Fri, Nov 21 PM 13:20 - 15:05 |
|
13:20-13:25 |
Opening Remark ( 5 min. ) |
(1) |
13:25-13:50 |
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit |
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) |
(2) |
13:50-14:15 |
Extension of NTRU scheme using non-commutative groups II |
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT) |
(3) |
14:15-14:40 |
Card-based Generation of Random Permutations without Fixed Points |
Rie Ishikawa, Eikoh Chida (NIT, Ichinoseki Colleage), Takaaki Mizuki (Tohoku Univ.) |
(4) |
14:40-15:05 |
Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic |
Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) |
|
15:05-15:20 |
Break ( 15 min. ) |
Fri, Nov 21 PM 15:20 - 16:45 |
(5) |
15:20-15:45 |
estimating situations of a room using presence sensing log |
Yuki Kashio, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) |
(6) |
15:45-16:45 |
[Invited Talk]
Information sharing technologies for disaster situations
-- design principles and field evaluations -- |
Masayuki Ihara (NTT) |
Sat, Nov 22 AM 08:55 - 10:40 |
|
08:55-09:00 |
Opening Address ( 5 min. ) |
(7) |
09:00-09:25 |
Harms and Offenses of Moral Wrongdoings on Personal Information
-- Why Is Sensitive Information Sensitive? -- |
Takushi Otani (Kibi International Univ.) |
(8) |
09:25-09:50 |
Proposal of the measure behavior intention model in measure against a computer virus. |
Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) |
(9) |
09:50-10:15 |
Study on Network Community Analysis.
-- High Speed Computing Algorithm and it's Characteristics -- |
Mayako Sato, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) |
(10) |
10:15-10:40 |
An approach to assess the risk of information leakage by inference
-- A pilot study of a visualization tool and an algorithm using local connectivity in digraphs -- |
Kazuhiro Suzuki, Haruka Uchima, Miki Kondo (Kochi Univ.) |
|
10:40-10:55 |
Break ( 15 min. ) |
Sat, Nov 22 AM 10:55 - 12:10 |
(11) |
10:55-11:20 |
Hands-free voice command input system using voice power adapted standard patterns |
Yuji Yoshida, Hiroyuki Nishi, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ) |
(12) |
11:20-11:45 |
Interactive System for Supporting Decision of Transportation Path According to User's Preference |
Eko Sakai (Otani Univ.), Ken Nakayama (Tsuda College) |
(13) |
11:45-12:10 |
Behavior Prediction from Lifelog Data Using A Virtual Communication-Network System |
Yusuke Omori, Ryoichi Shinkuma (Kyoto Univ.), Kazuhiro Yamaguchi (KDL), Tatsuro Takahashi (Kyoto Univ.) |
|
12:10-13:20 |
Lunch Break ( 70 min. ) |
Sat, Nov 22 PM 13:20 - 14:10 |
(14) |
13:20-13:45 |
Improving certificate validation in SSL/TLS implementations |
Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST) |
(15) |
13:45-14:10 |
How to Utilize Location Information for Distinguishing Users |
Takuya Funakoshi, Masahiro Mambo (Kanazawa Univ.) |
|
14:10-14:15 |
Closing Address ( 5 min. ) |