Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-10 14:25 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
A Proposed Link Key Hijacking Attack Using the Power-Saving Mode against Bluetooth BR/EDR Keiichiro Kimura, Hiroki Kuzuno, Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ISEC2023-70 SITE2023-64 LOIS2023-28 |
With the growing demand for Bluetooth devices, the power-saving mode of Bluetooth, which reduces the power consumption o... [more] |
ISEC2023-70 SITE2023-64 LOIS2023-28 pp.103-109 |
RCC, ISEC, IT, WBS |
2023-03-15 14:15 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Design of Adaptively Decodable Visual Secret Sharing Scheme on Background Color Atsushi Marui, Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ) IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135 |
[more] |
IT2022-138 ISEC2022-117 WBS2022-135 RCC2022-135 pp.445-450 |
LOIS, ICM |
2023-01-20 10:55 |
Fukuoka |
Kitakyushu International Conference Center (Primary: On-site, Secondary: Online) |
Displaying Maps on Smart Phone using two-dimensional code and its implementation Rikuto Mitui (Kobe Univ), Yuto Murai, Shogo Nakajima, Yoshiaki Shiraishi, Masakatu Morii (Graduate school of Kobe Univ) ICM2022-42 LOIS2022-42 |
Generally, QR Codes contain a URL, and information is obtained by accessing the web server indicated by the URL. Therefo... [more] |
ICM2022-42 LOIS2022-42 pp.65-70 |
ICSS |
2022-11-07 13:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Blockchain-Based Cloud Storage Data Auditing Scheme for Identifying Data Provenance Yuichi Kado (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ), Masakatu Morii (Kobe Univ.) ICSS2022-39 |
[more] |
ICSS2022-39 pp.7-12 |
ICSS |
2022-11-08 10:30 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
Design and Implementation of a Task Scheduler for Delaying Ransomware Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-46 |
(To be available after the conference date) [more] |
ICSS2022-46 pp.49-54 |
ICSS |
2022-11-08 10:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
An Efficient Method of Finding Flippable Bits for RAMBleed Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47 |
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] |
ICSS2022-47 pp.55-60 |
ICM, LOIS |
2021-01-21 17:50 |
Online |
Online |
Reproduction of Malware Behavior by Using Windows API Call Logs
-- Support for Major Win32 APIs and State Restoration After the Reproduction -- Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35 |
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] |
ICM2020-47 LOIS2020-35 pp.75-80 |
ICM, LOIS |
2021-01-21 18:10 |
Online |
Online |
Two-Layered QR Codes and Their Principles
-- Development of Hologram QR Codes -- Hiroya Kawahara, Kohei Yamasaki (Kobe Univ.), Makoto Takita (University of Hyogo), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICM2020-48 LOIS2020-36 |
The Quick Response (QR) code is used for various purposes, such as accessing web pages, payment, etc. The QR codes which... [more] |
ICM2020-48 LOIS2020-36 pp.81-86 |
IT |
2020-09-04 11:35 |
Online |
Online |
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23 |
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] |
IT2020-23 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-02 11:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Log Storing System Using Blockchain Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2019-73 |
[more] |
ICSS2019-73 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-03 16:00 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-92 |
(To be available after the conference date) [more] |
ICSS2019-92 pp.151-155 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-100 |
(To be available after the conference date) [more] |
ICSS2019-100 pp.283-288 |
ICSS, IPSJ-SPT |
2020-03-03 11:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
ICSS2019-104 |
[more] |
ICSS2019-104 pp.307-312 |
ICSS, IPSJ-SPT |
2019-03-08 10:00 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-78 |
[more] |
ICSS2018-78 pp.89-94 |
ICSS, IPSJ-SPT |
2019-03-08 10:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-79 |
[more] |
ICSS2018-79 pp.95-100 |
ICSS, IPSJ-SPT |
2019-03-08 10:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-80 |
(To be available after the conference date) [more] |
ICSS2018-80 pp.101-104 |
ICSS, IPSJ-SPT |
2019-03-08 11:15 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Threat Information Analysis Using Conditional Generative Adversarial Network Keisuke Furumoto, Hideaki Kanehara, Takeshi Takahashi (NICT), Yoshiaki Shiraishi (Kobe Univ.), Daisuke Inoue (NICT) ICSS2018-81 |
[more] |
ICSS2018-81 pp.105-110 |
ICSS, IPSJ-SPT |
2019-03-08 13:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-85 |
(To be available after the conference date) [more] |
ICSS2018-85 pp.155-160 |
ICSS, IPSJ-SPT |
2019-03-08 13:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
ICSS2018-86 |
[more] |
ICSS2018-86 pp.161-166 |
ICSS |
2018-11-21 15:40 |
Kagoshima |
|
ICSS2018-58 |
(To be available after the conference date) [more] |
ICSS2018-58 pp.31-36 |