IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Social Implications of Technology and Information Ethics (SITE)  (Searched in: 2014)

Search Results: Keywords 'from:2014-07-03 to:2014-07-03'

[Go to Official SITE Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 21 - 37 of 37 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:10
Hokkaido San-Refure Hakodate Problems Concerning the Digitization of the Japanese Government Authorized Textbooks -- Study of Open Access and Free License of the Digital Textbooks --
Takahiro Haga (Gifu Shotoku Gakuen Univ.), Tsugumasa Suzuki (Keio Gijuku Youchisha Primary School), Takushi Otani (Kibi International Univ.) ISEC2014-30 SITE2014-25 ICSS2014-34 EMM2014-30
The digitization of textbooks that have been authorized by the Minister of Education(hereafter referred to as Authorized... [more] ISEC2014-30 SITE2014-25 ICSS2014-34 EMM2014-30
pp.221-228
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:35
Hokkaido San-Refure Hakodate Information ethics in interdiscplinarity -- Codes of Ethics and Belief Revision --
Yuko Murakami (Tohoku Univ.) ISEC2014-31 SITE2014-26 ICSS2014-35 EMM2014-31
Interdiscplinarity issues arise from incompatible codes of ethics from each discipline, although they are often regarded... [more] ISEC2014-31 SITE2014-26 ICSS2014-35 EMM2014-31
pp.229-232
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:15
Hokkaido San-Refure Hakodate On Hidden Credential Retrieval
SeongHan Shin, Kazukuni Kobara (AIST) ISEC2014-32 SITE2014-27 ICSS2014-36 EMM2014-32
Hidden Credential Retrieval (HCR) protocols are designed for access credentials management where users who remember shor... [more] ISEC2014-32 SITE2014-27 ICSS2014-36 EMM2014-32
pp.233-237
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Cryptanalysis of a matrix variant of NTRU
Takanori Yasuda (ISIT), Yuya Yamaguchi (Kyushu Univ.), Xavier Dahan, Kouichi Sakurai (ISIT) ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
Since its introduction in 1996, the cryptosystem NTRU has become a well-established candidate for the next generation pu... [more] ISEC2014-33 SITE2014-28 ICSS2014-37 EMM2014-33
pp.239-246
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
11:05
Hokkaido San-Refure Hakodate New Higher Order Differential Property of Piccolo
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34
Piccolo is a 64-bit block cipher proposed by Shibutani et.al in 2011. It has been reported that 8-/10-round Piccolo with... [more] ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34
pp.247-252
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
11:30
Hokkaido San-Refure Hakodate Quantitative Evaluation of the Key Information That is Learned through Timing Attack -- The Contribution of Bucketing Technique for RSA Cryptosystem --
Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35
Timing attacks are regarded as serious threats to many practical cryptographic algorithms, but it is difficult to estima... [more] ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35
pp.253-258
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
10:40
Hokkaido San-Refure Hakodate Some Properties on Disaster Prevention Broadcasting Based on Data Hiding Technique
Tetsuya Kojima, Akihiro Oizumi (Tokyo NCT) ISEC2014-36 SITE2014-31 ICSS2014-40 EMM2014-36
Data hiding schemes using complete complementary codes have been developed for image and audio signals. It has been show... [more] ISEC2014-36 SITE2014-31 ICSS2014-40 EMM2014-36
pp.259-264
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
11:05
Hokkaido San-Refure Hakodate Information hiding technique to protect copyright of digital data for 3-D printing
Piyarat Silapasuphakornwong, Masahiro Suzuki, Hiroshi Unno, Kazutake Uehira (Kanagawa Inst. of Tech.), Youichi Takashima (NTT) ISEC2014-37 SITE2014-32 ICSS2014-41 EMM2014-37
This study presents a technique of information hiding to protect copy right of digital data for 3-D printing. In this te... [more] ISEC2014-37 SITE2014-32 ICSS2014-41 EMM2014-37
pp.265-270
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
11:30
Hokkaido San-Refure Hakodate Integration for Web reservation data of Hotel
Yu Ichifuji, Noboru Sonehara (NII) ISEC2014-38 SITE2014-33 ICSS2014-42 EMM2014-38
Policy decisions like tourism should be determined on the bases of social data. In this situation, these data are collec... [more] ISEC2014-38 SITE2014-33 ICSS2014-42 EMM2014-38
pp.271-274
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:25
Hokkaido San-Refure Hakodate Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2)
Hiroyuki Inaba, Takuto Tamai (Kyoto Inst. of Tech.) ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39
In recent years, a lot of incident of password leakage by illegal access occurs frequently, therefore a password list at... [more] ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39
pp.275-280
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:50
Hokkaido San-Refure Hakodate Proposal on Fast Searchable Encryption Scheme Using Bloom Filter
Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more]
ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40
pp.281-286
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:15
Hokkaido San-Refure Hakodate Vulnerability in a Privacy-preserving Biometric Authentication by using Homomorphic Encryption
Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41
 [more] ISEC2014-41 SITE2014-36 ICSS2014-45 EMM2014-41
pp.287-292
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:40
Hokkaido San-Refure Hakodate Countermeasure to Attack against a Privacy-preserving Biometric Authentication by using Homomorphic Encryption
Yumi Sakemi, Masahiko Takenaka, Naoya Torii, Masaya Yasuda (Fujitsu Labs. Ltd.) ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42
 [more] ISEC2014-42 SITE2014-37 ICSS2014-46 EMM2014-42
pp.293-300
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:25
Hokkaido San-Refure Hakodate Evaluating Resistance of Android Applications to Automated Repackaging
Fumihiro Kanei, Yuki Shoda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-43 SITE2014-38 ICSS2014-47 EMM2014-43
Android is widely used as a smartphone OS. On the other hand, malware targeting the Android devices is increasing. Somet... [more] ISEC2014-43 SITE2014-38 ICSS2014-47 EMM2014-43
pp.301-307
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:50
Hokkaido San-Refure Hakodate A Case Study on Light-weight URL Blacklist Generation based on Sandbox Analysis
Mitsuhiro Hatada, Takanori Inazumi, Jun Arikawa, Yasuyuki Tanaka (NTT Communications) ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44
In order to detect the malware infection in internal network, we focus on HTTP traffic to the Internet. URL blacklist is... [more] ISEC2014-44 SITE2014-39 ICSS2014-48 EMM2014-44
pp.309-314
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:15
Hokkaido San-Refure Hakodate DDoS Attack Path Reconstruction in Space-Time Encoding Schemes
Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
pp.315-319
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:40
Hokkaido San-Refure Hakodate Analysis of Cyber-attack Infrastructure with Malicious Website focused on Backdoor Shell
Masaki Kamizono (YNU/NICT), Yuji Hoshizawa (SecureBrain), Takahiro Kasama, Masashi Eto, Daisuke Inoue (NICT), Katsunari Yoshioka, Tsutomu Matsumoto (YNU) ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
 [more] ISEC2014-46 SITE2014-41 ICSS2014-50 EMM2014-46
pp.321-326
 Results 21 - 37 of 37 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan