IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 129

Information Security

Workshop Date : 2016-07-14 - 2016-07-15 / Issue Date : 2016-07-07

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2016-13
A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise
Shogo Shigemoto, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.)
pp. 1 - 6

ISEC2016-14
Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle
Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.)
pp. 7 - 12

ISEC2016-15
Study of an information extraction method using artificial fiber pattern with a clear ink
Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII)
pp. 13 - 18

ISEC2016-16
Technique for Embedding Information by Constructing Protuberance With Inner Walls of Objects Fabricated With 3-D Printers
Kousuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.)
pp. 19 - 22

ISEC2016-17
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers
Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.)
pp. 23 - 28

ISEC2016-18
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing
Motoi Tanaka, Hiroyuki Inaba (KIT)
pp. 29 - 32

ISEC2016-19
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time
Hiroaki Kuno, Hiroyuki Inaba (KIT)
pp. 33 - 36

ISEC2016-20
A Study of a Simple Model of Information Safety Education -- A Departure from Convetional Information Moral Education Model --
Takahiro Haga (GSGU), Akiko Igarashi (Uchida), Katsurou Nishioka (UHD)
pp. 37 - 40

ISEC2016-21
Developing rules to transmit our intentions in Computer Mediated Communication
Nobuyuki Yoshinga (YPU)
pp. 41 - 45

ISEC2016-22
Privacy Problems and Social Relationships -- Privacy Problems Caused by the Visualization and Manipulation of Social Relationships --
Takushi Otani (Kibi International Univ.)
pp. 47 - 51

ISEC2016-23
On the Conditions for Successful RF Retroreflector Attacks
Haruka Hoshino (Waseda Univ.), Masahiro Kinugawa (Sendai KOSEN), Yuichi Hayashi (Tohoku Gakuin Univ.), Tatsuya Mori (Waseda Univ.)
pp. 53 - 58

ISEC2016-24
Evaluation of Clustering Analysis Based on Malware Traffic Model
Mitsuhiro Hatada (Waseda Univ./NTT Communications), Tatsuya Mori (Waseda Univ.)
pp. 59 - 64

ISEC2016-25
Cyber security for Industrial control systems(ICS) in IoT era
Yuma Takayama (IsecG(MFE)), Ichiro Koshijima, Tomomi Aoyama (nitech)
pp. 65 - 70

ISEC2016-26
Investigation of Android Markets using Static Detector for Packed Applications
Hiroki Nakano, Zhiyong Yang, Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 71 - 76

ISEC2016-27
One-time pad chaotic cryptography using augmented Lorenz equations
Kenichiro Cho, Takaya Miyano (Ritsmeikan Univ)
pp. 107 - 114

ISEC2016-28
Further improving security of Vector Stream Cipher
Atsushi Iwasaki, Ken Umeno (Kyoto Univ.)
pp. 115 - 120

ISEC2016-29
Improvement of Winternitz one time signature and its security proof
Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST)
pp. 121 - 128

ISEC2016-30
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.)
pp. 129 - 136

ISEC2016-31
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation
Hui Zhao, Kouichi Sakurai (Kyushu Univ.)
pp. 137 - 143

ISEC2016-32
Efficient Discrete Gaussian Sampling on Constrained Devices
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT)
pp. 169 - 175

ISEC2016-33
Worst Case Short Lattice Point Enumeration on Block Reduced Bases
Atsushi Takayasu, Noboru Kunihiro (Univ. Tokyo)
pp. 177 - 184

ISEC2016-34
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem
Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.)
pp. 185 - 191

ISEC2016-35
Algebraic Surface Cryptosystems using Polynomial Approximate GCD
Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST)
pp. 217 - 222

ISEC2016-36
A Faster Hardware for 254-bit Prime-Field Pairing with Dedicated Pipeline Modular Multipliers and Inverters
Daisuke Fujimoto, Yusuke Nagahama, Tsutomu Matsumoto (YNU)
pp. 223 - 228

ISEC2016-37
A Durability Evaluation for Metallic-Foil Artifact-Metrics
Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 229 - 236

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan