Wed, Nov 17 PM LOIS 13:00 - 15:00 |
(1) |
13:00-13:30 |
Proposal and Verification on Universal Profiler System Based on Basic Desires |
Takayuki Akiyama, Yaemi Teramoto, Kiyohiro Obara, Masaaki Tanizaki (Hitachi) |
(2) |
13:30-14:00 |
Gait Monitoring with a Cellular Phone |
Tatsuaki Ito, Tatsuya Ishihara, Yukihiro Nakamura, Shinyo Muto (NTT), Masanobu Abe (Okayama Univ.) |
(3) |
14:00-14:30 |
Demonstrative experiment of personal health record system using public account for personal information management |
Hiroyuki Suzuki (Tokyo Inst. of Tech.), Kouichi Kita (HISPRO), Joong Sun Lee, Naoko Taira, Takashi Obi, Masahiro Yamaguchi, Masuyoshi Yachida, Hiroshige Yamamoto, Kazuhisa Uryu, Takahiro Yokoyama, Nagaaki Ohyama (Tokyo Inst. of Tech.), Fumito Tsuchiya (Tokyo Med. & Dent. Univ. Hosp. Faculty of Dentistry), Masataka Inokuchi (Minamimachida Hosp.) |
(4) |
14:30-15:00 |
Study on the requirement of the medication history information management |
Naoko Taira, Joong Sun Lee, Hiroyuki Suzuki (Tokyo Inst. technology), Kouichi Kita (HISPRO), Fumito Tsuchiya (Tokyo Med. & Den.Univ.), Takashi Obi, Takahiro Yokoyama, Nagaaki Ohyama (Tokyo Inst. technology) |
Wed, Nov 17 PM ISEC 15:15 - 17:20 |
(5) |
15:15-15:40 |
Similarity Hashing resistant to file modifications |
Susumu Serita, Yasuhiro Fujii, Satoshi Kai, Takao Murakami, Yoshinori Honda (Hitachi, Ltd.) |
(6) |
15:40-16:05 |
A Visible-Light Artifact-Metric System which Extracts Values Unique to Individual Paper |
Yasuhiro Fukuda, Tsutomu Matsumoto (Yokohama National Univ.) |
(7) |
16:05-16:30 |
Improved Broadcast Encryption by Secret Sharing Scheme |
Kyota Miwa, Wataru Kishimoto (Chiba Univ.) |
(8) |
16:30-16:55 |
Study of Tolerability in Defacing of Y-00 Quantum Stream Cipher |
Takehisa Iwakoshi, Osamu Hirota (Tamagawa Univ.) |
(9) |
16:55-17:20 |
Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system |
Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.) |
Thu, Nov 18 AM LOIS 09:00 - 10:30 |
(10) |
09:00-09:30 |
Sample Investigation and the Consideration to Compromising Cryptosystems in SSL |
Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) |
(11) |
09:30-10:00 |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- |
Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) |
(12) |
10:00-10:30 |
A Method for Protecting User Passwords at Agent Server Node |
Hiromitsu Ueda, Yukio Rikiso (Univ. of Hyogo) |
Thu, Nov 18 AM LOIS 10:45 - 12:15 |
(13) |
10:45-11:15 |
Evaluation of information provision methods for website audience on a life log collection system |
Iori Osada, Takashi Yoshino (Wakayama Univ.) |
(14) |
11:15-11:45 |
Recording receipts for consumer-oriented lifelog services |
Seiki Tokunaga, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) |
(15) |
11:45-12:15 |
Implementing Database and Web Services for Life-Log Mashup APIs |
Akira Shimojo, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) |