IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2014)

Search Results: Keywords 'from:2014-11-21 to:2014-11-21'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, LOIS, SITE 2014-11-21
13:25
Hyogo   Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) ISEC2014-56 SITE2014-47 LOIS2014-26
QUAD is a stream cipher with a provable security based on the theory of multivariate public-key cryptography. However, Q... [more] ISEC2014-56 SITE2014-47 LOIS2014-26
pp.1-6
ISEC, LOIS, SITE 2014-11-21
13:50
Hyogo   Extension of NTRU scheme using non-commutative groups II
Takanori Yasuda, Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-57 SITE2014-48 LOIS2014-27
 [more] ISEC2014-57 SITE2014-48 LOIS2014-27
pp.7-11
ISEC, LOIS, SITE 2014-11-21
14:15
Hyogo   Card-based Generation of Random Permutations without Fixed Points
Rie Ishikawa, Eikoh Chida (NIT, Ichinoseki Colleage), Takaaki Mizuki (Tohoku Univ.) ISEC2014-58 SITE2014-49 LOIS2014-28
Consider a scenario where there are $n$ players who want to exchange gifts.
That is, we want to generate a random permu... [more]
ISEC2014-58 SITE2014-49 LOIS2014-28
pp.13-18
ISEC, LOIS, SITE 2014-11-21
14:40
Hyogo   Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic
Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) ISEC2014-59 SITE2014-50 LOIS2014-29
One of the most powerful attacks to elliptic curve and hyperelliptic based cryptosystems defined over an extension of a ... [more] ISEC2014-59 SITE2014-50 LOIS2014-29
pp.19-26
ISEC, LOIS, SITE 2014-11-21
15:20
Hyogo   estimating situations of a room using presence sensing log
Yuki Kashio, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura (Kobe Univ.) ISEC2014-60 SITE2014-51 LOIS2014-30
In the home network system (HNS), the advanced services can be provided by using human presence.
In our previous resear... [more]
ISEC2014-60 SITE2014-51 LOIS2014-30
pp.27-32
ISEC, LOIS, SITE 2014-11-21
15:45
Hyogo   [Invited Talk] Information sharing technologies for disaster situations -- design principles and field evaluations --
Masayuki Ihara (NTT)
 [more]
ISEC, LOIS, SITE 2014-11-22
09:00
Hyogo   Harms and Offenses of Moral Wrongdoings on Personal Information -- Why Is Sensitive Information Sensitive? --
Takushi Otani (Kibi International Univ.)
 [more]
ISEC, LOIS, SITE 2014-11-22
09:25
Hyogo   Proposal of the measure behavior intention model in measure against a computer virus.
Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-61 SITE2014-52 LOIS2014-31
In the field of information security, even though an individual might intend to take protective action under the virus i... [more] ISEC2014-61 SITE2014-52 LOIS2014-31
pp.33-37
ISEC, LOIS, SITE 2014-11-22
09:50
Hyogo   Study on Network Community Analysis. -- High Speed Computing Algorithm and it's Characteristics --
Mayako Sato, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-62 SITE2014-53 LOIS2014-32
The rapid spread of the SNS makes many people sharing information with each other and working in the community. However,... [more] ISEC2014-62 SITE2014-53 LOIS2014-32
pp.39-43
ISEC, LOIS, SITE 2014-11-22
10:15
Hyogo   An approach to assess the risk of information leakage by inference -- A pilot study of a visualization tool and an algorithm using local connectivity in digraphs --
Kazuhiro Suzuki, Haruka Uchima, Miki Kondo (Kochi Univ.) ISEC2014-63 SITE2014-54 LOIS2014-33
We study a graph-based model against information leakage from multiple pieces of information, where a relationship among... [more] ISEC2014-63 SITE2014-54 LOIS2014-33
pp.45-50
ISEC, LOIS, SITE 2014-11-22
10:55
Hyogo   Hands-free voice command input system using voice power adapted standard patterns
Yuji Yoshida, Hiroyuki Nishi, Yoshimasa Kimura, Toshio Kakinoki (Sojo Univ) ISEC2014-64 SITE2014-55 LOIS2014-34
Hands-free voice command input system have problems when the distance between the microphone and a user increases, as de... [more] ISEC2014-64 SITE2014-55 LOIS2014-34
pp.51-54
ISEC, LOIS, SITE 2014-11-22
11:20
Hyogo   Interactive System for Supporting Decision of Transportation Path According to User's Preference
Eko Sakai (Otani Univ.), Ken Nakayama (Tsuda College) ISEC2014-65 SITE2014-56 LOIS2014-35
Transportation path search systems minimize time and expense for movement.But the users sometimes need various paths lik... [more] ISEC2014-65 SITE2014-56 LOIS2014-35
pp.55-58
ISEC, LOIS, SITE 2014-11-22
11:45
Hyogo   Behavior Prediction from Lifelog Data Using A Virtual Communication-Network System
Yusuke Omori, Ryoichi Shinkuma (Kyoto Univ.), Kazuhiro Yamaguchi (KDL), Tatsuro Takahashi (Kyoto Univ.) ISEC2014-66 SITE2014-57 LOIS2014-36
Along with the development of mobile devices, users' daily activities like purchase histories or online access histroies... [more] ISEC2014-66 SITE2014-57 LOIS2014-36
pp.59-64
ISEC, LOIS, SITE 2014-11-22
13:20
Hyogo   Improving certificate validation in SSL/TLS implementations
Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST) ISEC2014-67 SITE2014-58 LOIS2014-37
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] ISEC2014-67 SITE2014-58 LOIS2014-37
pp.65-70
ISEC, LOIS, SITE 2014-11-22
13:45
Hyogo   How to Utilize Location Information for Distinguishing Users
Takuya Funakoshi, Masahiro Mambo (Kanazawa Univ.) ISEC2014-68 SITE2014-59 LOIS2014-38
Lifelig, log of individual daily activity, is a valuable resource useful for decision making, recommendation or statisti... [more] ISEC2014-68 SITE2014-59 LOIS2014-38
pp.71-76
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan