (Ritsumeikan U.) SITE2017-70 IA2017-81 |
[more] |
SITE2017-70 IA2017-81 pp.137-140 |
EMM |
2015-03-13 10:55 |
Okinawa |
(Okinawa) |
Implementation and Evaluation of a Facial Image Retrieval System with Privacy Protection Yoshitaka Morimura (Kyoto Univ.), Takuya Funatomi (NAIST), Tetsutaro Uehara (Ritsumeikan Univ.), Michihiko Minoh (Kyoto Univ.) EMM2014-98 |
In our previous research, we have proposed the method that generates the cryptographic key from facial feature in order ... [more] |
EMM2014-98 pp.125-129 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:45 |
Hokkaido |
San-Refure Hakodate (Hokkaido) |
Comparison on personal information protection ordinates of prefectures and government-designated cities. Arata Ito, Tetsutaro Uehara (Ritsumeikan Univ.) ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29 |
As the governmental works are computerized more and more, it is discussed how personal information possessed by the gove... [more] |
ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29 pp.213-220 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 16:05 |
Nara |
Todaiji Total Cultural Center (Nara) |
A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS) SITE2012-71 IA2012-109 |
In Wi-Fi and Bluetooth connection, by specifications, devices exchange their unique assigned device addresses in the cle... [more] |
SITE2012-71 IA2012-109 pp.249-254 |
IA, SITE |
2009-03-06 09:10 |
Kumamoto |
(Kumamoto) |
A Survey of deployment status of smart cards for autentication at universities Tetsutaro Uehara, Shoichi Shimizu, Yasuhiro Nagai, Takaaki Komura, Hajime Kita (Kyoto Univ.) SITE2008-87 IA2008-110 |
[more] |
SITE2008-87 IA2008-110 pp.253-258 |
IA, SITE |
2009-03-06 10:40 |
Kumamoto |
(Kumamoto) |
A Survey on Computer Ethics Education in Foreign Countries
-- For Development of Teaching Materials by International Collaboration -- Takahiro Tagawa (Kyushu Univ.), Izumi Fuse, Shigeto Okabe (Hokkaido Univ.), Takahiro Sumiya, Atsushi Nakamura (Hiroshima Univ.), Takashi Yamanoue (Kagoshima Univ.), Takeo Tatsumi (Tokyo Univ. of Agr. & Tech.), Michio Nakanishi (Osaka Inst. of Tech.), Shozo Fukada (Ehime Univ.), Ikuya Murata (Hokkaido Univ. of Edu.), Tetsutaro Uehara (Kyoto Univ.), Tsuneo Yamada (National Institute of Multimedia Education) SITE2008-91 IA2008-114 |
The utilization of information technology and the many services using internet have widely spread across the border, an... [more] |
SITE2008-91 IA2008-114 pp.277-281 |
IA, SITE |
2009-03-06 11:20 |
Kumamoto |
(Kumamoto) |
Information Ethics on Guidelines for the Course of Study and the cource materials Chiho Asai, Tetsutaro Uehara, Mikihiko Mori, Takaaki Tsuji, Kenji Ohira, Kokoro Ikeda, Hajime Kita (Kyoto Univer.) SITE2008-93 IA2008-116 |
It is recognized that the need for Information Ethics in elementary and secondary education. But it is tend to skills, a... [more] |
SITE2008-93 IA2008-116 pp.289-294 |
ISEC |
2008-05-16 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Tokyo) |
Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12 |
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] |
ISEC2008-12 pp.77-84 |
ICM |
2008-05-08 14:35 |
Kagoshima |
Kagoshima Public Access Center (Kagoshima) |
Construction and Evaluation of Live Video Streaming System with Broadcast Encryption over IP Multicast Yoshitaka Morimura, Tetsutaro Uehara, Shuhui Hou, Michihiko Minoh (Kyoto Univ.) ICM2008-6 |
We constructed a live video streaming system over IP Multicast, which uses SRTP and delivers the decryption key with bro... [more] |
ICM2008-6 pp.29-34 |
ICM |
2008-05-09 09:30 |
Kagoshima |
Kagoshima Public Access Center (Kagoshima) |
Producing Digital Video Clips for Computer Ethics and its Application to Information Security of Universities Takashi Yamanoue (Kagoshima Univ.), Takeo Tatsumi (TUAT), Izumi Fuse, Shigeto Okabe (Hokkaido Univ.), Takahiro Tagawa (Kyushu Univ.), Michio Nakanishi (OIT), Atsushi Nakamura (Hiroshima Univ), Shozo Fukada (Ehime Univ.), Ikuya Murata (HUE), Tetsutaro Uehara (Kyoto Univ.), Tsuneo Yamada (NIME) ICM2008-13 |
We are producing the video clips for information ethics education for university students. We produce the new educationa... [more] |
ICM2008-13 pp.71-76 |
ICM |
2008-05-09 11:45 |
Kagoshima |
Kagoshima Public Access Center (Kagoshima) |
A prototype of network-traffic analysis system for small and middle-scale LAN by passive scanning Masahiro Susukita (KEPCO), Tatsuya Ueda (OCU), Tetsutaro Uehara (Kyoto-U) ICM2008-18 |
[more] |
ICM2008-18 pp.99-102 |
IA |
2007-07-19 10:15 |
Kyoto |
room1 (J501) on 5th floor in J bldg, Kyoto Women's University (Kyoto) |
A questionnaire survey of the new students in 2007 fiscal year about the subject "Information Study" and information literacy Tetsutaro Uehara, Hajime Kita, Mikihiko Mori, Kokoro Ikeda (Kyoto Univ.) |
(Advance abstract in Japanese is available) [more] |
|