IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Special Interest Group on Security Psychology and Trust (IPSJ-SPT)  (Searched in: 2016)

Search Results: Keywords 'from:2016-07-14 to:2016-07-14'

[Go to Official IPSJ-SPT Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:00
Yamaguchi   A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise
Shogo Shigemoto, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) ISEC2016-13 SITE2016-7 ICSS2016-13 EMM2016-21
Among many watermarking schemes, the DCT-OFDM-based scheme retains high robustness against various kinds of attacks. The... [more] ISEC2016-13 SITE2016-7 ICSS2016-13 EMM2016-21
pp.1-6
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:25
Yamaguchi   Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle
Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) ISEC2016-14 SITE2016-8 ICSS2016-14 EMM2016-22
In general, watermark information is embedded into the host signals selected from digital content according to a secret ... [more] ISEC2016-14 SITE2016-8 ICSS2016-14 EMM2016-22
pp.7-12
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:50
Yamaguchi   Study of an information extraction method using artificial fiber pattern with a clear ink
Yuki Matsue (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS), Isao Echizen (NII) ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23
Our laboratory has developed “single dot method”, which is one of a nearly invisible pattern as new information embeddin... [more] ISEC2016-15 SITE2016-9 ICSS2016-15 EMM2016-23
pp.13-18
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
14:15
Yamaguchi   Technique for Embedding Information by Constructing Protuberance With Inner Walls of Objects Fabricated With 3-D Printers
Kousuke Nakamura, Masahiro Suzuki (Kanagawa Inst. Tech.), Youichi Takashima (NTT), Hideyuki Torii, Kazutake Uehira (Kanagawa Inst. Tech.) ISEC2016-16 SITE2016-10 ICSS2016-16 EMM2016-24
We evaluated our previously proposed technique for protecting copyrights of digital data for 3-D printing. The proposed ... [more] ISEC2016-16 SITE2016-10 ICSS2016-16 EMM2016-24
pp.19-22
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
14:40
Yamaguchi   Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers
Tatsuya Chuman, Kenta Kurihara, Hitoshi Kiya (Tokyo Metro. Univ.) ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] ISEC2016-17 SITE2016-11 ICSS2016-17 EMM2016-25
pp.23-28
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:00
Yamaguchi   Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing
Motoi Tanaka, Hiroyuki Inaba (KIT) ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26
A personal authentication system using PIN or password is widely used in various information terminals. However these au... [more] ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26
pp.29-32
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:25
Yamaguchi   Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time
Hiroaki Kuno, Hiroyuki Inaba (KIT) ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27
IDS (Intrusion Detection System) is one of the countermeasures for illegal access to the network. Since IDS reports all ... [more] ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27
pp.33-36
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:50
Yamaguchi   A Study of a Simple Model of Information Safety Education -- A Departure from Convetional Information Moral Education Model --
Takahiro Haga (GSGU), Akiko Igarashi (Uchida), Katsurou Nishioka (UHD) ISEC2016-20 SITE2016-14 ICSS2016-20 EMM2016-28
Within Japan’s compulsory education system, “information moral education” has been increasingly promoted since the 1990s... [more] ISEC2016-20 SITE2016-14 ICSS2016-20 EMM2016-28
pp.37-40
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
14:15
Yamaguchi   Developing rules to transmit our intentions in Computer Mediated Communication
Nobuyuki Yoshinga (YPU) ISEC2016-21 SITE2016-15 ICSS2016-21 EMM2016-29
The purpose of this paper is to propose the development of rules that enable us to transmit our intentions through Compu... [more] ISEC2016-21 SITE2016-15 ICSS2016-21 EMM2016-29
pp.41-45
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
14:40
Yamaguchi   Privacy Problems and Social Relationships -- Privacy Problems Caused by the Visualization and Manipulation of Social Relationships --
Takushi Otani (Kibi International Univ.) ISEC2016-22 SITE2016-16 ICSS2016-22 EMM2016-30
 [more] ISEC2016-22 SITE2016-16 ICSS2016-22 EMM2016-30
pp.47-51
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
15:25
Yamaguchi   On the Conditions for Successful RF Retroreflector Attacks
Haruka Hoshino (Waseda Univ.), Masahiro Kinugawa (Sendai KOSEN), Yuichi Hayashi (Tohoku Gakuin Univ.), Tatsuya Mori (Waseda Univ.) ISEC2016-23 SITE2016-17 ICSS2016-23 EMM2016-31
 [more] ISEC2016-23 SITE2016-17 ICSS2016-23 EMM2016-31
pp.53-58
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
15:50
Yamaguchi   Evaluation of Clustering Analysis Based on Malware Traffic Model
Mitsuhiro Hatada (Waseda Univ./NTT Communications), Tatsuya Mori (Waseda Univ.) ISEC2016-24 SITE2016-18 ICSS2016-24 EMM2016-32
A vast number of new malware samples have been developed for decades, and antivirus software may fail to detect evasive ... [more] ISEC2016-24 SITE2016-18 ICSS2016-24 EMM2016-32
pp.59-64
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
16:15
Yamaguchi   Cyber security for Industrial control systems(ICS) in IoT era
Yuma Takayama (IsecG(MFE)), Ichiro Koshijima, Tomomi Aoyama (nitech) ISEC2016-25 SITE2016-19 ICSS2016-25 EMM2016-33
 [more] ISEC2016-25 SITE2016-19 ICSS2016-25 EMM2016-33
pp.65-70
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
16:40
Yamaguchi   Investigation of Android Markets using Static Detector for Packed Applications
Hiroki Nakano, Zhiyong Yang, Hiroshi Mori, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2016-26 SITE2016-20 ICSS2016-26 EMM2016-34
In this paper, we propose a static method to identify which Android packer is used to protect an Android app. Using this... [more] ISEC2016-26 SITE2016-20 ICSS2016-26 EMM2016-34
pp.71-76
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
09:30
Yamaguchi   One-time pad chaotic cryptography using augmented Lorenz equations
Kenichiro Cho, Takaya Miyano (Ritsmeikan Univ) ISEC2016-27 SITE2016-21 ICSS2016-27 EMM2016-35
 [more] ISEC2016-27 SITE2016-21 ICSS2016-27 EMM2016-35
pp.107-114
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
09:55
Yamaguchi   Further improving security of Vector Stream Cipher
Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36
Vector Stream Cipher (VSC) is a stream cipher which is very fast and is implemented lightly.
Some attacks for VSC have ... [more]
ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36
pp.115-120
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
10:20
Yamaguchi   Improvement of Winternitz one time signature and its security proof
Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST) ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37
 [more] ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37
pp.121-128
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
10:45
Yamaguchi   Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
pp.129-136
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
11:10
Yamaguchi   Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation
Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
pp.137-143
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
13:00
Yamaguchi   Efficient Discrete Gaussian Sampling on Constrained Devices
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
pp.169-175
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan