Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 14:30 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Proposal on Secure Hint System for Password Authentication Using Bloom Filter Kazumu Kaneko, Hiroyuki Inaba (KIT) SITE2023-102 IA2023-108 |
[more] |
SITE2023-102 IA2023-108 pp.211-218 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-02 14:30 |
Online |
Online |
Proposal of Anomaly Based Attack Detection System for IoT Devices Using Deep Metric Learning Tatsuya Takimoto, Hiroyuki Inaba (KIT) SITE2019-90 IA2019-68 |
In recent years, with the development of the Internet, many IoT devices are used in all aspects of life. On the other ha... [more] |
SITE2019-90 IA2019-68 pp.13-18 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
Proposal and Implementation of Password Reminder System for Partial Forgetting Ryota Hosoda, Hiroyuki Inaba (KIT) ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34 |
[more] |
ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34 pp.163-170 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:35 |
Kochi |
Kochi University of Technology |
Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 |
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] |
ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35 pp.171-178 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 14:00 |
Kochi |
Kochi University of Technology |
Video Watermarking Using Difference of Persistent Homology in Consecutive Frames Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 |
Copyright infringement such as illegal copying and uploading video contents frequently happen in many
video distributio... [more] |
ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36 pp.179-186 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:50 |
Hokkaido |
Sapporo Convention Center |
A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 |
Recently, Wi-Fi access points have been installed in public places, with increasing demand for Internet access by mobile... [more] |
ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 pp.137-142 |
SITE, IPSJ-EIP |
2018-06-01 14:45 |
Kanagawa |
|
Implementation and Evaluation of Intrusion Detection System for Malicious PC by Sensor Hosts Hiroaki Kuno, Satoshi Kimura, Hiroyuki Inaba (KIT) SITE2018-4 |
In recent years, Intrusion Detection System(IDS) is not able to catch the unknown attack
as malware and its variant ar... [more] |
SITE2018-4 pp.95-99 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:15 |
Tokyo |
|
Performance Analysis of Video Watermarking Using Patchwork Method on Frequency Domain Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16 |
Video watermarking using patchwork method is proposed as one of the video watermarking. This method can defend embedded ... [more] |
ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16 pp.1-4 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 10:40 |
Tokyo |
|
Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain Kohei Miura, Hiroyuki Inaba (KIT) ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 |
We have proposed a digital contents circulation system on Blockchain. The system can protect user’s privacy from both co... [more] |
ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17 pp.5-8 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-15 13:25 |
Tokyo |
|
Proposal of Personal Authentication Method by Visual Secret Scheme Using Smart Phone Ryo Mizuno, Hiroyuki Inaba (KIT) ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38 |
[more] |
ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38 pp.259-266 |
SITE, IPSJ-EIP |
2017-05-31 16:35 |
Tokyo |
|
A Proposal of Reliable Car Sharing System Using Ethereum's Smart Contract Tomoya Ogami, Hiroyuki Inaba (KIT) SITE2017-2 |
Recently, car sharing services which we can lend and rent our own cars or campany's cars spread widely. That is because... [more] |
SITE2017-2 pp.37-40 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:00 |
Yamaguchi |
|
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing Motoi Tanaka, Hiroyuki Inaba (KIT) ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 |
A personal authentication system using PIN or password is widely used in various information terminals. However these au... [more] |
ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 pp.29-32 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:25 |
Yamaguchi |
|
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time Hiroaki Kuno, Hiroyuki Inaba (KIT) ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27 |
IDS (Intrusion Detection System) is one of the countermeasures for illegal access to the network. Since IDS reports all ... [more] |
ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27 pp.33-36 |
SITE, IPSJ-EIP |
2016-06-02 13:55 |
Kanagawa |
Institute of Information Security |
Privacy Preserving Digital Contents Circulation System Using Bitcoin 2.0 Kohei Miura, Hiroyuki Inaba (KIT) SITE2016-2 |
[more] |
SITE2016-2 pp.29-32 |
IA, IPSJ-IOT, SITE [detail] |
2015-03-06 14:20 |
Fukushima |
|
Fast Searchable Encryption Scheme Using Single Bloom Filter and Its Evalustion Shunsuke Kimura, Hiroyuki Inaba (KIT) SITE2014-79 IA2014-111 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
SITE2014-79 IA2014-111 pp.227-232 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:25 |
Hokkaido |
San-Refure Hakodate |
Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2) Hiroyuki Inaba, Takuto Tamai (Kyoto Inst. of Tech.) ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39 |
In recent years, a lot of incident of password leakage by illegal access occurs frequently, therefore a password list at... [more] |
ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39 pp.275-280 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 13:50 |
Hokkaido |
San-Refure Hakodate |
Proposal on Fast Searchable Encryption Scheme Using Bloom Filter Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 |
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more] |
ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40 pp.281-286 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 12:55 |
Hokkaido |
|
Examination of IDS Log Analysis using Discrete Wavelet Transform Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16 |
With the spread of the Internet, the illegal access to the network is increasing. To overcome this prob-
lem, various t... [more] |
ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16 pp.27-32 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:50 |
Nara |
Todaiji Total Cultural Center |
Study on Cocktail Party Effect Personal Authentication System by Recognizing the Differnce of Voices Kosei Taketa, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-63 IA2012-101 |
Recently, personal authentications have been important because of the popularization of personal portable devices or ICc... [more] |
SITE2012-63 IA2012-101 pp.163-168 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 11:15 |
Nara |
Todaiji Total Cultural Center |
Proposal of Active IDS by Risk Level Probe Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102 |
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] |
SITE2012-64 IA2012-102 pp.169-174 |