|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2020-03-10 13:50 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) IT2019-104 ISEC2019-100 WBS2019-53 |
In this paper, we deal with the problem of database statistics publishing with privacy and utility guarantees. While var... [more] |
IT2019-104 ISEC2019-100 WBS2019-53 pp.95-100 |
NS, IN, CS, NV (Joint) |
2019-09-06 11:40 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
Efficient Reliability Evaluation of Multi-Domain Networks with Secure Intra-Domain Privacy Atsushi Taniguchi, Takeru Inoue, Kohei Mizuno (NTT), Takashi Kurimoto, Atsuko Takefusa, Shigeo Urushidani (NII) CS2019-55 |
Communication networks are now an essential infrastructure of society. Many services are constructed across multiple net... [more] |
CS2019-55 pp.45-50 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:20 |
Hokkaido |
San-Refure Hakodate |
Privacy Invasion and the Concept of the "Digital Person"
-- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory -- Takushi Otani (Kibi International Univ.) ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 |
This article explores the harm caused by the misuses of the “digital person,” which is the aggregated personal data from... [more] |
ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 pp.205-212 |
PRMU, IBISML, IPSJ-CVIM [detail] |
2013-09-02 13:00 |
Tottori |
|
[Invited Talk]
Topics on the Cost in Machine Learning Shotaro Akaho (AIST) PRMU2013-40 IBISML2013-20 |
Most machine learning algorithms minimize some cost functions, therefore
the cost is a general target of research.
... [more] |
PRMU2013-40 IBISML2013-20 pp.47-48 |
SITE, IPSJ-EIP |
2013-05-16 10:00 |
Kanagawa |
Institute of Infomation Security |
Logical descriptions of privacy Yuko Murakami (Tohoku Univ.) SITE2013-1 |
This paper, focusing on the concept of privacy in communication among human agents, first considers previous conceptual... [more] |
SITE2013-1 pp.1-4 |
DE |
2010-12-06 17:20 |
Tokyo |
AIST Tokyo Akihabara Site |
An Efficient Prevention Method of Deviation from an Anonymous Data Collection Protocol Yuya Nojima, Yoko Kamidoi, Shin'ichi Wakabayashi (Hiroshima City Univ.) DE2010-36 |
Rational players deviate from a communication protocol when they can get more profit than one got if they follow the pro... [more] |
DE2010-36 pp.61-66 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 11:20 |
Aomori |
Hirosaki University |
Limit of "Control Theory" of Privacy
-- Presentation of Identity and Context Dependency of Privacy -- Takushi Otani (Kibi International Univ.) ISEC2010-12 SITE2010-8 ICSS2010-18 |
The concept of Privacy has enlarged with changes in technology and society. After the 1960s, when modern information tec... [more] |
ISEC2010-12 SITE2010-8 ICSS2010-18 pp.13-19 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|