Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
R |
2009-12-18 13:50 |
Tokyo |
|
An Investigation of Reliability Evaluation of Networks with Layer Structure Ayako Suzuki (Inst. of Information Security), Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Inst. of Information Security), Masaki Hanada (Tokyo Univ. of Science) R2009-48 |
There are many networks organized on an exist network by using appropriate network technologies. In these cases, the re... [more] |
R2009-48 pp.11-16 |
ISEC |
2009-09-25 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Beijing Meeting in May, 2009 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corp/IPA) ISEC2009-45 |
[more] |
ISEC2009-45 pp.35-43 |
EA |
2009-03-27 10:30 |
Tokyo |
|
Kalman Filter Based Robust Restoration Method with Colored Driving Source Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci), Hideaki Matsue (Tokyo Univ. of Sci, Suwa.), Shigeo Tsujii (Inst. of Info Security) EA2008-136 |
This paper proposes a Kalman filter based robust restoration method with colored driving source for degraded images. The... [more] |
EA2008-136 pp.1-5 |
EA |
2009-03-27 11:00 |
Tokyo |
|
A Fast Noise Suppression Algorithm using Kalman filter with Colored Driving Source Nari Tanabe, Yasuhiro Onozuka, Masataka Tabata (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci.), Shigeo Tsujii (Inst. of Information Security.) EA2008-137 |
[more] |
EA2008-137 pp.7-11 |
WBS, IT, ISEC |
2009-03-09 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Network Usage Control Based on Evaluation of User Security Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58 |
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] |
IT2008-45 ISEC2008-103 WBS2008-58 pp.15-22 |
WBS, IT, ISEC |
2009-03-09 10:15 |
Hokkaido |
Hakodate Mirai Univ. |
Anomaly detection based on the machine learning of the human behavior on home network Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59 |
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] |
IT2008-46 ISEC2008-104 WBS2008-59 pp.23-28 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104 |
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] |
IT2008-91 ISEC2008-149 WBS2008-104 pp.307-314 |
ITE-BCT, IE, CS, IPSJ-AVM |
2008-12-11 15:15 |
Aichi |
Nagoya University |
Kalman Filter Based Restoration Algorithm for Degraded Image Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (nstitute of Information Security) CS2008-44 IE2008-108 |
We propose a Kalman filter based restoration algorithm for degraded images.The algorithm aims to achieve high quality im... [more] |
CS2008-44 IE2008-108 pp.29-34 |
EA |
2008-11-21 11:15 |
Oita |
|
Kalman filter based fast noise suppression algorithm Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (Institute of Information Security) EA2008-94 |
[more] |
EA2008-94 pp.57-62 |
ICM, CQ, NS (Joint) |
2008-11-13 18:00 |
Fukushima |
Nihon University |
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] |
CQ2008-51 pp.33-38 |
SITE |
2008-10-17 14:20 |
Kanagawa |
|
About the access rule of the integrated security model based on the intuitionistic logic
-- The case of combining a conflict of interest attribute with a hierarchical attribute -- Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) SITE2008-31 |
[more] |
SITE2008-31 pp.9-14 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:50 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Design Policy of MPKC based on Piece in Hand Concept Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12 |
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] |
ISEC2008-18 SITE2008-12 pp.15-22 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
On the Standardization of Information Security
-- ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008 -- Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba/IPA) ISEC2008-20 SITE2008-14 |
[more] |
ISEC2008-20 SITE2008-14 pp.27-36 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 17:00 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Ontology and Epistemology in Semantic Network for Pluralistic Society
-- From the Aspect of Access Control Agent for Social Systems -- Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23 |
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] |
ISEC2008-29 SITE2008-23 pp.97-102 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 17:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Study of method for expressing context Yuhei Yamashita, Hirotsugu Kinoshita (Kanagawa Univ.), Tetsuya Morizumi (TNSi/IIS) ISEC2008-30 SITE2008-24 |
In the contemporary society that overflows with information, it becomes difficult to treat the flood of information.
T... [more] |
ISEC2008-30 SITE2008-24 pp.103-108 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Examination of the issues in designing of electronic signature documentation system Miyuki Takao, Koichiro Hayashi (IISEC) ISEC2008-38 |
Electronic signature and Digital timestamp are new technologies which provide high level integrity to digital data. But ... [more] |
ISEC2008-38 pp.23-30 |
R |
2008-05-30 15:50 |
Hyogo |
Kobe Gakuin Univ. |
An investigation of reliability of systems with latent failures Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Institute of Information Security) R2008-14 |
There are many systems with elements of which failures are not discovered immediately after their occurrences. In these... [more] |
R2008-14 pp.29-34 |
SP |
2008-03-20 15:15 |
Tokyo |
Univ. Tokyo |
[Poster Presentation]
Robust noise suppression algorithm using the only Kalman filter theory for white and colored noises Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Shigeo Tsujii (Inst. of Information Security) SP2007-195 |
This paper presents a noise suppression algorithm using only the Kalman filter theory with canonical state space models:... [more] |
SP2007-195 pp.51-56 |
EA |
2008-03-07 16:45 |
Tokyo |
NTT Musashino R&D Center |
Robust noise suppression algorithm using Kalman filter theory with colored driving source Nari Tanabe (Tokyo Univ. of Science, Suwa), Takeshi Inoue, Katsuyuki Sueyoshi (Chiba Inst. of Tech.), Toshihiro Furukawa (Tokyo Univ. of Science), Hajime Kubota (Chiba Inst. of Tech.), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (Inst. of information Security) EA2007-125 |
[more] |
EA2007-125 pp.79-84 |
RCS, SAT (Joint) |
2007-12-21 14:40 |
Oita |
|
Affine Projection Type Blind Multiuser Detection with Desired Symbol Estimation Nari Tanabe (Tokyo Univ. of Science, Suwa), Keigo Sakamoto (Tokyo Inst. of Tech.), Toshihiro Furukawa (Tokyo Univ. of Science), Shigeo Tsujii (Institute of infor. Security) RCS2007-132 |
[more] |
RCS2007-132 pp.121-126 |