Fri, Nov 1 AM 10:30 - 12:10 |
(1) |
10:30-10:55 |
A Proposal of a Matching Algorithm Using a Vegetable Feature Quantification Method for Irregular Vegetables Utilization |
Koichi Kanadani, Yukiko Matsushima (IT, Tsuyama Col.) |
(2) |
10:55-11:20 |
Office Work estimation using Smartwatch |
Katsumasa Yokoo, Toshimasa Aso, Hisayuki Kurokawa (Tokyo Univ of Marine Science and Technology) |
(3) |
11:20-11:45 |
Improved sound analysis system for handy-terminal |
Koki Nozaki, Toshimasa Aso, Hisayuki Kurokawa (Tokyo Univ. of Marine Science and Technology) |
(4) |
11:45-12:10 |
Detection of Inefficient Motion on Warehouse Work Probe System |
Toshimasa Aso (Tokyo Univ. of Marine Science and Technology) |
|
12:10-13:10 |
Break ( 60 min. ) |
Fri, Nov 1 PM 13:10 - 14:50 |
(5) |
13:10-13:35 |
Character on elliptic curves over finite fields and even-oddness of the order of points |
Masaaki Shirase (FUN) |
(6) |
13:35-14:00 |
Efficiency Improvement in Pairing-based Zero-Knowledge Proof of Graph Information |
Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) |
(7) |
14:00-14:25 |
Lattice basis reduction over projected lattices and its application to solving the LWE problem |
Satoshi Nakamura, Nariaki Tateiwa (Kyushu Univ.), Koha Kinjo (NTT), Yasuhiko Ikematsu, Masaya Yasuda (Kyushu Univ.) |
(8) |
14:25-14:50 |
Implementation of Authentication Process in Crowdsensing Using a Revocable Group Signature Scheme |
Satoshi Namiki, Toru Nakanishi (Hiroshima Univ.) |
|
14:50-15:05 |
Break ( 15 min. ) |
Fri, Nov 1 PM 15:05 - 16:45 |
(9) |
15:05-15:30 |
Security of K(+)CBPKC Based on Message-Dependent Transformation |
Masao Kasahara (Waseda Univ.) |
(10) |
15:30-15:55 |
A Second-price Sealed-Bid Auction realizing Financial Fairness |
Yuki Sugitani, Atsuko Miyaji (Osaka Univ.) |
(11) |
15:55-16:20 |
Technology Trends on Payment System using Virtual Currency and Electronic Money based on Patent Applications |
Norihiko Shiota, Hirofumi Seki, Takashi Midorikawa, Yosuke Kiho (JPO) |
(12) |
16:20-16:45 |
A study on open data processing and its applications |
Toshihiko Wakahara, Akihisa Kodate, Takahisa Suzuki, Yoshinori Sakai, Noboru Sonehara (Tsuda Univ.) |
|
16:45-17:00 |
Break ( 15 min. ) |
Fri, Nov 1 PM 17:00 - 17:45 |
(13) |
17:00-17:45 |
[Invited Talk]
CenturyIT-Education Program for under graduated students enPiT 2,
-- Activities on Osaka University and JAIST -- |
Atsuko Miyaji (Osaka Univ.) |
Sat, Nov 2 AM 09:35 - 11:15 |
(14) |
09:35-10:00 |
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA |
Shigeo Tsujii (Chuo Univ./SIOTP), Ryo Fujita, Masahito Gotaishi (Chuo Univ.) |
(15) |
10:00-10:25 |
Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size |
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) |
(16) |
10:25-10:50 |
Secure E-Shopping Protocols with Scalable Privacy |
Motoi Hayashi (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) |
(17) |
10:50-11:15 |
Detection System of DNS Cache Poisoning Using Blockchain Technology |
Tomohiro Takahashi, Yuichi Futa (TUT), Hiroyuki Okazaki, Hikofumi Suzuki (SU) |
|
11:15-11:30 |
Break ( 15 min. ) |
Sat, Nov 2 AM 11:30 - 12:30 |
(18) |
11:30-12:30 |
[Invited Talk]
Informatics as a Forefront of Philosophy |
Makoto Nagao (Kyoto Univ.) |
|
12:30-13:30 |
Break ( 60 min. ) |
Sat, Nov 2 PM 13:30 - 14:45 |
(19) |
13:30-13:55 |
Consideration regarding Critical Infrastructure Protection Policies in Cybersecurity
-- Approach from the "Science and Technology Studies (STS)" -- |
Hideyuki Fujii, Takumi Kimura (NRI Secure) |
(20) |
13:55-14:20 |
Dementia Diagnosis System Using SNS Agency Robot |
Yuta Kishimoto, Kenichi Arai, Tetsuo Imai, Toru Kobayashi (Nagasaki Univ.) |
(21) |
14:20-14:45 |
Proposal of a Password Storage Method for Network Login
-- Using an External Storage Device for Screenshots -- |
Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) |
|
14:45-15:00 |
Break ( 15 min. ) |
Sat, Nov 2 PM 15:00 - 16:15 |
(22) |
15:00-15:25 |
On Robustness of Machine-Learning-Based Malware Detection |
Wanjia Zheng (U. Tsukuba), Kazumasa Omote (U. Tsukuba/NICT) |
(23) |
15:25-15:50 |
Research on DNS tunnel detection by machine learning using appearance characters |
Tetsuya Asakura, Takeo Tatsumi (OUJ) |
(24) |
15:50-16:15 |
A Note on Encryption-based Recommender Systems |
Seiya Jumonji, Kazuya Sakai (TMU) |