Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS |
2013-01-10 13:00 |
Okinawa |
|
The validity problem of positive XPath queries with sibling axes in the presence of DTDs Yohei Kusunoki (Osaka Univ.), Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
In this paper, we discuss the complexity of the validity for positive XPath queries under the presence of DTDs. A given ... [more] |
SS2012-46 pp.1-6 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 10:55 |
Hokkaido |
|
Hybrid Additive-Multiplicative Watermarking for General Embedding Domains Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2 |
[more] |
ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2 pp.9-16 |
SS |
2012-03-14 09:00 |
Okinawa |
Tenbusu-Naha |
Decidability of Query Preservation for Deterministic Linear Top-Down Tree Transducers Ryuta Sawada (Osaka Univ.), Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2011-75 |
When updating an XML schema, it is desirable that the new schema preserve the expressive power of the old one. The query... [more] |
SS2011-75 pp.109-114 |
SS |
2012-03-14 09:25 |
Okinawa |
Tenbusu-Naha |
Combining the tractability of duplicate-free DTDs and disjunction-capsuled DTDs for XPath satisfiability with sibling axes Yasunori Ishihara (Osaka Univ.), Shogo Shimizu (AIIT), Kenji Hashimoto (NAIST), Toru Fujiwara (Osaka Univ.) SS2011-76 |
This paper demonstrates a new subclass of DTDs,
called DC/DF-DTDs, under which XPath
satisfiability with child, descen... [more] |
SS2011-76 pp.115-120 |
ISEC, LOIS |
2011-11-15 14:15 |
Osaka |
Osaka Electro-Communication University |
Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-57 LOIS2011-51 |
A protocol is said to be EUC secure if it can be securely
composed with arbitrary protocols which use the same setup. ... [more] |
ISEC2011-57 LOIS2011-51 pp.155-162 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-12 13:55 |
Shizuoka |
Shizuoka University |
Recovery of Tampered Pixels for Statistical Fragile Watermarking Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.) ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9 |
[more] |
ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9 pp.7-12 |
ISEC |
2011-05-13 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Impossibility of $d$-Multiplicative Non-perfect Secret Sharing Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-5 |
[more] |
ISEC2011-5 pp.31-36 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Symbolic Criterion for EUC Secure Authentication against Static Adversary Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) IT2010-129 ISEC2010-133 WBS2010-108 |
EUC secure protocol maintains its security even when it is composed and shares public information with arbitrary protoco... [more] |
IT2010-129 ISEC2010-133 WBS2010-108 pp.403-410 |
SS |
2010-12-15 09:00 |
Gunma |
Ikaho-Onsen Hotel Tenbo |
The Validity Problem of Positive XPath Queries in the Presence of DTDs Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2010-47 |
We discuss the validity problem for positive XPath queries in the presence of DTDs. A given query $p$ is valid under a D... [more] |
SS2010-47 pp.49-54 |
ISEC, LOIS |
2010-11-17 16:55 |
Ibaraki |
Tsukuba Univ. |
Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.) ISEC2010-58 LOIS2010-37 |
The computational hardness of number-theoretic problems used in
cryptography is generally proved in a generic model of ... [more] |
ISEC2010-58 LOIS2010-37 pp.57-64 |
IT |
2009-07-23 15:10 |
Osaka |
Kwansei Gakuin Univ. (Umeda campus) |
Performance Evaluation and Analysis on Digital Watermark for Still Images with JPEG Compression Attack Tetsushi Masuno, Takuya Kusaka (Okayama Univ.), Toru Fujiwara (Osaka Univ.) IT2009-14 |
Digital watermark is a useful technology for copyright protection.
A number of studies on embedding watermark into spat... [more] |
IT2009-14 pp.49-54 |
WBS, IT, ISEC |
2009-03-09 14:10 |
Hokkaido |
Hakodate Mirai Univ. |
[Invited Talk]
Performance Evaluation of Error Correcting Codes Toru Fujiwara (Osaka Univ.) IT2008-51 ISEC2008-109 WBS2008-64 |
In this talk, performance analysis on error correcting codes used in digtal watermarking and in network coding is discus... [more] |
IT2008-51 ISEC2008-109 WBS2008-64 p.49 |
IT |
2008-07-24 11:20 |
Chiba |
University of Tokyo, Kashiwa Campus |
On Distance Distribution of a Reed-Solomon-like Code for Network Coding Masafumi Tominaga (Osaka Univ.), Kenji Yasunaga (Kwansei Gakuin Univ.), Toru Fujiwara (Osaka Univ.) IT2008-9 |
Network coding is a technique for efficient network communication. Middle nodes between a source node and a destination ... [more] |
IT2008-9 pp.7-10 |
ISEC, IT, WBS |
2008-02-29 11:35 |
Tokyo |
|
A Lower Bound on the Number of Uncorrectable Errors of Weight Half the Minimum Distance Kenji Yasunaga, Toru Fujiwara (Osaka Univ.) IT2007-56 ISEC2007-153 WBS2007-87 |
[more] |
IT2007-56 ISEC2007-153 WBS2007-87 pp.51-56 |
ISEC, LOIS |
2007-11-21 14:45 |
Hyogo |
Kobe University |
Anonymous Fingerprinting for Predelivery of Contents Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2007-92 OIS2007-64 |
Security requirements for predelivery of digital contents such as movies whose release date is predeterminedare analyzed... [more] |
ISEC2007-92 OIS2007-64 pp.23-30 |
DE |
2007-07-02 15:45 |
Miyagi |
Akiu hot springs (Sendai) |
Generating XML document transformers according to XML schema evolution based on the tree-embedding relation Masaki Yoshida, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-39 |
Given an update operation sequence for schema evolution based on the tree-embedding relation, the method of generating X... [more] |
DE2007-39 pp.103-108 |
DE |
2007-07-02 16:10 |
Miyagi |
Akiu hot springs (Sendai) |
Translating XPath queries according to XML schema evolution based on the tree-embedding relation Takuji Morimoto, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-40 |
A method is proposed for translating queries in a subclass of XPath according to XML schema evolution based on the tree-... [more] |
DE2007-40 pp.109-114 |
SITE |
2006-12-08 16:20 |
Osaka |
|
Engineering Ethics Course for Computer Science Graduate Students Michio Nakanishi (OIT), Toru Fujiwara (Osaka Univ.), Yoshinori Takeuchi, Masanori Akiyoshi, Masanori Hashimoto, Fumio Kishino, Kiyoshi Kiyokawa, Takahiro Hara, Koji Nakamae, Tohru Kikuno, Yuuichi Teranishi (Osaka University) |
[more] |
SITE2006-49 pp.41-47 |
DE |
2006-07-12 14:45 |
Niigata |
HOTEL SENKEI |
Security Verification against Attacks using Type Inference on XML Databases Fumikazu Takasuka, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) |
Inference attacks mean that an attacker tries to infer the execution result of a query unauthorized to the attacker (i.e... [more] |
DE2006-47 pp.151-156 |
IT |
2006-05-23 15:55 |
Nara |
Nara-ken new public hall |
Structural Analysis of Minimum Weight Codewords of the Extended (32,21,6) and (64,45,8) BCH Codes Using Invariance Property Jun Asatani (Okayama Univ. of Sci.), Takuya Koumoto (Okayama Univ.), Toru Fujiwara (Osaka Univ.), Tadao Kasami (NAIST) |
In this report, two typical examples (32,21,6) and (64,45,8) extended BCH codes are considered, and their structures of ... [more] |
IT2006-5 pp.25-30 |