Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:00 |
Yamaguchi |
|
A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise Shogo Shigemoto, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) ISEC2016-13 SITE2016-7 ICSS2016-13 EMM2016-21 |
Among many watermarking schemes, the DCT-OFDM-based scheme retains high robustness against various kinds of attacks. The... [more] |
ISEC2016-13 SITE2016-7 ICSS2016-13 EMM2016-21 pp.1-6 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:25 |
Yamaguchi |
|
Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) ISEC2016-14 SITE2016-8 ICSS2016-14 EMM2016-22 |
In general, watermark information is embedded into the host signals selected from digital content according to a secret ... [more] |
ISEC2016-14 SITE2016-8 ICSS2016-14 EMM2016-22 pp.7-12 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:50 |
Yamaguchi |
|
Study of an information extraction method using artificial fiber pattern with a clear ink Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23 |
Our laboratory has developed “single dot method”, which is one of a nearly invisible pattern as new information embeddin... [more] |
ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23 pp.13-18 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 14:15 |
Yamaguchi |
|
Technique for Embedding Information by Constructing Protuberance With Inner Walls of Objects Fabricated With 3-D Printers Kousuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.) ISEC2016-16 SITE2016-10 ICSS2016-16 EMM2016-24 |
We evaluated our previously proposed technique for protecting copyrights of digital data for 3-D printing. The proposed ... [more] |
ISEC2016-16 SITE2016-10 ICSS2016-16 EMM2016-24 pp.19-22 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 14:40 |
Yamaguchi |
|
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 |
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] |
ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25 pp.23-28 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:00 |
Yamaguchi |
|
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing Motoi Tanaka, Hiroyuki Inaba (KIT) ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 |
A personal authentication system using PIN or password is widely used in various information terminals. However these au... [more] |
ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 pp.29-32 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:25 |
Yamaguchi |
|
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time Hiroaki Kuno, Hiroyuki Inaba (KIT) ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27 |
IDS (Intrusion Detection System) is one of the countermeasures for illegal access to the network. Since IDS reports all ... [more] |
ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27 pp.33-36 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:50 |
Yamaguchi |
|
A Study of a Simple Model of Information Safety Education
-- A Departure from Convetional Information Moral Education Model -- Takahiro Haga (GSGU), Akiko Igarashi (Uchida), Katsurou Nishioka (UHD) ISEC2016-20 SITE2016-14 ICSS2016-20 EMM2016-28 |
Within Japan’s compulsory education system, “information moral education” has been increasingly promoted since the 1990s... [more] |
ISEC2016-20 SITE2016-14 ICSS2016-20 EMM2016-28 pp.37-40 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 14:15 |
Yamaguchi |
|
Developing rules to transmit our intentions in Computer Mediated Communication Nobuyuki Yoshinga (YPU) ISEC2016-21 SITE2016-15 ICSS2016-21 EMM2016-29 |
The purpose of this paper is to propose the development of rules that enable us to transmit our intentions through Compu... [more] |
ISEC2016-21 SITE2016-15 ICSS2016-21 EMM2016-29 pp.41-45 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 14:40 |
Yamaguchi |
|
Privacy Problems and Social Relationships
-- Privacy Problems Caused by the Visualization and Manipulation of Social Relationships -- Takushi Otani (Kibi International Univ.) ISEC2016-22 SITE2016-16 ICSS2016-22 EMM2016-30 |
[more] |
ISEC2016-22 SITE2016-16 ICSS2016-22 EMM2016-30 pp.47-51 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 15:25 |
Yamaguchi |
|
On the Conditions for Successful RF Retroreflector Attacks Haruka Hoshino (Waseda Univ.), Masahiro Kinugawa (Sendai KOSEN), Yuichi Hayashi (Tohoku Gakuin Univ.), Tatsuya Mori (Waseda Univ.) ISEC2016-23 SITE2016-17 ICSS2016-23 EMM2016-31 |
[more] |
ISEC2016-23 SITE2016-17 ICSS2016-23 EMM2016-31 pp.53-58 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 15:50 |
Yamaguchi |
|
Evaluation of Clustering Analysis Based on Malware Traffic Model Mitsuhiro Hatada (Waseda Univ./NTT Communications), Tatsuya Mori (Waseda Univ.) ISEC2016-24 SITE2016-18 ICSS2016-24 EMM2016-32 |
A vast number of new malware samples have been developed for decades, and antivirus software may fail to detect evasive ... [more] |
ISEC2016-24 SITE2016-18 ICSS2016-24 EMM2016-32 pp.59-64 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 16:15 |
Yamaguchi |
|
Cyber security for Industrial control systems(ICS) in IoT era Yuma Takayama (IsecG(MFE)), Ichiro Koshijima, Tomomi Aoyama (nitech) ISEC2016-25 SITE2016-19 ICSS2016-25 EMM2016-33 |
[more] |
ISEC2016-25 SITE2016-19 ICSS2016-25 EMM2016-33 pp.65-70 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 16:40 |
Yamaguchi |
|
Investigation of Android Markets using Static Detector for Packed Applications Hiroki Nakano, Zhiyong Yang, Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2016-26 SITE2016-20 ICSS2016-26 EMM2016-34 |
In this paper, we propose a static method to identify which Android packer is used to protect an Android app. Using this... [more] |
ISEC2016-26 SITE2016-20 ICSS2016-26 EMM2016-34 pp.71-76 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 09:30 |
Yamaguchi |
|
One-time pad chaotic cryptography using augmented Lorenz equations Kenichiro Cho, Takaya Miyano (Ritsmeikan Univ) ISEC2016-27 SITE2016-21 ICSS2016-27 EMM2016-35 |
[more] |
ISEC2016-27 SITE2016-21 ICSS2016-27 EMM2016-35 pp.107-114 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 09:55 |
Yamaguchi |
|
Further improving security of Vector Stream Cipher Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36 |
Vector Stream Cipher (VSC) is a stream cipher which is very fast and is implemented lightly.
Some attacks for VSC have ... [more] |
ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36 pp.115-120 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 10:20 |
Yamaguchi |
|
Improvement of Winternitz one time signature and its security proof Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST) ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37 |
[more] |
ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37 pp.121-128 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 10:45 |
Yamaguchi |
|
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 |
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] |
ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38 pp.129-136 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 11:10 |
Yamaguchi |
|
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 |
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] |
ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39 pp.137-143 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:00 |
Yamaguchi |
|
Efficient Discrete Gaussian Sampling on Constrained Devices Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 |
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] |
ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 pp.169-175 |