Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47 |
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] |
IT2020-128 ISEC2020-58 WBS2020-47 pp.104-109 |
SITE |
2019-12-06 15:40 |
Kanagawa |
|
"To be there" as an existence in logical space and an existence in probability measure space
-- "Shared logos (partage) on language games" as a necessary condition of physicality -- Tetsuya Morizumi (KU) SITE2019-86 |
How should the AI relate to the information security? The AI performs Bayesian estimation of a probability distribution ... [more] |
SITE2019-86 pp.41-46 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 10:55 |
Kochi |
Kochi University of Technology |
Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games
-- Limitations of Security Models and the Possibility of Artificial Intelligence -- Tetsuya Morizumi (KU) ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52 |
In this paper we describe that AI architecture including input data in artificial intelligence system for Bayesian estim... [more] |
ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52 pp.317-324 |
IA, ICSS |
2019-06-07 11:45 |
Miyagi |
Research Institute for Electrical Communication, Tohoku University |
A Survey on the Risks of Bypassing Public Captive Portals through Covert Channels Hidetaka Masuda, Hideya Ochiai, Hiroshi Esaki (UTokyo) IA2019-9 ICSS2019-9 |
Public Wi-Fi networks have spread to the world and is now an important infrastructure to us. However, there are many hot... [more] |
IA2019-9 ICSS2019-9 pp.43-48 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125 |
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more] |
IT2018-124 ISEC2018-130 WBS2018-125 pp.297-302 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 09:20 |
Hokkaido |
Hokkaido Univ. |
Design and Implementation of Network Covert Channel Validation Framework Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) SITE2011-47 IA2011-97 |
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] |
SITE2011-47 IA2011-97 pp.185-190 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 10:00 |
Hokkaido |
Hokkaido Univ. |
The improvement of a hypergraph-based model against information leakage by inference Ryo Suzuki (Kanagawa Univ.), Kazuhiro Suzuki (Kochi Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-49 IA2011-99 |
With the advance of internet technology, there has been an explosive increase in information. SNS and cloud services mak... [more] |
SITE2011-49 IA2011-99 pp.197-202 |
SITE, IPSJ-EIP |
2011-05-19 10:50 |
Tokyo |
Tokyo Univ. of Science |
Genetic Access Matrix Analysis Based on Multi Agent Model Tetsuya Morizumi (Toyo Nets. & S. I. Co. Ltd.), Kazuhiro Suzuki, Masato Noto, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-3 |
How should individuals contribute to the public good? Conversely, how does the public help the individual? We should ana... [more] |
SITE2011-3 pp.11-16 |
ICSS |
2011-03-25 13:25 |
Tokyo |
Suspended |
Consideration on hidden-communication channel in the Internet communication device. Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60 |
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more] |
ICSS2010-60 pp.23-28 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 16:10 |
Akita |
Akita University |
About the Security Model built in the Search Engine Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) ISEC2009-22 SITE2009-14 ICSS2009-36 |
The Cloud is the logic system with name space where relationships among resources in the Internet are represented by pre... [more] |
ISEC2009-22 SITE2009-14 ICSS2009-36 pp.45-49 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 16:35 |
Akita |
Akita University |
Logical Structure of the Cloud Which Projects Various Values onto Oneself
-- From the Aspect of the Agent of Self-Referred Social Systems -- Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2009-23 SITE2009-15 ICSS2009-37 |
The semantics cloud is a logical system that the relation of the object world is described by the predicate logic, and t... [more] |
ISEC2009-23 SITE2009-15 ICSS2009-37 pp.51-56 |
SITE, IPSJ-EIP |
2009-06-05 14:25 |
Tokyo |
|
About Ethics of the Internet Transformed to the Clouds
-- From the Aspect of the Access Control -- Tetsuya Morizumi (Toyo Networks & System Integration Co., LTD.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-1 |
In this paper ethical problems of the cloud in the Internet is shown. The cloud is defined as follows; the cloud is a lo... [more] |
SITE2009-1 pp.45-50 |
SITE, IPSJ-EIP |
2009-06-05 14:50 |
Tokyo |
|
Web push proposal upon the information flow control
-- Implimentaion of the filter information in the application server -- Akihito Toda (Kanagawa Univ.), Hiroshi Ichise (UNITEC Co.,Ltd.), Kazuhiro Suzuki (Kanagawa Univ.), Tetsuya Morizumi (Toyo Netwarks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-2 |
Cloud is defined as follows; cloud is a pair of the meta-language and the address. Cloud is used to control covert chann... [more] |
SITE2009-2 pp.51-56 |
IA, SITE |
2009-03-06 09:30 |
Kumamoto |
|
Proposal of The Access Control Agent System in the Internet for Semantics Cloud Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2008-82 IA2008-105 |
The concept called Cloud of the Internet is defined, semantics to which search engine and information production system ... [more] |
SITE2008-82 IA2008-105 pp.225-230 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 17:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems -- Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23 |
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] |
ISEC2008-29 SITE2008-23 pp.97-102 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:00 |
Hokkaido |
Future University-Hakodate |
Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels" Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) ISEC2007-25 SITE2007-19 |
There is a research where the data base is expressed by the deduction inference to make the world a database in construc... [more] |
ISEC2007-25 SITE2007-19 pp.65-70 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 16:35 |
Okayama |
Okayama Univ. |
On Enforcement of Noninterference Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech) |
We discuss a characterization of security policies to be enforced with a monitor. The monitor is a enforcement mechanism... [more] |
ISEC2006-37 SITE2006-34 pp.207-214 |
MoNA, IPSJ-MBL |
2006-05-19 10:00 |
Okinawa |
|
Privacy Protection with Customized Java Sandbox Architecture Md. Nurul Huda (SOKEN-DAI), Eiji Kamioka, Shigeki Yamada (NII) MoMuC2006-18 |
Multi-party cooperative problem solving techniques require multiple inputs from multiple participants. The participants ... [more] |
MoMuC2006-18 pp.97-102 |