IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 130

Social Implications of Technology and Information Ethics

Workshop Date : 2016-07-14 - 2016-07-15 / Issue Date : 2016-07-07

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

SITE2016-7
A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise
Shogo Shigemoto, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.)
pp. 1 - 6

SITE2016-8
Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle
Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.)
pp. 7 - 12

SITE2016-9
Study of an information extraction method using artificial fiber pattern with a clear ink
Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII)
pp. 13 - 18

SITE2016-10
Technique for Embedding Information by Constructing Protuberance With Inner Walls of Objects Fabricated With 3-D Printers
Kousuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.)
pp. 19 - 22

SITE2016-11
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers
Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.)
pp. 23 - 28

SITE2016-12
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing
Motoi Tanaka, Hiroyuki Inaba (KIT)
pp. 29 - 32

SITE2016-13
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time
Hiroaki Kuno, Hiroyuki Inaba (KIT)
pp. 33 - 36

SITE2016-14
A Study of a Simple Model of Information Safety Education -- A Departure from Convetional Information Moral Education Model --
Takahiro Haga (GSGU), Akiko Igarashi (Uchida), Katsurou Nishioka (UHD)
pp. 37 - 40

SITE2016-15
Developing rules to transmit our intentions in Computer Mediated Communication
Nobuyuki Yoshinga (YPU)
pp. 41 - 45

SITE2016-16
Privacy Problems and Social Relationships -- Privacy Problems Caused by the Visualization and Manipulation of Social Relationships --
Takushi Otani (Kibi International Univ.)
pp. 47 - 51

SITE2016-17
On the Conditions for Successful RF Retroreflector Attacks
Haruka Hoshino (Waseda Univ.), Masahiro Kinugawa (Sendai KOSEN), Yuichi Hayashi (Tohoku Gakuin Univ.), Tatsuya Mori (Waseda Univ.)
pp. 53 - 58

SITE2016-18
Evaluation of Clustering Analysis Based on Malware Traffic Model
Mitsuhiro Hatada (Waseda Univ./NTT Communications), Tatsuya Mori (Waseda Univ.)
pp. 59 - 64

SITE2016-19
Cyber security for Industrial control systems(ICS) in IoT era
Yuma Takayama (IsecG(MFE)), Ichiro Koshijima, Tomomi Aoyama (nitech)
pp. 65 - 70

SITE2016-20
Investigation of Android Markets using Static Detector for Packed Applications
Hiroki Nakano, Zhiyong Yang, Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
pp. 71 - 76

SITE2016-21
One-time pad chaotic cryptography using augmented Lorenz equations
Kenichiro Cho, Takaya Miyano (Ritsmeikan Univ)
pp. 107 - 114

SITE2016-22
Further improving security of Vector Stream Cipher
Atsushi Iwasaki, Ken Umeno (Kyoto Univ.)
pp. 115 - 120

SITE2016-23
Improvement of Winternitz one time signature and its security proof
Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST)
pp. 121 - 128

SITE2016-24
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.)
pp. 129 - 136

SITE2016-25
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation
Hui Zhao, Kouichi Sakurai (Kyushu Univ.)
pp. 137 - 143

SITE2016-26
Efficient Discrete Gaussian Sampling on Constrained Devices
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT)
pp. 169 - 175

SITE2016-27
Worst Case Short Lattice Point Enumeration on Block Reduced Bases
Atsushi Takayasu, Noboru Kunihiro (Univ. Tokyo)
pp. 177 - 184

SITE2016-28
On the Semi-regularity of Polynomial Systems Arising from the Section Finding Problem
Shinya Okumura (ISIT), Koichiro Akiyama (Toshiba), Tsuyoshi Takagi (Kyushu Univ.)
pp. 185 - 191

SITE2016-29
Algebraic Surface Cryptosystems using Polynomial Approximate GCD
Yuichi Komano, Koichiro Akiyama (Toshiba), Yasuhiro Goto (Hokkaido Univ. of Education), Koji Nuida, Goichiro Hanaoka (AIST)
pp. 217 - 222

SITE2016-30
A Faster Hardware for 254-bit Prime-Field Pairing with Dedicated Pipeline Modular Multipliers and Inverters
Daisuke Fujimoto, Yusuke Nagahama, Tsutomu Matsumoto (YNU)
pp. 223 - 228

SITE2016-31
A Durability Evaluation for Metallic-Foil Artifact-Metrics
Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 229 - 236

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan