Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, COMP |
2017-12-22 10:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Relationship between LOR security and SW security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39 |
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] |
ISEC2017-85 COMP2017-39 pp.89-94 |
IA, IN (Joint) |
2017-12-15 15:00 |
Hiroshima |
Hiroshima City Univ. |
A Study on Location Privacy for Multicast-Based Services Kentaro Kita, Kai Ryu, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2017-63 |
Since Internet of Things (IoT) data generally correlates with its location where it is sensed, location-based forwarding... [more] |
IN2017-63 pp.103-108 |
EMM |
2017-11-06 17:05 |
Kagoshima |
Kagoshima Univ. (Inamori Academy) |
An algorithm to reduce information loss by swapping data in k-anonymous partitions Kodai Shigeoka (Osaka Univ.), Hiroko Akiyama (NIT,Nagano College), Masaaki Wada (Osaka Univ.) EMM2017-60 |
Given a dataset consisting of multidimensional numerical vectors, we consider $k$-anonymization by first dividing the da... [more] |
EMM2017-60 pp.27-31 |
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2017-11-08 12:30 |
Kumamoto |
Kumamoto-Kenminkouryukan Parea |
Application of blind watermarking method for secondary use on smart community Yuta Ohno, Akira Niwa, Hiroaki Nishi (Keio Univ.) VLD2017-58 DC2017-64 |
The smart community aims to enrich people's livelihood by secondary use of personal data such as home electric power and... [more] |
VLD2017-58 DC2017-64 pp.191-196 |
COMP, ISEC |
2016-12-21 09:50 |
Hiroshima |
Hiroshima University |
A note on security notions of anonymity in Identity-based encryption Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32 |
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] |
ISEC2016-71 COMP2016-32 pp.9-13 |
IA, IN (Joint) |
2016-12-15 17:10 |
Hiroshima |
Hiroshima city university |
Nodes anonymous and hiding of locator on ZNP, one of ID/Locator Separation Protocol Yusuke Ikeda, Takao Kondo, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IA2016-71 |
ID/Locator Separation Protocol (LISP) is watched due to the revolution of usage of internet. However, LISP has a privacy... [more] |
IA2016-71 pp.47-52 |
IN, MoNA, CNR (Joint) |
2016-11-17 11:20 |
Kagoshima |
Kirishima-kanko Hotel |
Name-based Geograhical Forwarding Support for Location-based IoT Services Kai Ryu, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2016-61 |
Internet of Things (IoT) devices deployed everywhere are expected as potential data sources for various applications suc... [more] |
IN2016-61 pp.7-12 |
IT, ISEC, WBS |
2016-03-11 11:40 |
Tokyo |
The University of Electro-Communications |
k-Anonymization Techinque for Encrypted Data Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) IT2015-135 ISEC2015-94 WBS2015-118 |
This paper proposes k-anonymizaiton technique for encrypted data stored on cloud environment. The proposed method utiliz... [more] |
IT2015-135 ISEC2015-94 WBS2015-118 pp.211-217 |
LOIS, ISEC, SITE |
2015-11-06 17:10 |
Kanagawa |
Kanagawa Univ. |
Postpaid electronic money to keep privacy and its implementation Tatshuhiko Sukegawa, Mashu Sakai, Hikaru Morita (Kanagawa Univ.) ISEC2015-48 SITE2015-35 LOIS2015-42 |
Postpaid electronic money schemes are provided by credit-card companies.
In these schemes, after electronic money is us... [more] |
ISEC2015-48 SITE2015-35 LOIS2015-42 pp.81-86 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:40 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
On the Security of SAPAKE SeongHan Shin, Kazukuni Kobara (AIST) ISEC2015-10 SITE2015-8 ICSS2015-20 EMM2015-18 |
In this paper, we discuss about the security of SAPAKE [14] which was proposed by Qian et al., as a simple anonymous pas... [more] |
ISEC2015-10 SITE2015-8 ICSS2015-20 EMM2015-18 pp.9-14 |
SS |
2015-05-11 14:25 |
Kumamoto |
Kumamoto University |
[Invited Lecture]
Quantitative Information Flow and Differential Privacy Hiroyuki Seki (Nagoya Univ.) SS2015-4 |
Recently, quantitative modellings for security and privacy have been paid much attention. Among them are quantitative in... [more] |
SS2015-4 pp.17-22 |
LOIS |
2015-03-05 13:00 |
Okinawa |
|
A Study on Web-Based Questionnaire of Class-Assessment Yasuhiko Higaki (Chiba Univ.) LOIS2014-68 |
I picked up following 7 requirements for web-based questionnaire from related studies; keeping
anonymity of the respond... [more] |
LOIS2014-68 pp.43-48 |
IT |
2014-12-09 15:50 |
Toyama |
Unazuki New Otani Hotel |
[Invited Talk]
On Quantitative Notions for Security and Privacy Hiroyuki Seki (Nagoya Univ.) IT2014-52 |
Recently, quantitative modellings for security and privacy have been paid much attention. Among them are quantitative i... [more] |
IT2014-52 pp.13-18 |
IA |
2014-11-27 09:50 |
Tottori |
Green-Squalle Sekigane (Tottori) |
A Self-Governed P2P Anonymous Publish/Subscribe System Naoki Tsujio, Yasuo Okabe (Kyoto Univ.) IA2014-63 |
There have been many researches to protect the freedom of expression in the internet, but complete anonymity sometimes l... [more] |
IA2014-63 pp.13-17 |
ISEC |
2014-09-05 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction in Anonymous Credential System Shahidatul Sadiah (Okayama Univ.), Toru Nakanishi (Hiroshima Univ.), Nobuo Funabiki (Okayama Univ.) ISEC2014-50 |
An anonymous credential system on attributes allows a user to convince a service provider anonymously that he/she owns t... [more] |
ISEC2014-50 pp.21-26 |
IN |
2014-04-18 13:25 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
A Secure Route Selection Method for Smart Meters Yuya Takii, Yuji Ikema, Osamu Mizuno (Kogakuin Univ) IN2014-5 |
Smart grid provide efficiency electricity usage situation balanced for supply and demands of electricity power and using... [more] |
IN2014-5 pp.55-60 |
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
A Study on the Formulation of Re-identification of Anonymized Personal Information Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) ICSS2013-86 |
Anonymizing personal information is one way to preserve human's privacy.
But combination of anonymized information mig... [more] |
ICSS2013-86 pp.167-172 |
TL |
2014-02-21 16:20 |
Chiba |
Chiba Univ. |
Shy users' self-disclosure on Twitter Ryosuke Kohita, Edson T. Miyamoto (Univ. of Tsukuba) TL2013-62 |
According to previous literature, CMC (Computer-mediated Communication) facilitates self-disclosure (i.e., to talk truth... [more] |
TL2013-62 pp.7-12 |
IN, IA (Joint) |
2013-12-19 13:00 |
Hiroshima |
Hiroshima City Univ. |
Improving Anonymity in an ID/Locator Split Network Architecture Yuki Kobayashi, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IA2013-57 |
Recently, ID/Locator split architectures have attracted considerable attention to solve several problems in current Inte... [more] |
IA2013-57 pp.1-6 |
ISEC |
2013-09-13 15:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal of Extended Anonymous Credential Scheme with Ecient Proof of Age Inequality Shahidatul Sadiah, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.) ISEC2013-54 |
An anonymous credential system on attributes allows a user to convince a service provider anonymously that he/she owns a... [more] |
ISEC2013-54 pp.21-28 |