Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 10:40 |
Hokkaido |
|
Study of CAPTCHA suitable for smartphones Mayumi Takaya (Akita Univ.), Yusuke Tsuruta (System Research), Hikari Kato, Takeshi Komatsubara, Yusuke Watanabe, Akihiro Yamamura (Akita Univ.) ISEC2013-11 SITE2013-6 ICSS2013-16 EMM2013-13 |
[more] |
ISEC2013-11 SITE2013-6 ICSS2013-16 EMM2013-13 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 11:05 |
Hokkaido |
|
Proposal of the Support System at the Time of Introduction of User Applications in Android OS Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.) ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 |
High-performance mobile phone, called the smartphone is beginning to spread regardless of age in recent years. As a matt... [more] |
ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 pp.13-18 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 11:30 |
Hokkaido |
|
Assessment of Self-Modifying-Based Tamper Resistant Technology in Smart Phone Platform Naoki Yoshida, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2013-13 SITE2013-8 ICSS2013-18 EMM2013-15 |
The spread of smartphones in recent years demands superior technologies to improve tamper resistance of applications run... [more] |
ISEC2013-13 SITE2013-8 ICSS2013-18 EMM2013-15 pp.19-26 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 12:55 |
Hokkaido |
|
Examination of IDS Log Analysis using Discrete Wavelet Transform Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16 |
With the spread of the Internet, the illegal access to the network is increasing. To overcome this prob-
lem, various t... [more] |
ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16 pp.27-32 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 13:20 |
Hokkaido |
|
Engineering Ethics Education with world cafe discussion Michio Nakanishi (Osaka Inst. of Tech.) ISEC2013-15 SITE2013-10 ICSS2013-20 EMM2013-17 |
The world café style discussion was introduced in the subject “Information technology and ethics” in Graduate School of ... [more] |
ISEC2013-15 SITE2013-10 ICSS2013-20 EMM2013-17 pp.33-38 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 13:45 |
Hokkaido |
|
Ethical Problems Concerning the Digital Archiving and Content Delivery of Video and Audio Recordings of Classroom Interactions in Elementary and Junior High Schools Takahiro Haga (Gifu Shotoku Gakuen Univ.), Takushi Otani (Kibi Internationla Univ.) ISEC2013-16 SITE2013-11 ICSS2013-21 EMM2013-18 |
The purpose of this paper is to determine the conditions that need to be met to ethically and legally justify the digita... [more] |
ISEC2013-16 SITE2013-11 ICSS2013-21 EMM2013-18 pp.39-46 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 14:10 |
Hokkaido |
|
The Concept of "Group Privacy" in the Information Age:
-- Can We Ethically Restrict the Use of Social Media to Publicize Communication Within a Group? -- Takushi Otani (Kibi International Univ.) ISEC2013-17 SITE2013-12 ICSS2013-22 EMM2013-19 |
This paper explores whether we can justify the restriction and prohibition of using social media to publicize communicat... [more] |
ISEC2013-17 SITE2013-12 ICSS2013-22 EMM2013-19 pp.47-52 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 14:50 |
Hokkaido |
|
Evaluation Method for Arbiter PUF on FPGA and Its Vulnerability Takanori Machida, Toshiki Nakasone, Kazuo Sakiyama (UEC) ISEC2013-18 SITE2013-13 ICSS2013-23 EMM2013-20 |
Among Physical Unclonable Functions~(PUFs), Arbiter PUF is one of the delay-based PUFs that uses signal-delay time diffe... [more] |
ISEC2013-18 SITE2013-13 ICSS2013-23 EMM2013-20 pp.53-58 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 15:15 |
Hokkaido |
|
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST) ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21 |
This paper presents the first collision attack on the double-block-length compression function presented at FSE 2006 ins... [more] |
ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21 pp.59-66 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 15:40 |
Hokkaido |
|
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 |
HyRAL is a 128-bit block cipher proposed by Hirata in 2010. It has been reported that 14-round HyRAL with 256-bit secret... [more] |
ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 pp.67-74 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 16:05 |
Hokkaido |
|
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 |
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] |
ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23 pp.75-84 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 09:10 |
Hokkaido |
|
An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients Shingo Shimaura, Syouhei Harada, Seok Kang, Yuji Sakamoto (Hokkaido Univ.) ISEC2013-22 SITE2013-17 ICSS2013-27 EMM2013-24 |
The partial scrambling which is performed before variable length coding enables quantitative degradation degree control ... [more] |
ISEC2013-22 SITE2013-17 ICSS2013-27 EMM2013-24 pp.167-172 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 09:35 |
Hokkaido |
|
Optimization and Information Hiding Techniques of PDF files for Electronic Display Devices Toshio Modegi (DNP) ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25 |
These days, reading on an electronic display device such as a tablet computer is popular. One of the typical document fo... [more] |
ISEC2013-23 SITE2013-18 ICSS2013-28 EMM2013-25 pp.173-180 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 10:15 |
Hokkaido |
|
Wonder Search: An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface Tomoko Kajiyama (Aoyama Gakuin Univ.) ISEC2013-24 SITE2013-19 ICSS2013-29 EMM2013-26 |
We improved a ring-structured graphical search interface and developed an iPhone application for application search name... [more] |
ISEC2013-24 SITE2013-19 ICSS2013-29 EMM2013-26 pp.181-185 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 10:40 |
Hokkaido |
|
[Panel Discussion]
Education for IT Engineers from the Viewpoint of Information Security Naofumi Aoki (Hokkaido Univ.), Kumi Mitani, Manami Fujimaru, Takahisa Kishiya, Junpei Tsuji, Tomohiro Takahashi ISEC2013-25 SITE2013-20 ICSS2013-30 EMM2013-27 |
Problems related to information securities, such as cyber-terrorism, are becoming serious social issues. IT engineers ar... [more] |
ISEC2013-25 SITE2013-20 ICSS2013-30 EMM2013-27 pp.187-192 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 12:55 |
Hokkaido |
|
A Hierarchical Access Control Method by the Secret Sharing Scheme Takashi Kurakami, Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) ISEC2013-26 SITE2013-21 ICSS2013-31 EMM2013-28 |
[more] |
ISEC2013-26 SITE2013-21 ICSS2013-31 EMM2013-28 pp.193-198 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 13:20 |
Hokkaido |
|
A Content Protection Method Using Secret Sharing and Attribute-Based Encryption Katsuma Takimoto, Masaaki Fujiyoshi (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) ISEC2013-27 SITE2013-22 ICSS2013-32 EMM2013-29 |
[more] |
ISEC2013-27 SITE2013-22 ICSS2013-32 EMM2013-29 pp.199-204 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 13:45 |
Hokkaido |
|
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method Hiroyasu Kitazawa, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30 |
There is no doubt that paper media is an important media in current electronic proceeded .However, studies of protection... [more] |
ISEC2013-28 SITE2013-23 ICSS2013-33 EMM2013-30 pp.205-212 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 14:10 |
Hokkaido |
|
Study of an artificial fiber pattern in Augmented Reality system Tomoki Inui, Kitahiro Kaneda, Keiichi Iwamura (Tokyo Univ. of Science), Isao Echizen (NII) ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 |
The technology behind augmented reality (Augmented Reality, AR or later) can be divided into sensor types based on the u... [more] |
ISEC2013-29 SITE2013-24 ICSS2013-34 EMM2013-31 pp.213-220 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 14:50 |
Hokkaido |
|
Image Restoration Using Embedding of Similar Region Information Kazuki Yamato, Kazuma Shinoda, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.), Yuichi Tanaka (Tokyo Univ. of of Agriculture and Tech.) ISEC2013-30 SITE2013-25 ICSS2013-35 EMM2013-32 |
Baroumand et. al proposed the method called WDBM for restoring a corrupted image by using the correlation within the ima... [more] |
ISEC2013-30 SITE2013-25 ICSS2013-35 EMM2013-32 pp.221-226 |