Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, ISEC, LOIS |
2018-11-03 11:00 |
Fukuoka |
|
A Statistical Method for Searching Biases of Stream Ciphers Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24 |
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] |
ISEC2018-64 SITE2018-42 LOIS2018-24 pp.1-6 |
SITE, ISEC, LOIS |
2018-11-03 11:30 |
Fukuoka |
|
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25 |
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] |
ISEC2018-65 SITE2018-43 LOIS2018-25 pp.7-12 |
SITE, ISEC, LOIS |
2018-11-03 12:00 |
Fukuoka |
|
Computationally-independent pair of one-way functions in presence of leakage Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.) ISEC2018-66 SITE2018-44 LOIS2018-26 |
[more] |
ISEC2018-66 SITE2018-44 LOIS2018-26 pp.13-18 |
SITE, ISEC, LOIS |
2018-11-03 12:30 |
Fukuoka |
|
Secret sharing of color images: An algebraic approach Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.) ISEC2018-67 SITE2018-45 LOIS2018-27 |
[more] |
ISEC2018-67 SITE2018-45 LOIS2018-27 pp.19-24 |
SITE, ISEC, LOIS |
2018-11-03 14:00 |
Fukuoka |
|
Prediction method of walking motion using machine learning of footsteps.
-- Aiming at a tumbling down prediction system for the elderly. -- Takehiro Mori, Kimitaka Ito, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2018-68 SITE2018-46 LOIS2018-28 |
[more] |
ISEC2018-68 SITE2018-46 LOIS2018-28 pp.25-29 |
SITE, ISEC, LOIS |
2018-11-03 14:30 |
Fukuoka |
|
Elderly people observation system based on the detection of untrained acoustic data. Akihiro Ito, Sara Ozaki, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2018-69 SITE2018-47 LOIS2018-29 |
[more] |
ISEC2018-69 SITE2018-47 LOIS2018-29 pp.31-34 |
SITE, ISEC, LOIS |
2018-11-03 15:00 |
Fukuoka |
|
Automatic clustering using unsupervised life sound learning of elderly Yuta Tanaka, Naoyuki Mizuno, Hiroyuki Nishi, Yoshimasa Kimura (Sojo Univ.) ISEC2018-70 SITE2018-48 LOIS2018-30 |
Although it is important to watch the elderly non-contactly and non invasively by AI, it requires a huge amount of super... [more] |
ISEC2018-70 SITE2018-48 LOIS2018-30 pp.35-38 |
SITE, ISEC, LOIS |
2018-11-03 15:30 |
Fukuoka |
|
Explanation of ORIENT in OODA Loop by object oriented way Yuichi Takigawa (NDA), Takeo Tatsumi (OUJ) ISEC2018-71 SITE2018-49 LOIS2018-31 |
This document describes the flow of information inside and outside "Orient" in the OODA loop in order to visualize infor... [more] |
ISEC2018-71 SITE2018-49 LOIS2018-31 pp.39-44 |
SITE, ISEC, LOIS |
2018-11-04 10:00 |
Fukuoka |
|
Introduction of PKI Electronic Authentication for Important IoT Devices
-- For Establishment of Secure IoT Platform -- Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32 |
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] |
ISEC2018-72 SITE2018-50 LOIS2018-32 pp.45-50 |
SITE, ISEC, LOIS |
2018-11-04 10:30 |
Fukuoka |
|
Secure BioSemantic Computing Hiroshi Yamaguchi (Chuo Univ.), Phillip C. Y. Sheu (UCI), Shigeo Tsujii (Chuo Univ.) ISEC2018-73 SITE2018-51 LOIS2018-33 |
[more] |
ISEC2018-73 SITE2018-51 LOIS2018-33 pp.51-56 |
SITE, ISEC, LOIS |
2018-11-04 11:00 |
Fukuoka |
|
Development of named entity recognition and polarity analysis function for security incidents. Shinta Nakano, Daisuke Uto, Yuichiro Kurosawa, Masaki Hanada, Yoichi Murakami, Eiji Nunohiro (TUIS) ISEC2018-74 SITE2018-52 LOIS2018-34 |
The authors focused on analyzing the information related to security incidents from articles on news sites published on ... [more] |
ISEC2018-74 SITE2018-52 LOIS2018-34 pp.57-62 |
SITE, ISEC, LOIS |
2018-11-04 11:30 |
Fukuoka |
|
A Machine Learning-based Method for Detecting Malicious JavaScript using Information based on Abstract Syntax Tree Ryota Sano, Junko Sato, Yoichi Murakami, Masaki Hanada, Eiji Nunohiro (Tokyo Univ. of Information Sciences) ISEC2018-75 SITE2018-53 LOIS2018-35 |
The number of Drive-by-Download attacks, which can be infected with malware via websites, has recently been increased. S... [more] |
ISEC2018-75 SITE2018-53 LOIS2018-35 pp.63-68 |
SITE, ISEC, LOIS |
2018-11-04 13:00 |
Fukuoka |
|
The Digital Devide of the Elderly and from the Elderly Nobuyuki Yoshinaga (YPU) ISEC2018-76 SITE2018-54 LOIS2018-36 |
The digital divide of the elderly generally refers to the elderly’s inability to keep pace with technology in our inform... [more] |
ISEC2018-76 SITE2018-54 LOIS2018-36 pp.69-72 |
SITE, ISEC, LOIS |
2018-11-04 13:30 |
Fukuoka |
|
Winny incident as a social experiment
-- Look back it as a case of internet research problem -- Takushi Otani (Kibi International Univ.) |
[more] |
|
SITE, ISEC, LOIS |
2018-11-04 14:10 |
Fukuoka |
|
Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo) ISEC2018-77 SITE2018-55 LOIS2018-37 |
[more] |
ISEC2018-77 SITE2018-55 LOIS2018-37 pp.73-78 |
SITE, ISEC, LOIS |
2018-11-04 14:40 |
Fukuoka |
|
Proposal of Anonymous Attribute Credential System that can Prove CNF Formulas includeing Negative Attribute Ryo Okishima, Toru Nakanishi (Hiroshima Univ.) ISEC2018-78 SITE2018-56 LOIS2018-38 |
In recent years, electronic identification (eID) has become widespread, and this eID is used to access buildings and appl... [more] |
ISEC2018-78 SITE2018-56 LOIS2018-38 pp.79-85 |
SITE, ISEC, LOIS |
2018-11-04 15:10 |
Fukuoka |
|
Pairing-based Zero-Knowledge Proof of Graph Information Hiromi Yoshino, Toru Nakanishi (Hiroshima Univ.) ISEC2018-79 SITE2018-57 LOIS2018-39 |
A network provider needs to consider a method that can disclose correct information to the system user without disclosin... [more] |
ISEC2018-79 SITE2018-57 LOIS2018-39 pp.87-93 |
SITE, ISEC, LOIS |
2018-11-04 15:40 |
Fukuoka |
|
An improvement on Winternitz OTS with puncturing of signing keys Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) ISEC2018-80 SITE2018-58 LOIS2018-40 |
A hash-based digital signature is a quantum-immune alternative of conventional digital signatures. This study improves a... [more] |
ISEC2018-80 SITE2018-58 LOIS2018-40 pp.95-102 |