Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 09:35 |
Hokkaido |
|
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol Daisuke Moriyama (NICT) ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38 |
Radio Frequency IDentications (RFID) are useful low-cost devices for identication or authentication systems through wi... [more] |
ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38 pp.255-261 |
EMM |
2013-05-24 13:00 |
Kochi |
Kochijyo Hall |
[Tutorial Lecture]
Novel approach of information hiding for enriched media
-- Cutting-edge applications of information hiding -- Isao Echizen (NII) EMM2013-1 |
Thanks to an earnest attempt to Cyber Physical System (CPS), information hiding has a crucial role to convey information... [more] |
EMM2013-1 pp.1-5 |
ICSS |
2013-03-25 10:20 |
Kanagawa |
Yokohama National University |
A Method to Identify the Writer's Birthday on a Blog article Masataka Kawahara, Atsushi Kanai (Hosei Univ.) ICSS2012-57 |
In recent years, personal information is unconsciously written in many cases because of the opportunity for an individua... [more] |
ICSS2012-57 pp.1-6 |
ITS, IEE-ITS |
2013-03-11 13:40 |
Kyoto |
|
Location Tracking Prevention with Dummy Packet for Vehicular Communications Tsubasa Teramoto, Satoru Noguchi, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) ITS2012-64 |
In emerging vehicular communication systems, each vehicle periodically broadcasts Safety Messages, which contains vehicl... [more] |
ITS2012-64 pp.49-54 |
LOIS |
2013-03-07 14:10 |
Okinawa |
|
A Secure Personal Information Management Method Using Linkable Anonymizing and Hybrid Cipher for Information Sharing Systems in Home Medical Care and Nursing Taichi Tatsuda, Wataru Mizoguchi, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-80 |
There is a demand for collaborative approach to provide efficient services with various profession in the home medical c... [more] |
LOIS2012-80 pp.65-70 |
IT, ISEC, WBS |
2013-03-07 16:35 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
[Invited Talk]
Road of IT security standard
-- From cryptography to cloud and M2M security -- Kazuo Takaragi (AIST) IT2012-88 ISEC2012-106 WBS2012-74 |
In 1977, security standardization activities began with encryption algorithm, followed by development of a number of imp... [more] |
IT2012-88 ISEC2012-106 WBS2012-74 p.167 |
SITE |
2012-12-12 14:00 |
Osaka |
|
Trend and ethical problem of the honeypot Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45 |
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more] |
SITE2012-45 pp.13-18 |
SITE |
2012-10-10 16:00 |
Tokyo |
|
[Invited Talk]
The Ethics of Privacy in IT Services
-- Current Situations and Issues -- Hiromitsu Takagi (AIST) SITE2012-42 |
(To be available after the conference date) [more] |
SITE2012-42 p.21 |
LOIS |
2011-03-04 09:35 |
Okinawa |
Ishigaki IT business support center |
Cinsideration about Lifelog in Cyberspace
-- Aspects of Privacy Protection -- Tomoya Takasuka, Shiro Uesugi (Matsuyama Univ.) LOIS2010-82 |
It is highly expected to utilize Virtual Reality such as Second Life in order to revitalize local economy. Especially, ... [more] |
LOIS2010-82 pp.101-106 |
IN |
2011-01-20 15:10 |
Osaka |
Osaka Univ. |
[Invited Talk]
Data Masking and Traceability for Inter-Cloud Data Security Kouichi Itoh, Yoshinori Katayama, Mebae Ushida, Gao Jie, Fumihiko Kozakura, Hiroshi Tsuda (Fujitsu Laboratories) IN2010-129 |
The use of cloud computing in business is expanding at a rapid clip in recent years. However, security of the data store... [more] |
IN2010-129 pp.65-70 |
SITE |
2010-10-15 13:50 |
Tokyo |
Nihon Univ. (Surugadai) |
Smart Grid and Privacy
-- Examination of Privacy Impact Assessment -- Hideyuki Fujii (NTT Data), Kensuke Yamaguchi (Univ. of Tokyo) SITE2010-40 |
This paper focus on the problem of privacy in Smart Grid and introduce Privacy Impact Assessment (PIA) approach to solve... [more] |
SITE2010-40 pp.35-40 |
SITE, IPSJ-CE |
2009-12-11 15:45 |
Hiroshima |
Hiroshima Univ. |
Anonymity as Privacy in Public Space
-- Is ethical surveillance possible? -- Takushi Otani (KIBI International Univ.) SITE2009-40 |
Anonymity as Privacy in Public Space:
Is Ethical Surveillance Possible?
Abstract The costs of sensors and of access... [more] |
SITE2009-40 pp.49-54 |
ICSS |
2009-05-15 16:40 |
Hyogo |
Kobe University |
Private List Matching Protocol and its Application Hiroaki Kikuchi, Daisuke Kagawa (Tokai Univ.) ICSS2009-7 |
We may collaborate with someone with common preference in particular fields, e.g.,
sharing, exchange useful information... [more] |
ICSS2009-7 pp.33-36 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69 |
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] |
IT2008-56 ISEC2008-114 WBS2008-69 pp.79-84 |
WBS, IT, ISEC |
2009-03-10 13:00 |
Hokkaido |
Hakodate Mirai Univ. |
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code Shun Watanabe, Tsuki Saitou, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-103 ISEC2008-161 WBS2008-116 |
The privacy amplification is a technique to distill
a secret key from a random variable by a function
so that the dist... [more] |
IT2008-103 ISEC2008-161 WBS2008-116 pp.395-400 |
RCS, AN, MoNA, SR (Joint) |
2009-03-06 10:35 |
Kanagawa |
YRP |
The Two-Way MIMO Wire-Tap Channel Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2008-273 |
We consider the popular security problem of ensuring the communication privacy of two users, Alice and Bob, in the a pri... [more] |
RCS2008-273 pp.361-366 |
DE |
2008-09-21 17:00 |
Fukushima |
|
[Poster Presentation]
Securing Social Information in Outsourced Databases Junpei Kawamoto, Masatoshi Yoshikawa (Kyoto Univ.) DE2008-36 |
Nowadays, outsourced databases services are in widespread use. In these services, security is more
important than ever ... [more] |
DE2008-36 pp.13-14 |
LOIS |
2008-03-07 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg.(pending) |
On the Security of Publicly Verifiable Electronic Voting Masahiro Mambo, Eiji Okamoto (Univ. Tsukuba) OIS2007-97 |
So far, publicly verifiable voting schemes have been proposed where voters can verify
the correctness of tallying of al... [more] |
OIS2007-97 pp.1-4 |
SIS |
2007-12-10 16:40 |
Hyogo |
|
Developing Security Method of UHF RFID to Realize Privacy Protection Masaaki Yamamoto, Takanori Yamazoe (Hitachi) SIS2007-56 |
Recently, the UHF radio frequency identification (RFID) is widely used in a number of applications including logistics, ... [more] |
SIS2007-56 pp.57-61 |
SWIM |
2007-08-24 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Research Results in Health and Welfare Project in SCOPE
-- A Research Project of Advanced Agent and Information Network Technologies on Health and Welfare -- Atsushi Togashi (Miyagi Univ.), Shoich Noguchi (SFAIS) SWIM2007-11 |
The objective of this project is to establish advanced agent and information network technologies on health and welfare ... [more] |
SWIM2007-11 pp.21-24 |