===============================================
Technical Committee on Social Implications of Technology and Information Ethics (SITE)
Chair: Noriaki Yoshikai (Nihon Univ.)
Vice Chair: Hitoshi Okada (NII), Tetsuya Morizumi (Toyo Networks & System Integration)
Secretary: Daisuke Yamakata (JAMISR), Sumiko Miyama (Kanagawa Univ.)
Assistant: Takahiro Tagawa (Kyushu Univ.), Takahiro Haga (Gifu Shotoku Gakuen Univ.)
===============================================
Technical Committee on Information Security (ISEC)
Chair: Koichi Sakurai (Kyushu Univ.) Vice Chair: Yukiyasu Tsunoo (NEC), Masahiro Mambo (Kanazawa Univ.)
Secretary: Tetsu Iwata (Nagoya Univ.), Goichiro Hanaoka (AIST)
Assistant: Tetsuya Izu (Fujitsu Lab.), Junpei Kawamoto (Kyushu Univ.), Yuichi Komano (Toshiba), Shigeyoshi Shima (NEC), Takaaki Mizuki (Tohoku Univ.)
===============================================
Technical Committee on Life Intelligence and Office Information Systems (LOIS)
Chair: Manabu Okamoto (NTT) Vice Chair: Hiroyuki Nishi (Sojo Univ.)
Secretary: Manabu Motegi (NTT), Akihisa Kodate (Tsuda College)
Assistant: Tomoki Watanabe (NTT)
DATE:
Fri, Nov 21, 2014 13:25 - 16:45
Sat, Nov 22, 2014 09:00 - 14:10
PLACE:
Graduate School of Applied Informatics, University of Hyogo Computational Science Center Building 7F(7-1-28 Minatojima-minamimachi, Chuo-ku Kobe, Hyogo 650-0047, Japan. Prof. Yukio Rikiso. 078-303-1926)
TOPICS:
----------------------------------------
Fri, Nov 21 PM (13:20 - 15:05)
----------------------------------------
----- Opening Remark ( 5 min. ) -----
(1) 13:25 - 13:50
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.)
(2) 13:50 - 14:15
Extension of NTRU scheme using non-commutative groups II
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT)
(3) 14:15 - 14:40
Card-based Generation of Random Permutations without Fixed Points
Rie Ishikawa, Eikoh Chida (NIT, Ichinoseki Colleage), Takaaki Mizuki (Tohoku Univ.)
(4) 14:40 - 15:05
Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic
Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ)
----- Break ( 15 min. ) -----
----------------------------------------
Fri, Nov 21 PM (15:20 - 16:45)
----------------------------------------
(5) 15:20 - 15:45
estimating situations of a room using presence sensing log
Yuki Kashio, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.)
(6) 15:45 - 16:45
[Invited Talk]
Information sharing technologies for disaster situations
-- design principles and field evaluations --
Masayuki Ihara (NTT)
----------------------------------------
Sat, Nov 22 AM (08:55 - 10:40)
----------------------------------------
----- Opening Address ( 5 min. ) -----
(7) 09:00 - 09:25
Harms and Offenses of Moral Wrongdoings on Personal Information
-- Why Is Sensitive Information Sensitive? --
Takushi Otani (Kibi International Univ.)
(8) 09:25 - 09:50
Proposal of the measure behavior intention model in measure against a computer virus.
Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.)
(9) 09:50 - 10:15
Study on Network Community Analysis.
-- High Speed Computing Algorithm and it's Characteristics --
Mayako Sato, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.)
(10) 10:15 - 10:40
An approach to assess the risk of information leakage by inference
-- A pilot study of a visualization tool and an algorithm using local connectivity in digraphs --
Kazuhiro Suzuki, Haruka Uchima, Miki Kondo (Kochi Univ.)
----- Break ( 15 min. ) -----
----------------------------------------
Sat, Nov 22 AM (10:55 - 12:10)
----------------------------------------
(11) 10:55 - 11:20
Hands-free voice command input system using voice power adapted standard patterns
Yuji Yoshida, Hiroyuki Nishi, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ)
(12) 11:20 - 11:45
Interactive System for Supporting Decision of Transportation Path According to User's Preference
Eko Sakai (Otani Univ.), Ken Nakayama (Tsuda College)
(13) 11:45 - 12:10
Behavior Prediction from Lifelog Data Using A Virtual Communication-Network System
Yusuke Omori, Ryoichi Shinkuma (Kyoto Univ.), Kazuhiro Yamaguchi (KDL), Tatsuro Takahashi (Kyoto Univ.)
----- Lunch Break ( 70 min. ) -----
----------------------------------------
Sat, Nov 22 PM (13:20 - 14:10)
----------------------------------------
(14) 13:20 - 13:45
Improving certificate validation in SSL/TLS implementations
Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST)
(15) 13:45 - 14:10
How to Utilize Location Information for Distinguishing Users
Takuya Funakoshi, Masahiro Mambo (Kanazawa Univ.)
----- Closing Address ( 5 min. ) -----
# Information for speakers
General Talk will have 20 minutes for presentation and 5 minutes for discussion.
Invited Talk will have 50 minutes for presentation and 10 minutes for discussion.
=== Technical Committee on Social Implications of Technology and Information Ethics (SITE) ===
=== Technical Committee on Information Security (ISEC) ===
# FUTURE SCHEDULE:
Fri, Dec 19, 2014: Kikai-Shinko-Kaikan Bldg. [Fri, Oct 17]
# SECRETARY:
Tetsu Iwata (Nagoya University)
TEL +81-52-789-5722, FAX +81-52-789-5723
E-mail: ic-c (to ISEC secretaries)
=== Technical Committee on Life Intelligence and Office Information Systems (LOIS) ===
# FUTURE SCHEDULE:
Thu, Jan 15, 2015 - Fri, Jan 16, 2015: Kanmon Straits & Mojiko Retro [Wed, Nov 12], Topics: Practical Use of Lifelog, Office Information System, Business Management, etc.
# SECRETARY:
Akihisa KODATE
Tsuda College
2-1-1 Tsuda-machi, Kodaira-shi, 187-8577 Tokyo
FAX +81-42-342-5161
E-mail:
Last modified: 2014-11-13 11:33:06
|
Notification: Mail addresses are partially hidden against SPAM.
|