Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, ISEC, SITE |
2015-11-06 09:00 |
Kanagawa |
Kanagawa Univ. |
Self Information Control as Identity Management
-- Practical Problems of "Identity" leading to Information Ethics -- Akiyoshi Kabeya (Chiba Univ.) ISEC2015-36 SITE2015-23 LOIS2015-30 |
We can both affect and be affected by our "identity". In the internet, people are likely to present information about th... [more] |
ISEC2015-36 SITE2015-23 LOIS2015-30 pp.1-6 |
LOIS, ISEC, SITE |
2015-11-06 09:25 |
Kanagawa |
Kanagawa Univ. |
An approach to assess the risk of information leakage by inference
-- A pilot study of methods using a breadth first search in digraphs and mutual information -- Kazuhiro Suzuki, Shohei Kitamura, Noriki Hirai (Kochi Univ.) ISEC2015-37 SITE2015-24 LOIS2015-31 |
[more] |
ISEC2015-37 SITE2015-24 LOIS2015-31 pp.7-10 |
LOIS, ISEC, SITE |
2015-11-06 09:50 |
Kanagawa |
Kanagawa Univ. |
A Pruning Method for the Decision Tree constructed on Run-Based Trie. Takashi Harada, Ken Tanaka (Kanagawa Univ.), Kenji Mikawa (Niigata Univ.) ISEC2015-38 SITE2015-25 LOIS2015-32 |
Packet classification is a fundamental process in the control of network traffic that protects inner net- works from cyb... [more] |
ISEC2015-38 SITE2015-25 LOIS2015-32 pp.11-17 |
LOIS, ISEC, SITE |
2015-11-06 10:30 |
Kanagawa |
Kanagawa Univ. |
[Invited Talk]
Design of Learning e-Portfolio System Based on User-centered design Rieko Inaba (Tsuda Coll.), Norimichi Kobayashi, Miho Mohri, Yasunori Motomoura (Kansai Univ.) ISEC2015-39 SITE2015-26 LOIS2015-33 |
[more] |
ISEC2015-39 SITE2015-26 LOIS2015-33 pp.19-24 |
LOIS, ISEC, SITE |
2015-11-06 12:45 |
Kanagawa |
Kanagawa Univ. |
[Invited Talk]
Effective Utilization of Mobile Communication Technology for Life-Saving
-- State Emergency Wireless System -- Noriyoshi Sonetaka (ICPS) ISEC2015-40 SITE2015-27 LOIS2015-34 |
On March 11, 2011, the most powerful earthquake of seismic intensity 7, magnitude 9.0 happened in North coast of Miyagi,... [more] |
ISEC2015-40 SITE2015-27 LOIS2015-34 pp.25-32 |
LOIS, ISEC, SITE |
2015-11-06 14:00 |
Kanagawa |
Kanagawa Univ. |
The Problems of "Consent" in the Big Data Context Takushi Otani (Kibi International Univ.) ISEC2015-41 SITE2015-28 LOIS2015-35 |
[more] |
ISEC2015-41 SITE2015-28 LOIS2015-35 pp.33-39 |
LOIS, ISEC, SITE |
2015-11-06 14:25 |
Kanagawa |
Kanagawa Univ. |
Social media guidelines for international students Daisuke Suzuki (Hokuriku Univ.) ISEC2015-42 SITE2015-29 LOIS2015-36 |
Universities are required to create social media guidelines for their students to use social media properly and safely. ... [more] |
ISEC2015-42 SITE2015-29 LOIS2015-36 pp.41-45 |
LOIS, ISEC, SITE |
2015-11-06 14:50 |
Kanagawa |
Kanagawa Univ. |
Input UI Specification Recovery using Web Operation Monitoring Daisuke Tashiro, Katsuro Kikuchi, Ryota Mibe (Hitachi) ISEC2015-43 SITE2015-30 LOIS2015-37 |
In development and operation of enterprise system, it is important to understand specifications of existing system. Obso... [more] |
ISEC2015-43 SITE2015-30 LOIS2015-37 pp.47-52 |
LOIS, ISEC, SITE |
2015-11-06 15:15 |
Kanagawa |
Kanagawa Univ. |
Proposal and Prototyping of a TV Content Providing System using Geolocation Chigusa Yamamura, Hisayuki Ohmata, Michihiro Uehara (NHK) ISEC2015-44 SITE2015-31 LOIS2015-38 |
It is well-known that TV has a strong influence on viewers as the mass media. While some information got on TV often att... [more] |
ISEC2015-44 SITE2015-31 LOIS2015-38 pp.53-58 |
LOIS, ISEC, SITE |
2015-11-06 15:55 |
Kanagawa |
Kanagawa Univ. |
The threshold value design of recognition score considering the prior probability in a quiz speech recognition system Hiroyuki Nishi, Kimurra Yoshimasa, Kakinoki Toshio (Sojo Univ.) ISEC2015-45 SITE2015-32 LOIS2015-39 |
As in the information input in the smart phone and car navigation systems, speech recognition is often used in applicati... [more] |
ISEC2015-45 SITE2015-32 LOIS2015-39 pp.59-65 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
LOIS, ISEC, SITE |
2015-11-06 16:45 |
Kanagawa |
Kanagawa Univ. |
Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2015-47 SITE2015-34 LOIS2015-41 |
In current ID-based user authentication schemes, privacy issues may occur, since users' behavior histories are collected... [more] |
ISEC2015-47 SITE2015-34 LOIS2015-41 pp.75-80 |
LOIS, ISEC, SITE |
2015-11-06 17:10 |
Kanagawa |
Kanagawa Univ. |
Postpaid electronic money to keep privacy and its implementation Tatshuhiko Sukegawa, Mashu Sakai, Hikaru Morita (Kanagawa Univ.) ISEC2015-48 SITE2015-35 LOIS2015-42 |
Postpaid electronic money schemes are provided by credit-card companies.
In these schemes, after electronic money is us... [more] |
ISEC2015-48 SITE2015-35 LOIS2015-42 pp.81-86 |
LOIS, ISEC, SITE |
2015-11-07 09:30 |
Kanagawa |
Kanagawa Univ. |
An Additionable Type ToDo List which Can Support Daily Activities Noriaki Saito (NTT) ISEC2015-49 SITE2015-36 LOIS2015-43 |
[more] |
ISEC2015-49 SITE2015-36 LOIS2015-43 pp.87-92 |
LOIS, ISEC, SITE |
2015-11-07 09:55 |
Kanagawa |
Kanagawa Univ. |
Evaluation of the Web System U-MOS for Supporting University Management Operation Satoshi Taoka (Hiroshima Univ.) ISEC2015-50 SITE2015-37 LOIS2015-44 |
[more] |
ISEC2015-50 SITE2015-37 LOIS2015-44 pp.93-97 |
LOIS, ISEC, SITE |
2015-11-07 10:30 |
Kanagawa |
Kanagawa Univ. |
Encryption and decryption system of composite cellular automata Toshikazu Ishida (KSU) ISEC2015-51 SITE2015-38 LOIS2015-45 |
Local rules of 1 dimension 2 state cellular automata can be defined by formulae in propositional logic. For reversible c... [more] |
ISEC2015-51 SITE2015-38 LOIS2015-45 pp.99-102 |
LOIS, ISEC, SITE |
2015-11-07 10:55 |
Kanagawa |
Kanagawa Univ. |
Extension of NTRU Using Group Ring and Its Application Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46 |
[more] |
ISEC2015-52 SITE2015-39 LOIS2015-46 pp.103-109 |
LOIS, ISEC, SITE |
2015-11-07 11:20 |
Kanagawa |
Kanagawa Univ. |
A dynamic filtering method to reduce DDoS packets by using access tokens Ryota Suzuki, Hikaru Morita (Kanagawa Univ.) ISEC2015-53 SITE2015-40 LOIS2015-47 |
The flow controls on packets in transmission channel are general measures against DDoS (Distributed Denial of Service) a... [more] |
ISEC2015-53 SITE2015-40 LOIS2015-47 pp.111-116 |