Thu, Nov 9 AM 09:00 - 10:30 |
(1) |
09:00-09:30 |
A proposal of precut vegetable search algorithm for homemade cooking |
Risa Matsuoka, Yukiko Matsushima (NIT, Tsuyama Col.) |
(2) |
09:30-10:00 |
Consciousness Investigation of Passwords Management in University Students
-- Questionnaire Design based on Friend Relationships -- |
Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) |
(3) |
10:00-10:30 |
User Authentication Keeping Method Using Watch Type Devices
-- Case of Acceleration Sensors -- |
Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) |
|
10:30-10:40 |
Break ( 10 min. ) |
Thu, Nov 9 AM 10:40 - 12:10 |
(4) |
10:40-11:10 |
Application of ISO/IEC 29100:2011 to the evaluation criteria of privacy impact assessment |
Ryotaro Nakata, Sanggyu Shin, Yoichi Seto (AIIT) |
(5) |
11:10-11:40 |
Verifing Individualities of Usage History in Digital Flyers Application |
Soki Nishiyama, Hiroya Susuki, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi (UTokyo) |
(6) |
11:40-12:10 |
Attempt to apply 3-Aufheben/MELT-UP for social issues "Realization of Safe and Secure E-mail Exchange Framework" |
Toshiaki Saisho, Shigeo Tshujii (Research and Development Initiative, Chuo University) |
|
12:10-13:10 |
Break ( 60 min. ) |
Thu, Nov 9 PM 13:10 - 14:10 |
(7) |
13:10-14:10 |
[Invited Talk]
Study about utilization of Wi-Fi log as location service |
Hideki Yoshii (SoftBank) |
|
14:10-14:20 |
Break ( 10 min. ) |
Thu, Nov 9 PM 14:20 - 15:50 |
(8) |
14:20-14:50 |
|
|
(9) |
14:50-15:20 |
A Consideration on Information Legal Policy in Japan from the Digital Single Market Strategy in EU
-- Based on Mid-Term review of DSM -- |
Naonori Kato, Yosuke Murakami (KDDI Research) |
(10) |
15:20-15:50 |
A study on Information
-- Tribute to Shannon and Dretski -- |
Ichiro Mizukoshi (IISEC/NTT East) |
|
15:50-16:00 |
Break ( 10 min. ) |
Thu, Nov 9 PM 16:00 - 17:30 |
(11) |
16:00-16:30 |
Construction of code based PKC based on binary cyclic code realizing coding rate of exactly 1.0
-- Along with revised K(V)PKC -- |
Masao Kasahara (Waseda Univ.) |
(12) |
16:30-17:00 |
Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation |
Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC) |
(13) |
17:00-17:30 |
HIBE based on Universal Sampler |
Shunsuke Otsuka, Akinori Kawachi, Atsuko Miyaji (Osaka Univ.) |
Fri, Nov 10 AM 10:00 - 12:00 |
(14) |
10:00-10:30 |
Prediction method of tumble using machine learning of footsteps. |
Takehiro Mori, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) |
(15) |
10:30-11:00 |
Elderly people observation system based on the detection of untrained acoustic data |
Akihiro Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) |
(16) |
11:00-11:30 |
Estimation of Office Worker Seated-State with Ambient Sensors |
Daisuke Ikeda, Yukihiro Tsuboshita, Takeshi Onishi (Fuji Xerox) |
(17) |
11:30-12:00 |
Consideration for Estimation of Accommodation State from Web big data with Deep Learning |
Noriaki Koide (ROIS) |
|
12:00-13:00 |
Break ( 60 min. ) |
Fri, Nov 10 PM 13:00 - 14:30 |
(18) |
13:00-13:30 |
Why Do We Need the Ethical Guideline for Internet Research?
-- The Development of Internet Research Ethics and Its Introduction to Japan -- |
Takushi Otani (Kibi International Univ.), Reina Saijo (Hokkaido Univ.), Akinori Kubo (Hitotsuabshi Univ.), Hirotaka Osawa (Tsukuba Univ.), Arisa Ema (Tokyo Univ.), Nobutsugu Kanzaki (Nanzan Univ.), Hiromitsu Hattori (Ritsumeikan Univ.), Ryutaro Ichise (NII), Naonori Akiya (Yamaguchi Univ.), Kazunori Komatani (Osaka Univ.), Miyano Naoki (Kyoto Univ.) |
(19) |
13:30-14:00 |
Considering Privacy issue
-- based on Floridi's Philosophy of Information -- |
Hiroyuki Kinoshita (IISEC) |
(20) |
14:00-14:30 |
Implementation Planning of Penetration Testing Exercises for Raising Cybersecurity Awareness |
Daisuke Suzuki (Hokuriku Univ.) |
|
14:30-14:40 |
Break ( 10 min. ) |
Fri, Nov 10 PM 14:40 - 16:40 |
(21) |
14:40-15:10 |
Accelerating Revocable Group Signature with Compact Revocation List Using Vector Commitments |
Yasuyuki Seita, Shahidatul Sadiah, Toru Nakanishi (Hiroshima Univ.) |
(22) |
15:10-15:40 |
Lattice Attacks on Elliptic Curve Diffie-Hellman key exchange |
Sota Onozawa (The Univ. of Tokyo), Atsushi Takayasu (The Univ. of Tokyo/AIST), Noboru Kunihiro (The Univ. of Tokyo) |
(23) |
15:40-16:10 |
An Implementation of Mutual Authentication Using Attribute-based Encryption for IoT |
Yusuke Tsubaki, Toru Nakanishi (Hiroshima Univ.) |
(24) |
16:10-16:40 |
Revocable Hierarchical Identity-Based Encryption based on LWE Assumption |
Atsushi Takayasu, Shuichi Katsumata (Univ. Tokyo), Takahiro Matsuda (AIST) |