Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, ICTSSL, NWS (Joint) |
2016-10-21 09:30 |
Osaka |
Osaka Uinv. |
The Management Method for Publisher's Right Protection on Content Centric Network Shouhei Nagai, Osamu Mizuno (Kogakuin Univ.) IN2016-56 |
We can get contents by smartphone and tablet PC in anywhere and anytime. Network traffic for content delivery has been i... [more] |
IN2016-56 pp.43-48 |
CPSY, DC, IPSJ-ARC [detail] |
2016-05-09 13:10 |
Toyama |
Unaduki Suginoi Hotel |
A Study of Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems Yudai Komori, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2016-1 DC2016-1 |
The performance of key and the degree of privacy in large-scale RFID systems are considered by many researches as tradeo... [more] |
CPSY2016-1 DC2016-1 pp.1-6 |
CPSY, DC, IPSJ-ARC [detail] |
2016-05-09 14:10 |
Toyama |
Unaduki Suginoi Hotel |
A Study of Contact Avoidance Routing in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2016-3 DC2016-3 |
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connectivity. While cryptogra... [more] |
CPSY2016-3 DC2016-3 pp.11-14 |
IA, SITE, IPSJ-IOT [detail] |
2016-03-03 17:05 |
Saga |
Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) |
A study of trustworthy information for Internet users Shinji Ishii, Takaaki Hasegawa (Saitama Univ.) SITE2015-67 IA2015-99 |
In recent years, Smartphone smartphone becomes widespread, and also the number of SNS users is increasing rapidly. In sp... [more] |
SITE2015-67 IA2015-99 pp.139-144 |
LOIS |
2016-03-04 11:20 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on data protection requirements for an authentication system using personal data Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87 |
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] |
LOIS2015-87 pp.139-144 |
EMM |
2016-03-02 14:30 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
A Study of Anonymity Index with Probability of Re-Identification Hiroko Akiyama (nnct), Akira Kato, Hideki Sunahara (Keio Univ.) EMM2015-76 |
For making valuable information or better services for individuals and society, Bigdata is very effective.
Bigdata has ... [more] |
EMM2015-76 pp.1-5 |
NS, RCS (Joint) |
2015-12-17 11:25 |
Ehime |
Matsuyama Community Center |
An Online Storage System Based on RAID Takamasa Fujiwara, Jiahong Wang, Eiichiro Kodama, Toyoo Takata (Iwate Prefectural Univ.) NS2015-132 |
In recent years, with the wide spread of computers and smart phones (called terminals), it has become a general case tha... [more] |
NS2015-132 pp.31-36 |
IN, IA (Joint) |
2015-12-18 15:35 |
Hiroshima |
Hiroshima City University |
The Content Request Method Against Privacy Leakage in Content Centric Network Shohei Nagai, Takahiro Kaida, Osamu Mizuno (Kogakuin Univ) IN2015-93 |
Internet traffic is increasing annually by appearing high performance mobile network, smart phones and tablet PCs. This ... [more] |
IN2015-93 pp.131-136 |
IA |
2015-11-12 14:10 |
Chiba |
NARITA VIEW HOTEL |
An Investigation of Security, Privacy, and Usability Issues of Personal Health Record Systems Phuwanai Thummavet, Sangsuree Vasupongayya, Sinchai Kamolphiwong (Prince of Songkla Univ.) IA2015-48 |
Personal Health Record (PHR) was recently introduced as an alternative approach to storing and sharing personal health i... [more] |
IA2015-48 pp.59-64 |
IN |
2015-10-16 12:40 |
Osaka |
Osaka University |
Contact Avoidance Routing in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (TMU), Masayuki Arai (Nihon Univ.) IN2015-57 |
In this paper, we address a secure routing in delay tolerant networks(DTNs) that lack continuous network connectivity. W... [more] |
IN2015-57 pp.25-28 |
CS |
2015-07-02 13:50 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
[Invited Talk]
Illegal Interrogation Detectable Products Distribution Scheme in RFID-enabled Supply Chains Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-17 |
An EPC contains sensitive information and protecting it is necessary in the RFID-enabled supply chains. However, no sche... [more] |
CS2015-17 pp.45-50 |
EMM |
2015-03-13 10:55 |
Okinawa |
|
Implementation and Evaluation of a Facial Image Retrieval System with Privacy Protection Yoshitaka Morimura (Kyoto Univ.), Takuya Funatomi (NAIST), Tetsutaro Uehara (Ritsumeikan Univ.), Michihiko Minoh (Kyoto Univ.) EMM2014-98 |
In our previous research, we have proposed the method that generates the cryptographic key from facial feature in order ... [more] |
EMM2014-98 pp.125-129 |
LOIS |
2015-03-06 10:30 |
Okinawa |
|
The Relation on Sense of Security, Consent and Use Intention for an Information System and Service by Degree of Use Intention Kaori Okumura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) LOIS2014-82 |
The online service that utilized the privacy information of user spreads out, and the further development is expected. F... [more] |
LOIS2014-82 pp.123-128 |
SC, IPSJ-CLE |
2014-10-25 15:10 |
Miyagi |
Tohoku Univ. |
Considering Architecture for Managing House Log in Cloud-Based Home Network System Junho Lee, Satoshi Takatori, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) SC2014-13 |
We have been developing a novel home network system, called Cloud-HNS, which manages home servers and all the services w... [more] |
SC2014-13 pp.55-60 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack Daisuke Moriyama (NICT) ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 |
Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneous... [more] |
ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 pp.17-24 |
PRMU, MI, IE, SIP |
2014-05-23 13:40 |
Aichi |
|
[Special Talk]
Privacy Protection in Data Analytics
-- Towards Application Development for Complex Event Sensing and Healthcare Services -- Jun Sakuma (Univ. of Tsukuba) SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18 |
Advanced integration of big data are expected to bring about innovative services.
Along with the ICT services that pene... [more] |
SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18 p.97 |
CW (2nd) |
2014-03-17 |
Tokyo |
Seikei Univ. |
The future efforts to popularize cloud services Yuki Iwase, Jun Iio (Chuo Univ) |
In recent years, cloud services, especially in areas like Web applications and network games, have become popular among ... [more] |
|
LOIS |
2014-03-08 15:55 |
Okinawa |
|
Security and Usability of "Smilenet" (Information Sharing System for Home Medical Care and Nursing) Masayuki Sassa, Jun Takeo, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2013-78 |
There is a demand for collaborative approach to provide efficient services with various profession in the home medical c... [more] |
LOIS2013-78 pp.143-148 |
LOIS |
2014-03-08 16:20 |
Okinawa |
|
Linkable System Using Encrypted Personal Identification Information for Clinical Research Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79 |
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] |
LOIS2013-79 pp.149-154 |
NS |
2014-01-24 09:50 |
Okinawa |
Univ. of the Ryukyus |
A Secure Online Storage System Based on RAID Takamasa Fuziwara, Jiahong Wang, Eiichiro Kodama, Toyoo Takata (Iwate Prefectural Univ.) NS2013-172 |
Recently, PC and mobile terminals are commonly available, multiple terminals per person become a very common case, and m... [more] |
NS2013-172 pp.53-58 |