Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:25 |
Hokkaido |
Sapporo Convention Center |
Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 |
The aim of this study is to clarify the educational effect of a penetration testing exercise aimed at raising cybersecur... [more] |
ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 pp.131-136 |
LOIS, ISEC, SITE |
2017-11-10 14:00 |
Kyoto |
|
Implementation Planning of Penetration Testing Exercises for Raising Cybersecurity Awareness Daisuke Suzuki (Hokuriku Univ.) ISEC2017-67 SITE2017-49 LOIS2017-44 |
In the information security class at the university, it is common to learn from the defender's perspective how to protec... [more] |
ISEC2017-67 SITE2017-49 LOIS2017-44 pp.103-106 |
PRMU, SP |
2012-02-09 15:15 |
Miyagi |
|
Electrooculogram recognition using hidden Markov model Fuming Fang, Takahiro Shinozaki, Yasuo Horiuchi, Shingo Kuroiwa (Chiba Univ), Sadaoki Furui (Tokyo Tech), Toshimitsu Musha (BFL) PRMU2011-202 SP2011-117 |
In order to provide an efficient means of communication for those who cannot move muscles of their whole body except eye... [more] |
PRMU2011-202 SP2011-117 pp.97-102 |
WIT |
2011-05-20 13:30 |
Niigata |
Niigata Univ. |
Information Assurance System for the Hearing Disabled People Using Mobile Device: Construction and Evaluation Sayuri Takahashi, Tsutomu Kimura (Toyota CT), Kazuyuki Kanda (Chukyo Univ.), Kazunari Morimoto (KIT) WIT2011-5 |
We constructed a handy information assurance system using a mobile device. Most of the explanations of the exhibitions i... [more] |
WIT2011-5 pp.25-28 |
WIT |
2009-02-20 15:00 |
Ehime |
Ehime University |
Field Evaluation of the Information Assurance System by Automatic Speech Recognition at Office Meeting Shuhei Orita, Masahide Mizushima, Ken'ichi Furuya, Hirokazu Masataki, Yoichi Haneda (NTT) WIT2008-58 |
We are developing an automatic speech recognition system used for information assurance for hearing-impaired people. Thi... [more] |
WIT2008-58 pp.11-16 |
SP, WIT |
2008-05-29 - 2008-05-30 |
Hyogo |
Kobe University |
Study of information assurance methods for hearing impaired people
-- Comparing textual information with sign language -- Kaoru Nakazono, Sunyong Kim (NTT Labs.) SP2008-17 WIT2008-17 |
This paper discusses acceptability of textual information and sign video as the information assurance method for hearing... [more] |
SP2008-17 WIT2008-17 pp.97-102 |
WIT, TL, SP |
2008-01-24 13:00 |
Shimane |
Shimane Univ. |
Evaluation of Mental Workload of Speakers and Menders When Using an Information Assurance System by Automatic Speech Recognition Masahide Mizushima, Shuhei Orita, Hirokazu Masataki, Ken'ichi Furuya, Akitoshi Kataoka (NTT) TL2007-60 SP2007-155 WIT2007-60 |
We are developing an automatic speech recognition system used for information assurance at meetings for hearing impaired... [more] |
TL2007-60 SP2007-155 WIT2007-60 pp.31-36 |
PRMU, HIP |
2006-01-19 16:50 |
Osaka |
Osaka Univ. |
[Special Talk]
shimpo (Tsukuba Univ.) |
Legal issues concerned with the utilization of Camera have occurred in a various sides. For instance, "Assurance of Sec... [more] |
PRMU2005-148 HIP2005-118 pp.75-82 |
NS, ICM |
2004-11-18 13:55 |
Kanagawa |
Mitsubishi Electric Corp. Kamakura-Learning-Center (Kanagawa pref) |
Fault tolerant ad hoc network design scheme Haruko Kawahigashi, Yoshiaki Terashima, Naoto Miyauchi, Tetsuo Nakakawaji (Mitsubishi Elec. Corp.) |
Wireless ad hoc networks, where mobile stations construct networks by mutual multi hop relaying, have been widely discus... [more] |
NS2004-146 TM2004-49 pp.5-10 |
ISEC, IPSJ-CSEC |
2004-07-21 16:25 |
Tokushima |
Tokushima Univ. |
A Loosely Managed Privacy Protection Method using Information Entropy Miyuki Imada, Koichi Takasugi, Masakatsu Ohta (NTT) |
We propose a novel privacy protection method for use by service providers supplying services in which user information n... [more] |
ISEC2004-54 pp.87-94 |