Fri, Jul 14 AM 10:15 - 11:55 |
(1) SITE |
10:15-10:40 |
Performance Analysis of Video Watermarking Using Patchwork Method on Frequency Domain |
Takaya Kimura, Hiroyuki Inaba (KIT) |
(2) SITE |
10:40-11:05 |
Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain |
Kohei Miura, Hiroyuki Inaba (KIT) |
(3) SITE |
11:05-11:30 |
the Role of trust in the privacy problems |
Takushi Otani (Kibi International Univ.) |
(4) SITE |
11:30-11:55 |
Semantic Properties of Multi-layered Logic of Agency |
Yuko Murakami (Tohoku Univ.) |
Fri, Jul 14 AM 10:15 - 11:30 |
(5) |
10:15-10:40 |
|
(6) |
10:40-11:05 |
|
(7) |
11:05-11:30 |
|
Fri, Jul 14 AM 10:15 - 11:05 |
(8) ICSS |
10:15-10:40 |
A Proposal on the Actual State Survey Method of RIG Exploit Kit in User Environments |
Ichiro Shimada, Toshifumi Oota (KKE), Kouichirou Okada (SecureBrain), Akira Yamada (KDDI Research) |
(9) ICSS |
10:40-11:05 |
Identifying bottlenecks on social implementation of advanced cryptography |
Hiroki Kunii, Hiroyuki Date (SECOM) |
Fri, Jul 14 PM 13:25 - 14:40 |
(10) |
13:25-13:50 |
|
(11) |
13:50-14:15 |
|
(12) |
14:15-14:40 |
|
Fri, Jul 14 PM 13:25 - 14:40 |
(13) |
13:25-13:50 |
|
(14) |
13:50-14:15 |
|
(15) |
14:15-14:40 |
|
Fri, Jul 14 PM 13:25 - 14:40 |
(16) ICSS |
13:25-13:50 |
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download |
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) |
(17) ICSS |
13:50-14:15 |
File Access Analysis of Ransomware using Dynamic Binary Instrumentation |
Shun Yonamine, Yuki Kadobayashi (NAIST) |
(18) ICSS |
14:15-14:40 |
|
|
Fri, Jul 14 PM 15:20 - 17:00 |
(19) ISEC |
15:20-15:45 |
Presentation of fundamental schemes for augmenting several public key cryptosystems |
Masao Kasahara (Waseda Univ.) |
(20) ISEC |
15:45-16:10 |
Recovering CRT-RSA Secret Keys Using the Information of the Operations Based on 2^m-ary Method. |
Kento Oonishi, Noboru Kunihiro (Univ. of Tokyo) |
(21) ISEC |
16:10-16:35 |
Report of solving SVP's by using DeepLLL |
Junpei Yamaguchi, Masaya Yasuda (Kyushu Univ.) |
(22) ISEC |
16:35-17:00 |
PUF based Device Authentication without Error Correction |
Yuichi Komano (Toshiba), Mitsugu Iwamoto, Kazuo Ohta (UEC) |
Fri, Jul 14 PM 15:20 - 16:35 |
(23) SITE |
15:20-15:45 |
Considering Usability in the Discussions about Central Bank Issued Digital Currency |
Vanessa Bracamonte, Hitoshi Okada (NII) |
(24) SITE |
15:45-16:10 |
Proposal of the concept of connecting HIMOJI-ontologies by mutual information of texts, and its case study
-- In the case to see latent texts as random variables -- |
Xianbo Song, Tetsuya Morizumi, Hirotsugu Kinoshita (Kanagawa Univ.) |
(25) SITE |
16:10-16:35 |
Secrecy Law and Information Processing |
Makoto Koike (Micro Patent) |
Fri, Jul 14 PM 15:20 - 17:00 |
(26) |
15:20-15:45 |
|
(27) |
15:45-16:10 |
|
(28) |
16:10-16:35 |
|
(29) |
16:35-17:00 |
|
Sat, Jul 15 AM 10:15 - 11:30 |
(30) |
10:15-10:40 |
|
(31) |
10:40-11:05 |
|
(32) |
11:05-11:30 |
|
Sat, Jul 15 AM 10:15 - 11:55 |
(33) SITE |
10:15-10:40 |
A Study on Copyright Education Required in School Education |
Takahiro Haga (GSGU), Junko Azuma, Yoko Usui (Schwan), Takusi Otani (KIU), Haruki Ono (NU), Tsugumasa Suzuki (Keio Yochisya), Hiroyuki Takase (Wanagawa JHS), Hatsue Tsukamoto (ICT Kobo), Sinpei Toyofuku (GLOCOM), Yasuhiro Nakada (FSI), Takuro Nisio (Sakuradai), Ryuichi Morimune (Shirayuri JSHS), Yoshikazu Miwa (Gakusyu Kaihatsu), Sakiko Kudo (Bunri), Koki Watanabe (Ochanomizu JHS) |
(34) SITE |
10:40-11:05 |
Development of IT Enabled Services
-- For Regional Vitalization -- |
Shiro Uesugi (Mstsuyama J.C.) |
(35) SITE |
11:05-11:30 |
Theoretical Consideration on Innovation Dissemination of Wide Area Brands
-- Microeconomic Aspects -- |
Masahiro Morita (Matsuyama Univ.) |
(36) SITE |
11:30-11:55 |
Consideration on Innovation Dissemination of "Wide Area Brands" Using Multi-Agent Simulation |
Masahiro Morita (Matsuyama Univ.) |
Sat, Jul 15 AM 10:15 - 11:30 |
(37) |
10:15-10:40 |
|
(38) |
10:40-11:05 |
|
(39) |
11:05-11:30 |
|
Sat, Jul 15 PM EMM 1 (Room A) Chair: Hirohisa HIOKI (Kyoto Univ.) 13:25 - 14:40 |
(40) EMM |
13:25-13:50 |
Investigation of spikegram-based signal representation for speech fingerprints |
Dung Kim Tran, Masashi Unoki (JAIST) |
(41) EMM |
13:50-14:15 |
Study of template matching application of steganography ANGO |
Hirokazu Ishizuka (Mitsubishi Electric), Isao Echizen (NII), Keiichi Iwamura (TUS), Koichi Sakurai (Kyushu Univ.) |
(42) EMM |
14:15-14:40 |
A Data Embedding for NGS Data |
Motoshige Takagi (SST) |
Sat, Jul 15 PM 13:25 - 15:05 |
(43) ISEC |
13:25-13:50 |
Proposal of Personal Authentication Method by Visual Secret Scheme Using Smart Phone |
Ryo Mizuno, Hiroyuki Inaba (KIT) |
(44) ISEC |
13:50-14:15 |
Security Evaluation of the Software Architecture of TEE-enabled Device and Its Open-source Implementation |
Naoki Yoshida (YNU), Kazuhiko Fukushima, Shigenori Miyauchi (Renesas Electronics), Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
(45) ISEC |
14:15-14:40 |
Zynq-based Coprocessor Development Environment for Cryptography with Advanced Functionality and Its Evaluation |
Takanori Miyoshi, Tsutomu Matsumoto (YNU) |
(46) ISEC |
14:40-15:05 |
Proof Of Retrievability for Lightweight Secure Cloud Storage |
Tran Phon Thao (KDDI Labs), Kazumasa Omote (Univ. of Tsukuba) |
Sat, Jul 15 PM 13:25 - 14:40 |
(47) |
13:25-13:50 |
|
(48) |
13:50-14:15 |
|
(49) |
14:15-14:40 |
|