IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Social Implications of Technology and Information Ethics (SITE)  (Searched in: 2018)

Search Results: Keywords 'from:2018-11-03 to:2018-11-03'

[Go to Official SITE Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, ISEC, LOIS 2018-11-03
11:00
Fukuoka   A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] ISEC2018-64 SITE2018-42 LOIS2018-24
pp.1-6
SITE, ISEC, LOIS 2018-11-03
11:30
Fukuoka   A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] ISEC2018-65 SITE2018-43 LOIS2018-25
pp.7-12
SITE, ISEC, LOIS 2018-11-03
12:00
Fukuoka   Computationally-independent pair of one-way functions in presence of leakage
Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.) ISEC2018-66 SITE2018-44 LOIS2018-26
 [more] ISEC2018-66 SITE2018-44 LOIS2018-26
pp.13-18
SITE, ISEC, LOIS 2018-11-03
12:30
Fukuoka   Secret sharing of color images: An algebraic approach
Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.) ISEC2018-67 SITE2018-45 LOIS2018-27
 [more] ISEC2018-67 SITE2018-45 LOIS2018-27
pp.19-24
SITE, ISEC, LOIS 2018-11-03
14:00
Fukuoka   Prediction method of walking motion using machine learning of footsteps. -- Aiming at a tumbling down prediction system for the elderly. --
Takehiro Mori, Kimitaka Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2018-68 SITE2018-46 LOIS2018-28
 [more] ISEC2018-68 SITE2018-46 LOIS2018-28
pp.25-29
SITE, ISEC, LOIS 2018-11-03
14:30
Fukuoka   Elderly people observation system based on the detection of untrained acoustic data.
Akihiro Ito, Sara Ozaki, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2018-69 SITE2018-47 LOIS2018-29
 [more] ISEC2018-69 SITE2018-47 LOIS2018-29
pp.31-34
SITE, ISEC, LOIS 2018-11-03
15:00
Fukuoka   Automatic clustering using unsupervised life sound learning of elderly
Yuta Tanaka, Naoyuki Mizuno, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2018-70 SITE2018-48 LOIS2018-30
Although it is important to watch the elderly non-contactly and non invasively by AI, it requires a huge amount of super... [more] ISEC2018-70 SITE2018-48 LOIS2018-30
pp.35-38
SITE, ISEC, LOIS 2018-11-03
15:30
Fukuoka   Explanation of ORIENT in OODA Loop by object oriented way
Yuichi Takigawa (NDA), Takeo Tatsumi (OUJ) ISEC2018-71 SITE2018-49 LOIS2018-31
This document describes the flow of information inside and outside "Orient" in the OODA loop in order to visualize infor... [more] ISEC2018-71 SITE2018-49 LOIS2018-31
pp.39-44
SITE, ISEC, LOIS 2018-11-04
10:00
Fukuoka   Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] ISEC2018-72 SITE2018-50 LOIS2018-32
pp.45-50
SITE, ISEC, LOIS 2018-11-04
10:30
Fukuoka   Secure BioSemantic Computing
Hiroshi Yamaguchi (Chuo Univ.), Phillip C. Y. Sheu (UCI), Shigeo Tsujii (Chuo Univ.) ISEC2018-73 SITE2018-51 LOIS2018-33
 [more] ISEC2018-73 SITE2018-51 LOIS2018-33
pp.51-56
SITE, ISEC, LOIS 2018-11-04
11:00
Fukuoka   Development of named entity recognition and polarity analysis function for security incidents.
Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS) ISEC2018-74 SITE2018-52 LOIS2018-34
The authors focused on analyzing the information related to security incidents from articles on news sites published on ... [more] ISEC2018-74 SITE2018-52 LOIS2018-34
pp.57-62
SITE, ISEC, LOIS 2018-11-04
11:30
Fukuoka   A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree
Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] ISEC2018-75 SITE2018-53 LOIS2018-35
pp.63-68
SITE, ISEC, LOIS 2018-11-04
13:00
Fukuoka   The Digital Devide of the Elderly and from the Elderly
Nobuyuki Yoshinaga (YPU) ISEC2018-76 SITE2018-54 LOIS2018-36
The digital divide of the elderly generally refers to the elderly’s inability to keep pace with technology in our inform... [more] ISEC2018-76 SITE2018-54 LOIS2018-36
pp.69-72
SITE, ISEC, LOIS 2018-11-04
13:30
Fukuoka   Winny incident as a social experiment -- Look back it as a case of internet research problem --
Takushi Otani (Kibi International Univ.)
 [more]
SITE, ISEC, LOIS 2018-11-04
14:10
Fukuoka   Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme
Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37
 [more] ISEC2018-77 SITE2018-55 LOIS2018-37
pp.73-78
SITE, ISEC, LOIS 2018-11-04
14:40
Fukuoka   Proposal of Anonymous Attribute Credential System that can Prove CNF Formulas includeing Negative Attribute
Ryo Okishima, Toru Nakanishi (Hiroshima Univ.) ISEC2018-78 SITE2018-56 LOIS2018-38
In recent years, electronic identification (eID) has become widespread, and this eID is used to access buildings and appl... [more] ISEC2018-78 SITE2018-56 LOIS2018-38
pp.79-85
SITE, ISEC, LOIS 2018-11-04
15:10
Fukuoka   Pairing-based Zero-Knowledge Proof of Graph Information
Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) ISEC2018-79 SITE2018-57 LOIS2018-39
A network provider needs to consider a method that can disclose correct information to the system user without disclosin... [more] ISEC2018-79 SITE2018-57 LOIS2018-39
pp.87-93
SITE, ISEC, LOIS 2018-11-04
15:40
Fukuoka   An improvement on Winternitz OTS with puncturing of signing keys
Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) ISEC2018-80 SITE2018-58 LOIS2018-40
A hash-based digital signature is a quantum-immune alternative of conventional digital signatures. This study improves a... [more] ISEC2018-80 SITE2018-58 LOIS2018-40
pp.95-102
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan