Thu, Jun 2 AM 10:45 - 11:45 |
(1) |
10:45-11:15 |
|
(2) |
11:15-11:45 |
|
|
11:45-13:30 |
Lunch Break ( 105 min. ) |
Thu, Jun 2 PM 13:30 - 15:15 |
(1) SITE |
13:30-13:55 |
A detection method of man-in-the-middle attack based on the variance of the RTT |
Hayato Sato, Sumiko Miyata, Norio Kashima (SIT) |
(2) SITE |
13:55-14:20 |
Privacy Preserving Digital Contents Circulation System Using Bitcoin 2.0 |
Kohei Miura, Hiroyuki Inaba (KIT) |
|
14:20-14:25 |
Break ( 5 min. ) |
(3) SITE |
14:25-14:50 |
A study of privacy information treatment method for Internet users |
Shinji Ishii, Takaaki Hasegawa (Saitama Univ.) |
(4) SITE |
14:50-15:15 |
Secrecy Laws in Japan and communication technologies |
Makoto Koike (MK Microwave Research) |
|
15:15-15:20 |
Break ( 5 min. ) |
Thu, Jun 2 PM 15:20 - 17:55 |
(5) |
15:20-15:50 |
|
(6) |
15:50-16:20 |
|
|
16:20-16:25 |
Break ( 5 min. ) |
(7) |
16:25-16:55 |
|
(8) |
16:55-17:25 |
|
(9) |
17:25-17:55 |
|
Fri, Jun 3 AM Invited Talk 10:00 - 11:00 |
(10) |
10:00-11:00 |
|
|
11:00-11:10 |
Break ( 10 min. ) |
Fri, Jun 3 AM 11:10 - 12:00 |
(11) SITE |
11:10-11:35 |
Independence of robots
-- Society where robots and human beings coexist -- |
Yuko Murakami (Tohoku U) |
(12) SITE |
11:35-12:00 |
On the Moral Value of Privacy
-- Reductionism and Coherentism -- |
Takushi Otani (Kibi International Univ.) |
|
12:00-13:30 |
Lunch Break ( 90 min. ) |
Fri, Jun 3 PM 13:30 - 15:35 |
(13) |
13:30-14:00 |
|
(14) |
14:00-14:30 |
|
|
14:30-14:35 |
Break ( 5 min. ) |
(15) |
14:35-15:05 |
|
(16) |
15:05-15:35 |
|