IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2018)

Search Results: Keywords 'from:2019-03-07 to:2019-03-07'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 54  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, WBS 2019-03-07
09:30
Tokyo University of Electro-Communications Password for Prevention of Shoulder Surfing by Rear-Facing Camera
Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.) IT2018-75 ISEC2018-81 WBS2018-76
Mobile devices such as smart phones often manage privacy and secret information. Existing screen lock methods without bi... [more] IT2018-75 ISEC2018-81 WBS2018-76
pp.1-6
IT, ISEC, WBS 2019-03-07
09:55
Tokyo University of Electro-Communications Exploring Malicious URL in Dark Web Using Tor Crawler
Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.) IT2018-76 ISEC2018-82 WBS2018-77
In recent years, various web-based attacks such as Drive-by-Download attacks are becoming serious. To protect legitimate... [more] IT2018-76 ISEC2018-82 WBS2018-77
pp.7-12
IT, ISEC, WBS 2019-03-07
10:20
Tokyo University of Electro-Communications Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information
Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] IT2018-77 ISEC2018-83 WBS2018-78
pp.13-19
IT, ISEC, WBS 2019-03-07
10:55
Tokyo University of Electro-Communications An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques
Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-78 ISEC2018-84 WBS2018-79
In recent years, pairing encryption has attracted attention as an encryption method to realize high-performance encrypti... [more] IT2018-78 ISEC2018-84 WBS2018-79
pp.21-26
IT, ISEC, WBS 2019-03-07
11:20
Tokyo University of Electro-Communications A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2
Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-79 ISEC2018-85 WBS2018-80
Based on the proposal of pairing-based cryptography, ID-based cryptography, searchable cryptography, and attribute-based... [more] IT2018-79 ISEC2018-85 WBS2018-80
pp.27-32
IT, ISEC, WBS 2019-03-07
11:45
Tokyo University of Electro-Communications A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme
Bagus Santoso (UEC) IT2018-80 ISEC2018-86 WBS2018-81
 [more] IT2018-80 ISEC2018-86 WBS2018-81
pp.33-38
IT, ISEC, WBS 2019-03-07
12:10
Tokyo University of Electro-Communications Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings.
Kaoru Takemure, Bagus Santoso (UEC) IT2018-81 ISEC2018-87 WBS2018-82
Most identification schemes based on the hardness of ideal lattice problems are built upon the Ring-SIS or Ring-LWE prob... [more] IT2018-81 ISEC2018-87 WBS2018-82
pp.39-44
IT, ISEC, WBS 2019-03-07
13:40
Tokyo University of Electro-Communications Steganography for character strings by using deep learning
Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.) IT2018-82 ISEC2018-88 WBS2018-83
 [more] IT2018-82 ISEC2018-88 WBS2018-83
pp.45-49
IT, ISEC, WBS 2019-03-07
14:05
Tokyo University of Electro-Communications Steganography for images by using deep learning
Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2018-83 ISEC2018-89 WBS2018-84
 [more] IT2018-83 ISEC2018-89 WBS2018-84
pp.51-55
IT, ISEC, WBS 2019-03-07
14:30
Tokyo University of Electro-Communications A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity
Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2018-84 ISEC2018-90 WBS2018-85
In this paper, we propose strengthen the robustness against tampering of audio data for conference recording using audio... [more] IT2018-84 ISEC2018-90 WBS2018-85
pp.57-64
IT, ISEC, WBS 2019-03-07
15:05
Tokyo University of Electro-Communications String commitment with output locality
Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU) IT2018-85 ISEC2018-91 WBS2018-86
 [more] IT2018-85 ISEC2018-91 WBS2018-86
pp.65-70
IT, ISEC, WBS 2019-03-07
15:30
Tokyo University of Electro-Communications Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network
Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University) IT2018-86 ISEC2018-92 WBS2018-87
A side channel attack is an attack method that enable external key estimation by observing secondary information generat... [more] IT2018-86 ISEC2018-92 WBS2018-87
pp.71-76
IT, ISEC, WBS 2019-03-07
15:55
Tokyo University of Electro-Communications Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer
Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.) IT2018-87 ISEC2018-93 WBS2018-88
(To be available after the conference date) [more] IT2018-87 ISEC2018-93 WBS2018-88
pp.77-82
IT, ISEC, WBS 2019-03-07
16:55
Tokyo University of Electro-Communications [Invited Talk] Deepning and evolution of Deep learning technology
Hayaru Shouno (UEC) IT2018-88 ISEC2018-94 WBS2018-89
 [more] IT2018-88 ISEC2018-94 WBS2018-89
p.83
IT, ISEC, WBS 2019-03-07
09:30
Tokyo University of Electro-Communications Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source -- When the Statewise Alphabets are Unknown --
Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.) IT2018-89 ISEC2018-95 WBS2018-90
A Bayesian (Laplace or Krichevski-Trofimov) estimator for Markov source can be used to build a lossless
source code. Ho... [more]
IT2018-89 ISEC2018-95 WBS2018-90
pp.85-90
IT, ISEC, WBS 2019-03-07
09:55
Tokyo University of Electro-Communications On Multiterminal Hypothesis Testing Problem
Yasutada Oohama (UEC) IT2018-90 ISEC2018-96 WBS2018-91
 [more] IT2018-90 ISEC2018-96 WBS2018-91
pp.91-96
IT, ISEC, WBS 2019-03-07
10:20
Tokyo University of Electro-Communications Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence
Ryo Nomura (Senshu Univ.) IT2018-91 ISEC2018-97 WBS2018-92
 [more] IT2018-91 ISEC2018-97 WBS2018-92
pp.97-102
IT, ISEC, WBS 2019-03-07
10:55
Tokyo University of Electro-Communications A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set
Mitsuharu Arimnura (Shonan Inst. Tech.) IT2018-92 ISEC2018-98 WBS2018-93
When blocks are parsed and encoded incrementally in the LZY code, which is a variation of the LZ78 code, the newly parse... [more] IT2018-92 ISEC2018-98 WBS2018-93
pp.103-108
IT, ISEC, WBS 2019-03-07
11:20
Tokyo University of Electro-Communications Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources
Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.) IT2018-93 ISEC2018-99 WBS2018-94
In the entropy coders known as Asymmetric Numeral Systems (ANS) proposed by Jarek Duda, the source distribution must be ... [more] IT2018-93 ISEC2018-99 WBS2018-94
pp.109-114
IT, ISEC, WBS 2019-03-07
11:45
Tokyo University of Electro-Communications A New Variation of Asymmetric Numeral Systems
Qi Xin, Hidetoshi Yokoo (Gunma Univ.) IT2018-94 ISEC2018-100 WBS2018-95
A recently introduced family of entropy coders known as Asymmetric Numeral Systems (ANS) includes several variants. The ... [more] IT2018-94 ISEC2018-100 WBS2018-95
pp.115-120
 Results 1 - 20 of 54  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan