Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
ET |
2020-03-07 13:50 |
Kagawa |
National Institute of Technology, Kagawa Collage (Cancelled but technical report was issued) |
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92 |
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] |
ET2019-92 pp.93-98 |
PN |
2020-03-03 09:50 |
Kagoshima |
(Cancelled but technical report was issued) |
DDoS defense method by logically isolating attackers Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63 |
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] |
PN2019-63 pp.65-71 |
SITE |
2019-12-06 15:40 |
Kanagawa |
|
"To be there" as an existence in logical space and an existence in probability measure space
-- "Shared logos (partage) on language games" as a necessary condition of physicality -- Tetsuya Morizumi (KU) SITE2019-86 |
How should the AI relate to the information security? The AI performs Bayesian estimation of a probability distribution ... [more] |
SITE2019-86 pp.41-46 |
NS, ICM, CQ, NV (Joint) |
2019-11-21 11:20 |
Hyogo |
Rokkodai 2nd Campus, Kobe Univ. |
Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123 |
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] |
NS2019-123 pp.19-25 |
QIT (2nd) |
2019-11-19 14:50 |
Tokyo |
Gakushuin University |
Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers Seunghoan Song, Masahito Hayashi (Nagoya Univ.) |
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more] |
|
ISEC, SITE, LOIS |
2019-11-02 10:00 |
Osaka |
Osaka Univ. |
Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35 |
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more] |
ISEC2019-76 SITE2019-70 LOIS2019-35 pp.93-98 |
ISEC |
2019-05-17 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A secure method of provisioning IoT devices with few operations Dai Yamamoto, Hirotaka Kokubo, Takanori Machida, Ikuya Morikawa (FUJITSU LABORATORIES LTD.), Akira Kanaoka (Toho Univ.) ISEC2019-8 |
Recently, most IoT devices have been connected to cloud servers, which provide users with useful services such as remote... [more] |
ISEC2019-8 pp.37-44 |
HCS, HIP, HI-SIGCOASTER [detail] |
2019-05-16 13:10 |
Okinawa |
Okinawa Industry Support Center |
The Message to Effectively Promote Information Security Measurements Toshihide Saito, Asuka Ono, Asuka Miyake, Ai Nakane (NTT), Yutaro Kiyomura, Kazuhiro Matsuzaki, Tatsuya Ishihara (NTT WEST) HCS2019-8 HIP2019-8 |
The risk of security incidents is increasing year by year, and it is becoming more important for individual users to tak... [more] |
HCS2019-8 HIP2019-8 pp.39-44 |
HWS, VLD |
2019-03-01 15:45 |
Okinawa |
Okinawa Ken Seinen Kaikan |
On Machine Learning Attack Tolerance for PUF-based Device Authentication System Tomoki Iizuka (UTokyo), Yasuhiro Ogasahara, Toshihiro Katashita, Yohei Hori (AIST), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-133 HWS2018-96 |
Double-Arbiter PUF (DAPUF) and PL-PUF are known to be highly resistant to machine learning attacks.
In this paper, we p... [more] |
VLD2018-133 HWS2018-96 pp.237-242 |
ICSS |
2018-11-21 13:25 |
Kagoshima |
|
Investigation of Security-Related Factors of Satisfactions in Internet Services Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2018-54 |
The number of services on the Internet and devices connected to the Internet has been increased. Under such circumstance... [more] |
ICSS2018-54 pp.7-12 |
RCS, AP (Joint) |
2018-11-20 11:15 |
Okinawa |
Okinawa Industry Support Center |
A Study on Space Selective Modulation in Land Mobile Communication Daiki Fukushima, Hideiti Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2018-181 |
As a physical layer security technique, Directional Modulation with multiple antennas which forms desired modulated sign... [more] |
RCS2018-181 pp.19-24 |
ASN, SRW (Joint) |
2018-11-05 10:25 |
Tokyo |
Tokyo Denki University, Tokyo Senju Campus |
Study on obstacle avoidance in video surveillance system using a drone Daiki Suzuki, Susumu Matsui (OIT) ASN2018-52 |
The needs of home security systems are increasing against the background of the solitary old people’s increase. As funct... [more] |
ASN2018-52 pp.1-5 |
CS |
2018-11-02 10:30 |
Ehime |
The Shiki Museum |
False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66 |
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] |
CS2018-66 pp.63-66 |
HWS, ICD |
2018-10-29 14:30 |
Osaka |
Kobe Univ. Umeda Intelligent Laboratory |
An Acceleration of Compressed Squaring for Pairing Implementation with Pipeline Modular Multiplier Yota Okuaki, Junichi Sakamoto, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) HWS2018-50 ICD2018-42 |
One of the biggest problems of the emerging cyber-physical and cloud computing systems is how to ensure security with en... [more] |
HWS2018-50 ICD2018-42 pp.19-24 |
IN, NS, CS, NV (Joint) |
2018-09-07 10:45 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
A Study of Scanning Hosts Classification Mechanism in IP Backbone Networks Yukihiro Togari, Hisashi Kojima, Takeshi Kuwahara (NTT) NS2018-102 |
We have researched a lightweight scan detection mechanism in the IP backbone networks. However, the existing mechanism c... [more] |
NS2018-102 pp.83-88 |
IA |
2018-09-03 14:10 |
Hokkaido |
Hokkaido Univ. Conference Hall |
Collecting a large number of active IPv6 addresses Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2018-16 |
Due to wide deployment of IPv6, security issues in IPv6 network is becoming more and more important. Scanning all IP add... [more] |
IA2018-16 pp.1-8 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 09:55 |
Hokkaido |
Sapporo Convention Center |
Truly Efficient Robust Secret Sharing for the Real World Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 |
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] |
ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 pp.1-8 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:20 |
Hokkaido |
Sapporo Convention Center |
Construction of Revocable HIBE with Adaptive Security Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 |
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] |
ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 pp.9-16 |
ISEC |
2018-05-16 14:25 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
Survey on Tracking of Leaked NEM by Coincheck Incident Teppei Sato (Univ. of Tsukuba), Mitsuyoshi Imamura (Univ. of Tsukuba/NomuraAM), Kazumasa Omote (Univ. of Tsukuba) ISEC2018-7 |
Some volunteers had performed tracking a huge amount of NEM leaked from CoinCheck by sending specific mosaics which no o... [more] |
ISEC2018-7 pp.35-41 |