Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
MoNA, ASN, IPSJ-MBL, IPSJ-UBI (Joint) [detail] |
2015-03-02 14:35 |
Tokyo |
Shibaura Institute of Technology(Toyosu Campus) |
A Study on Data Processing among Users' Mobiles for Application of Privacy Data Takafumi Harada, Keizo Murakami, Hironobu Okuyama, Takahiro Yamamoto (NTT) MoNA2014-96 |
Recently, smartphones have many kinds of sensors. Therefore data from these probes is able to be used for many kinds of ... [more] |
MoNA2014-96 pp.129-133 |
CS, NS, IN (Joint) |
2014-09-12 14:50 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
The proposal of the privacy protection technique in the network using positional addresses Taichi Aoki (IISEC) NS2014-101 |
Our study is a network, that is using location information as an address. One of the theme of a position address
networ... [more] |
NS2014-101 pp.129-134 |
CPSY, DC (Joint) |
2014-07-29 17:25 |
Niigata |
Toki Messe, Niigata |
Anonymization Infrastructure for Privacy Preserving Data Publishing Yuichi Nakamura, Kengo Okada, Fumito Yamaguchi, Hiroaki Nishi (Keio Univ.) CPSY2014-30 |
Nowadays, various institutions manage large amounts of data such as customer information and medical records . These dat... [more] |
CPSY2014-30 pp.119-124 |
ICSS, IPSJ-SPT |
2014-03-28 09:00 |
Okinawa |
Meio Univiersity |
A Study on the Formulation of Re-identification of Anonymized Personal Information Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) ICSS2013-86 |
Anonymizing personal information is one way to preserve human's privacy.
But combination of anonymized information mig... [more] |
ICSS2013-86 pp.167-172 |
LOIS |
2014-03-08 16:20 |
Okinawa |
|
Linkable System Using Encrypted Personal Identification Information for Clinical Research Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79 |
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] |
LOIS2013-79 pp.149-154 |
AI |
2013-11-28 16:50 |
Fukuoka |
|
An Algorithm of k-anonymization for Location Information with Errors Yuichi Sei, Akihiko Ohsuga (Univ. of Electro-Comm.) AI2013-26 |
Data mining can support effective marketing or advertisement based on user' attributes such as sex, age, and current loc... [more] |
AI2013-26 pp.41-46 |
DE, IPSJ-DBS, IPSJ-IFAT |
2013-07-23 16:40 |
Hokkaido |
Hokkaido University |
k-anonymization for large-scale data with less information loss Keisuke Murakami (Aoyama Gakuin Univ.), Takeaki Uno (NII) DE2013-32 |
The individual information such as the medical database is useful for data analysis. However, the individual information... [more] |
DE2013-32 pp.193-198 |
LOIS |
2013-03-07 15:30 |
Okinawa |
|
An Experiment of Purterbation-Reconstruction Method on Power Consumption Data Ryo Kikuchi (NTT), Satoshi Hasegawa (Univ. of Tsukuba), Dai Ikarashi (NTT) LOIS2012-84 |
Recently, an anonymization that realizes both privacy protections and statistical analyses is now attracting attention. ... [more] |
LOIS2012-84 pp.89-94 |
ICSS |
2012-11-22 11:35 |
Hiroshima |
Miyajima Mori-no-Yado |
An analytical study for sensor service provider to keep their use's security Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47 |
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] |
ICSS2012-47 pp.13-18 |
EMM |
2012-10-04 15:30 |
Chiba |
Makuhari Messe |
[Special Talk]
A Proposal on Crisis-proof Social and Life Space
-- Life-log Data Driven Information Flow and Privacy Preserving -- Noboru Sonehara (NII) EMM2012-60 |
Advent of the Internet and the Web have led to the convergence of an integrated society combining the real world and cyb... [more] |
EMM2012-60 pp.27-32 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 11:40 |
Hokkaido |
Hokkaido Univ. |
Statistical disclosure control of health information using the k-Anonymity concept and the virtual desktop technology Eizen Kimura (Ehime Univ.) SITE2011-50 IA2011-100 |
Electronic medical record and online receipt system realized the management of enormous health record, and the Big data ... [more] |
SITE2011-50 IA2011-100 pp.223-228 |
LOIS |
2012-03-09 13:10 |
Okinawa |
Meio Univ. |
t-test for Privacy-Preserved Data Ryo Kikuchi, Akihiro Yamanaka, Dai Ikarashi (NTT) LOIS2011-101 |
As the needs of utilizing the privacy information such as giving the receipt to researchers in the university for
the d... [more] |
LOIS2011-101 pp.171-176 |
SITE, IPSJ-CE |
2011-12-17 15:45 |
Shimane |
|
A study for the change of anonymous nature of data from individuals with development of information processing techniques Soichiro Morishita (Univ. of Tokyo), Hiroshi Yokoi (UEC) SITE2011-29 |
With the improvement of information processing technology, the data which were not considered to be personal data come t... [more] |
SITE2011-29 pp.25-28 |
DE |
2011-08-03 10:30 |
Kyoto |
Ritusmei University, Suzaki Campus |
* Masanori Mano, Yoshiharu Ishikawa (Nagoya Univ.) DE2011-35 |
In recent years, location-based services have become popular due to the progress of GPS devices and mobile communication... [more] |
DE2011-35 pp.47-52 |
ICSS |
2011-03-25 10:45 |
Tokyo |
Suspended |
Proposal of an Order Preserving Encryption for Anonymity Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57 |
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] |
ICSS2010-57 pp.5-10 |
IA, ICSS |
2010-06-17 15:20 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II) Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6 |
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] |
IA2010-6 ICSS2010-6 pp.31-36 |
IA, ICSS |
2009-06-18 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13 |
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] |
IA2009-5 ICSS2009-13 pp.25-30 |
IA, ICSS |
2009-06-18 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
* Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14 |
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] |
IA2009-6 ICSS2009-14 pp.31-36 |