Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2019-03-07 09:30 |
Tokyo |
University of Electro-Communications |
Password for Prevention of Shoulder Surfing by Rear-Facing Camera Shota Ushiyachi, Ryuya Uda (Tokyo Univ. of Tech.) IT2018-75 ISEC2018-81 WBS2018-76 |
Mobile devices such as smart phones often manage privacy and secret information. Existing screen lock methods without bi... [more] |
IT2018-75 ISEC2018-81 WBS2018-76 pp.1-6 |
IT, ISEC, WBS |
2019-03-07 09:55 |
Tokyo |
University of Electro-Communications |
Exploring Malicious URL in Dark Web Using Tor Crawler Yuki Kawaguchi, Seiichi Ozawa (Kobe Univ.) IT2018-76 ISEC2018-82 WBS2018-77 |
In recent years, various web-based attacks such as Drive-by-Download attacks are becoming serious. To protect legitimate... [more] |
IT2018-76 ISEC2018-82 WBS2018-77 pp.7-12 |
IT, ISEC, WBS |
2019-03-07 10:20 |
Tokyo |
University of Electro-Communications |
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information Nguyen Son Hoang Quoc, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto (KDDI Research) IT2018-77 ISEC2018-83 WBS2018-78 |
The machine-translated text is playing an important role in modern life which establishes wide communication among vario... [more] |
IT2018-77 ISEC2018-83 WBS2018-78 pp.13-19 |
IT, ISEC, WBS |
2019-03-07 10:55 |
Tokyo |
University of Electro-Communications |
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques Yuto Takahashi, Tadaki Kanenari, Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-78 ISEC2018-84 WBS2018-79 |
In recent years, pairing encryption has attracted attention as an encryption method to realize high-performance encrypti... [more] |
IT2018-78 ISEC2018-84 WBS2018-79 pp.21-26 |
IT, ISEC, WBS |
2019-03-07 11:20 |
Tokyo |
University of Electro-Communications |
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2 Hiromasa Miura, Kazuya Kobayashi, Takuya Kusaka, Yasuyuki Nogami (Okayama Univ.) IT2018-79 ISEC2018-85 WBS2018-80 |
Based on the proposal of pairing-based cryptography, ID-based cryptography, searchable cryptography, and attribute-based... [more] |
IT2018-79 ISEC2018-85 WBS2018-80 pp.27-32 |
IT, ISEC, WBS |
2019-03-07 11:45 |
Tokyo |
University of Electro-Communications |
A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme Bagus Santoso (UEC) IT2018-80 ISEC2018-86 WBS2018-81 |
[more] |
IT2018-80 ISEC2018-86 WBS2018-81 pp.33-38 |
IT, ISEC, WBS |
2019-03-07 12:10 |
Tokyo |
University of Electro-Communications |
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings. Kaoru Takemure, Bagus Santoso (UEC) IT2018-81 ISEC2018-87 WBS2018-82 |
Most identification schemes based on the hardness of ideal lattice problems are built upon the Ring-SIS or Ring-LWE prob... [more] |
IT2018-81 ISEC2018-87 WBS2018-82 pp.39-44 |
IT, ISEC, WBS |
2019-03-07 13:40 |
Tokyo |
University of Electro-Communications |
Steganography for character strings by using deep learning Takayuki Masui (Kanagawa Univ.), Taiki Shigeta (Graduate School, Kanagawa Univ.), Hikaru Morita (Kanagawa Univ.) IT2018-82 ISEC2018-88 WBS2018-83 |
[more] |
IT2018-82 ISEC2018-88 WBS2018-83 pp.45-49 |
IT, ISEC, WBS |
2019-03-07 14:05 |
Tokyo |
University of Electro-Communications |
Steganography for images by using deep learning Taiki Shigeta, Hikaru Morita (Graduate Schoool, Kanagawa Univ) IT2018-83 ISEC2018-89 WBS2018-84 |
[more] |
IT2018-83 ISEC2018-89 WBS2018-84 pp.51-55 |
IT, ISEC, WBS |
2019-03-07 14:30 |
Tokyo |
University of Electro-Communications |
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2018-84 ISEC2018-90 WBS2018-85 |
In this paper, we propose strengthen the robustness against tampering of audio data for conference recording using audio... [more] |
IT2018-84 ISEC2018-90 WBS2018-85 pp.57-64 |
IT, ISEC, WBS |
2019-03-07 15:05 |
Tokyo |
University of Electro-Communications |
String commitment with output locality Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji (OU) IT2018-85 ISEC2018-91 WBS2018-86 |
[more] |
IT2018-85 ISEC2018-91 WBS2018-86 pp.65-70 |
IT, ISEC, WBS |
2019-03-07 15:30 |
Tokyo |
University of Electro-Communications |
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network Satoshi Kosugi, Sho Joichi, Ken Ikuta, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi (Okayama University) IT2018-86 ISEC2018-92 WBS2018-87 |
A side channel attack is an attack method that enable external key estimation by observing secondary information generat... [more] |
IT2018-86 ISEC2018-92 WBS2018-87 pp.71-76 |
IT, ISEC, WBS |
2019-03-07 15:55 |
Tokyo |
University of Electro-Communications |
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer Ryosuke Katsuno, Kazuki Yoneyama (Ibaraki Univ.) IT2018-87 ISEC2018-93 WBS2018-88 |
(To be available after the conference date) [more] |
IT2018-87 ISEC2018-93 WBS2018-88 pp.77-82 |
IT, ISEC, WBS |
2019-03-07 16:55 |
Tokyo |
University of Electro-Communications |
[Invited Talk]
Deepning and evolution of Deep learning technology Hayaru Shouno (UEC) IT2018-88 ISEC2018-94 WBS2018-89 |
[more] |
IT2018-88 ISEC2018-94 WBS2018-89 p.83 |
IT, ISEC, WBS |
2019-03-07 09:30 |
Tokyo |
University of Electro-Communications |
Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source
-- When the Statewise Alphabets are Unknown -- Yusuke Hashimoto, Tstutomu Kawabata (Univ. of Electro-Comm.) IT2018-89 ISEC2018-95 WBS2018-90 |
A Bayesian (Laplace or Krichevski-Trofimov) estimator for Markov source can be used to build a lossless
source code. Ho... [more] |
IT2018-89 ISEC2018-95 WBS2018-90 pp.85-90 |
IT, ISEC, WBS |
2019-03-07 09:55 |
Tokyo |
University of Electro-Communications |
On Multiterminal Hypothesis Testing Problem Yasutada Oohama (UEC) IT2018-90 ISEC2018-96 WBS2018-91 |
[more] |
IT2018-90 ISEC2018-96 WBS2018-91 pp.91-96 |
IT, ISEC, WBS |
2019-03-07 10:20 |
Tokyo |
University of Electro-Communications |
Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence Ryo Nomura (Senshu Univ.) IT2018-91 ISEC2018-97 WBS2018-92 |
[more] |
IT2018-91 ISEC2018-97 WBS2018-92 pp.97-102 |
IT, ISEC, WBS |
2019-03-07 10:55 |
Tokyo |
University of Electro-Communications |
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set Mitsuharu Arimnura (Shonan Inst. Tech.) IT2018-92 ISEC2018-98 WBS2018-93 |
When blocks are parsed and encoded incrementally in the LZY code, which is a variation of the LZ78 code, the newly parse... [more] |
IT2018-92 ISEC2018-98 WBS2018-93 pp.103-108 |
IT, ISEC, WBS |
2019-03-07 11:20 |
Tokyo |
University of Electro-Communications |
Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources Leonardo Inoue, Hidetoshi Yokoo (Gunma Univ.) IT2018-93 ISEC2018-99 WBS2018-94 |
In the entropy coders known as Asymmetric Numeral Systems (ANS) proposed by Jarek Duda, the source distribution must be ... [more] |
IT2018-93 ISEC2018-99 WBS2018-94 pp.109-114 |
IT, ISEC, WBS |
2019-03-07 11:45 |
Tokyo |
University of Electro-Communications |
A New Variation of Asymmetric Numeral Systems Qi Xin, Hidetoshi Yokoo (Gunma Univ.) IT2018-94 ISEC2018-100 WBS2018-95 |
A recently introduced family of entropy coders known as Asymmetric Numeral Systems (ANS) includes several variants. The ... [more] |
IT2018-94 ISEC2018-100 WBS2018-95 pp.115-120 |