Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
AI |
2022-02-28 16:20 |
Miyazaki |
Youth Hostel Sunflower MIYAZAKI (Primary: On-site, Secondary: Online) |
AI2021-25 |
(To be available after the conference date) [more] |
AI2021-25 pp.77-82 |
ET |
2019-10-19 14:20 |
Okinawa |
University of the Ryukyus |
Support and Practices in an Applied C Programming Exercise with Card Game Strategy and a Contest Style
-- Consideration of Analysis Method of Strategy Code Tendency using Clustering Method -- Takeru Shimizu, Hiroyuki Tominaga (Kagawa Univ.) ET2019-41 |
We have proposed an applied C programming exercise with the subject of the card game strategy. We have developed and ope... [more] |
ET2019-41 pp.51-56 |
HCS, HIP, HI-SIGCOASTER [detail] |
2019-05-16 10:50 |
Okinawa |
Okinawa Industry Support Center |
Influence of expectation for rewards on pupil information during an interactive game Kohei Shoda, Minoru Nakayama (Tokyo Tech.) HCS2019-5 HIP2019-5 |
We set up an experimental system that measures the player's expectation for reward and pupil change in
time series in a... [more] |
HCS2019-5 HIP2019-5 pp.23-28 |
ET |
2018-05-19 10:45 |
Kanagawa |
National Institute of Special Needs Education |
Support and Practices in an Applied C Programming Exercise with Card Game Strategy and a Contest Style
-- Analysis of Score Tendency by Hand Distribution in the Final League in 2017 -- Takeru Shimizu, Komei Murayama, Naoki Hanakawa, Hiroyuki Tominaga (Kagawa Univ.) ET2018-4 |
We have proposed an applied C exercise about card game strategy with a contest style as application of knowledge informa... [more] |
ET2018-4 pp.17-22 |
KBSE |
2018-03-02 10:00 |
Okinawa |
|
The Game Contents of Information Security Education Tsukasa Hirose, Takako Nakatani (The Open Univ) KBSE2017-54 |
In this study, we studied information security education by gathering information security events familiar to learners b... [more] |
KBSE2017-54 pp.91-95 |
ISEC |
2017-09-04 12:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Lower Bound on the Number of Shuffles for Commited-Format AND Protocols Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-43 |
(To be available after the conference date) [more] |
ISEC2017-43 pp.15-22 |
ISEC |
2017-05-12 10:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on the Numbers of Cards Required to Make Copied Commitments Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3 |
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] |
ISEC2017-3 pp.15-22 |
ISEC, LOIS, SITE |
2016-11-07 14:30 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Applications of Card-Based Cryptography to Education Takaaki Mizuki (Tohoku Univ.) ISEC2016-53 SITE2016-43 LOIS2016-31 |
(To be available after the conference date) [more] |
ISEC2016-53 SITE2016-43 LOIS2016-31 pp.13-17 |
HIP |
2016-09-27 15:15 |
Nara |
|
Analysis of behaviors by players in ``Old Maid'' (Second report) Eiji Watanabe (Konan Univ.) HIP2016-46 |
In this report, we analyze the behaviors by players in a card game called by ``Old Maid''. Here, we focus on the face mo... [more] |
HIP2016-46 pp.19-24 |
ISEC |
2016-09-02 09:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on Secure Execution of Random Bisection Cut Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2016-38 |
Using a deck of cards, we can realize a secure computation. Especially, since a random bisection cut was devised in 2009... [more] |
ISEC2016-38 pp.1-7 |
ET |
2016-03-05 14:55 |
Kagawa |
Kawaga Univ. (Saiwai-cho Campus) |
Support and Practice of Applied C Programming Exercise for Problem Solving with Card-Game Strategy
-- An Analysis Method of Personal Progress with Revision Situation of Submission Codes in a Contest -- Naoki Hanakawa, Fumiya Gemba, Takayuki Abe, Hiroyuki Tominaga (Kagawa Univ.) ET2015-102 |
We have proposed an applied C programming exercise with Poker strategy as a card-game. We have offered an execution envi... [more] |
ET2015-102 pp.51-58 |
MVE |
2015-06-09 11:30 |
Shimane |
|
Analysis of behaviors by players in old maid (card game) Eiji Watanabe (Konan Univ.) MVE2015-6 |
In this report, we analyze the behaviors by players in a card game called by ``Old Maid''. First, we detect the behavio... [more] |
MVE2015-6 pp.49-54 |
ISEC, IT, WBS |
2015-03-03 10:30 |
Fukuoka |
The University of Kitakyushu |
A Note on Secure Computations with Commercially Available Playing Cards Takaaki Mizuki (Tohoku Univ.) IT2014-90 ISEC2014-103 WBS2014-82 |
It is known that Secure Multi-Party Computations can be conducted using a number of physical cards with identical backs,... [more] |
IT2014-90 ISEC2014-103 WBS2014-82 pp.179-186 |
ISEC, LOIS, SITE |
2014-11-21 14:15 |
Hyogo |
|
Card-based Generation of Random Permutations without Fixed Points Rie Ishikawa, Eikoh Chida (NIT, Ichinoseki Colleage), Takaaki Mizuki (Tohoku Univ.) ISEC2014-58 SITE2014-49 LOIS2014-28 |
Consider a scenario where there are $n$ players who want to exchange gifts.
That is, we want to generate a random permu... [more] |
ISEC2014-58 SITE2014-49 LOIS2014-28 pp.13-18 |
ISEC, LOIS |
2013-11-28 15:00 |
Miyagi |
Tohoku Univ. |
A Note on Attacks against Card-Based Cryptographic Protocols Takaaki Mizuki, Hiroki Shizuya (Tohoku Univ.) ISEC2013-62 LOIS2013-28 |
It has been known that Secure Multi-Party Computations can be conducted using a number of black and red physical cards (... [more] |
ISEC2013-62 LOIS2013-28 pp.21-28 |
HCS |
2013-03-05 14:30 |
Shizuoka |
Hetel Wellseason Hamanako |
Analysis of face direction by participants in Indian-poker game (Part 2) Eiji Watanabe (Konan Univ.), Takashi Ozeki (Fukuyama Univ.), Takeshi Kohama (Kinki Univ.) HCS2012-107 |
In this report, we discuss the analysis of the interaction among the
participants in the Indian-poker game.
In this g... [more] |
HCS2012-107 pp.167-171 |
HCS |
2012-03-06 13:45 |
Shizuoka |
|
Analysis of face direction by participants in indian-poker game Eiji Watanabe (Konan Univ.), Takashi Ozeki (Fukuyama Univ.), Takeshi Kohama (Kinki Univ.) HCS2011-82 |
In this report, we discuss the analysis of the interaction among the participants in the Indian-poker game. In this game... [more] |
HCS2011-82 pp.85-88 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Visual Card Games for Boys and Girls Miyuki Uno, Mikio Kano (Ibaraki Univ.) IT2010-103 ISEC2010-107 WBS2010-82 |
We propose a new visual card game for two parties
$\mathcal{X}$ and $\mathcal{Y}$ of boys and girls, respectively.
In ... [more] |
IT2010-103 ISEC2010-107 WBS2010-82 pp.227-234 |
ET |
2009-07-31 13:05 |
Hiroshima |
Hiroshima City Univ. |
The effects of "Hi! Mr. Can," a CAI software for university students who have difficulties learning English Keiko Ishihara, Tomoko Nakamura (HIU) ET2009-14 |
The authors reported that they created computer-assisted instruction software for assisting unsuccessful learners of Eng... [more] |
ET2009-14 pp.1-6 |