Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, IPSJ-DC |
2024-07-11 14:15 |
Hyogo |
Mikage Kokaido (Hyogo) |
On Development of Cyber Training Contents using MITRE CALDERA Shingo Ujita, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Ichiro Suji, Masami Mohri (Kindai Univ.) LOIS2024-4 |
In developing cybersecurity personnel, it is effective to use an experiential security training system, but the cost of ... [more] |
LOIS2024-4 pp.19-24 |
ICM, LOIS |
2021-01-21 17:50 |
Online |
Online (Online) |
Reproduction of Malware Behavior by Using Windows API Call Logs
-- Support for Major Win32 APIs and State Restoration After the Reproduction -- Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35 |
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] |
ICM2020-47 LOIS2020-35 pp.75-80 |
IT |
2020-09-04 11:35 |
Online |
Online (Online) |
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23 |
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] |
IT2020-23 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-02 11:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Okinawa) (Cancelled but technical report was issued) |
Log Storing System Using Blockchain Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2019-73 |
[more] |
ICSS2019-73 pp.31-36 |
ICSS |
2018-11-22 10:50 |
Kagoshima |
(Kagoshima) |
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62 |
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] |
ICSS2018-62 pp.49-54 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center (Hokkaido) |
On the Ring Signature Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85 |
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] |
ICSS2017-85 pp.215-220 |
ICSS |
2017-11-21 09:30 |
Oita |
Beppu International Convention Center (Oita) |
ICSS2017-42 |
[more] |
ICSS2017-42 pp.23-27 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
(Tokyo) |
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
IA, ICSS |
2017-06-08 15:40 |
Kochi |
Kochi University of Technolo, Eikokuji Campus (Kochi) |
On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7 |
[more] |
IA2017-7 ICSS2017-7 pp.37-42 |
ICSS, IA |
2016-06-06 15:00 |
Saga |
Saga University (Saga) |
Development of Network Forensic System Using Filter Drivers Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IA |
2016-06-07 13:00 |
Saga |
Saga University (Saga) |
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11 |
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] |
IA2016-11 ICSS2016-11 pp.57-62 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 11:30 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER (Aichi) |
On Anxiety Factors in Indirect Use for Cloud Type Medical Systems Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32 |
We have conducted questionnaire survey for our university students in order to clarify anxiety factors in indirect use f... [more] |
ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32 pp.143-149 |
LOIS |
2015-03-05 09:40 |
Okinawa |
(Okinawa) |
On a Decentralization Function for Deposited Data Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) LOIS2014-63 |
It is considered to be important that linkable anonymized data and its correspondence table between anonymous number and... [more] |
LOIS2014-63 pp.13-17 |
ICSS, IA |
2014-06-06 15:15 |
Hyogo |
Takikawa Memorial Hall, Kobe University (Hyogo) |
A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-13 ICSS2014-13 |
In the case of sending and receiving files which need secret via the Internet, files get encrypted. Encrypting files req... [more] |
IA2014-13 ICSS2014-13 pp.67-72 |
ICSS, IPSJ-SPT |
2014-03-27 14:55 |
Okinawa |
Meio Univiersity (Okinawa) |
SSL Client Authentication with TPM
-- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate -- Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-66 |
TPM-embedded terminals can be used as authentication tokens by issuing certificates to signature keys generated by TPM. ... [more] |
ICSS2013-66 pp.25-30 |
LOIS |
2014-03-08 16:20 |
Okinawa |
(Okinawa) |
Linkable System Using Encrypted Personal Identification Information for Clinical Research Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79 |
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] |
LOIS2013-79 pp.149-154 |
ISEC, LOIS |
2013-11-29 10:55 |
Miyagi |
Tohoku Univ. (Miyagi) |
on evaluation for estimating link loss rates by using network coding Youji Fukuta (Aichi Univ. of Education), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.) ISEC2013-66 LOIS2013-32 |
Monitoring or inference of internal network characteristics, such as transmission topology, link losses and delay, from ... [more] |
ISEC2013-66 LOIS2013-32 pp.45-50 |
LOIS, ICM |
2012-01-20 11:30 |
Kumamoto |
Sojo Univ. (Kumamoto) |
Development of software to present the same tests of physical strength of visuomotor transformation at the cognitive processing of concept formation for the analysis in brain activity using fMRI Kei Sugiura (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Ayuko Tanaka (NIPH), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICM2011-39 LOIS2011-64 |
It has been focused for effect of exercise on dementia. We want to clarify the relationship between exercise and brain f... [more] |
ICM2011-39 LOIS2011-64 pp.45-50 |
WBS, IT, ISEC |
2009-03-09 16:20 |
Hokkaido |
Hakodate Mirai Univ. (Hokkaido) |
Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.) IT2008-53 ISEC2008-111 WBS2008-66 |
Stream cipher is one of primitive classes in symmetric key ciphers where plaintext symbols are combined with pseudo rand... [more] |
IT2008-53 ISEC2008-111 WBS2008-66 pp.57-64 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. (Hokkaido) |
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68 |
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] |
IT2008-55 ISEC2008-113 WBS2008-68 pp.71-78 |