Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, LOIS |
2021-01-21 17:50 |
Online |
Online |
Reproduction of Malware Behavior by Using Windows API Call Logs
-- Support for Major Win32 APIs and State Restoration After the Reproduction -- Naoya Matsuda, Youji Fukuta (Kindai Univ.), Masanori Hirotomo (Saga Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICM2020-47 LOIS2020-35 |
The authors have been developing a prototype tool to reproduce of malware behavior by using Windows API call logs so th... [more] |
ICM2020-47 LOIS2020-35 pp.75-80 |
IT |
2020-09-04 11:35 |
Online |
Online |
A Secure Computation Protocal of Inner Product Using HQC Cryptosystem Taiga Nakayama, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IT2020-23 |
In big data analysis and data mining, confidential data such as personal information is included in the data to be handl... [more] |
IT2020-23 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-02 11:50 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Log Storing System Using Blockchain Takashi Ikeda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2019-73 |
[more] |
ICSS2019-73 pp.31-36 |
ICSS, IPSJ-SPT |
2020-03-03 15:40 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Effective single-sided RAMBleed Hiroki Nagahama (Kobe Univ), Makoto Takita (Univ of Hyogo), Masanori Hirotomo (Saga Univ), Masakatsu Morii (Kobe Univ) ICSS2019-91 |
There is a phenomenon called Rowhammer in which bit flip occurs in the neighboring row by repeatedly accessing the row o... [more] |
ICSS2019-91 pp.145-150 |
IT |
2018-12-18 16:35 |
Fukushima |
Spa Resort Hawaiians |
[Invited Talk]
Construction and Decoding of Codes over Symbol-Pair Read Channels Masanori Hirotomo (Saga Univ.), Makoto Takita, Masakatu Morii (Kobe Univ.) IT2018-34 |
In this paper, we explain construction and decoding of codes over symbol-pair red channels. [more] |
IT2018-34 pp.19-24 |
ICSS |
2018-11-22 10:50 |
Kagoshima |
|
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62 |
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] |
ICSS2018-62 pp.49-54 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
On the Ring Signature Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85 |
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] |
ICSS2017-85 pp.215-220 |
SIP, IT, RCS |
2018-01-23 16:25 |
Kagawa |
Sunport Hall Takamatsu |
Evaluation of Coded Caching Scheme in Multi-rate Wireless Network Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-102 SIP2017-110 RCS2017-316 |
The network load is increasing due to the spread of content distribution services.
Caching is known as a technique to r... [more] |
IT2017-102 SIP2017-110 RCS2017-316 pp.273-278 |
ICSS |
2017-11-21 09:30 |
Oita |
Beppu International Convention Center |
ICSS2017-42 |
[more] |
ICSS2017-42 pp.23-27 |
IT |
2017-09-08 15:50 |
Yamaguchi |
Centcore Yamaguchi Hotel |
Coded Caching for Hierarchical Networks with Different Number of Layers (II) Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2017-49 |
Coded caching is a technique to reduce network loads.
Recent works have discussed single-layer caching systems, but ma... [more] |
IT2017-49 pp.61-66 |
IA, ICSS |
2017-06-08 15:40 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7 |
[more] |
IA2017-7 ICSS2017-7 pp.37-42 |
ISEC, WBS, IT |
2017-03-09 13:35 |
Tokyo |
TOKAI University |
On the Design of Locally Repairable Codes Based on Code Modification Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-106 ISEC2016-96 WBS2016-82 |
Locally repairable codes (LRCs) are a class of codes designed for the local correction of erasures.
Locality and Availa... [more] |
IT2016-106 ISEC2016-96 WBS2016-82 pp.49-53 |
IT |
2016-09-02 10:00 |
Saga |
New Heartpia |
On Error Correction Capability of Irregular LDPC Codes under the Bit-Flipping Decoding Algorithm Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2016-35 |
The error-correction capability of LDPC codes for iterative decoding algorithms have been investigated. However, it is d... [more] |
IT2016-35 pp.7-12 |
ICSS, IA |
2016-06-06 15:00 |
Saga |
Saga University |
Development of Network Forensic System Using Filter Drivers Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) |
[more] |
|
ICSS, IA |
2016-06-07 13:00 |
Saga |
Saga University |
On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11 |
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] |
IA2016-11 ICSS2016-11 pp.57-62 |
IT |
2015-09-04 09:25 |
Ishikawa |
Hakusan Shobutei |
On the Decoding Problem of Algebraic Codes over Symbol-Pair Read Channels Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2015-35 |
In this paper, we discuss a decoding problem of algebraic codes over symbol-pair read channels.
The channels output ove... [more] |
IT2015-35 pp.7-12 |
IT |
2015-07-14 10:55 |
Tokyo |
Tokyo Institute of Technology |
Error Correction Capability of LDPC Codes Under the Bit-Flipping Decoding Algorithm Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2015-31 |
The error-correction capability of LDPC codes for iterative decoding algorithms have been investigated. However, it is d... [more] |
IT2015-31 pp.83-88 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-03 11:30 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
On Anxiety Factors in Indirect Use for Cloud Type Medical Systems Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32 |
We have conducted questionnaire survey for our university students in order to clarify anxiety factors in indirect use f... [more] |
ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32 pp.143-149 |
LOIS |
2015-03-05 09:40 |
Okinawa |
|
On a Decentralization Function for Deposited Data Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) LOIS2014-63 |
It is considered to be important that linkable anonymized data and its correspondence table between anonymous number and... [more] |
LOIS2014-63 pp.13-17 |
IT |
2014-09-19 09:25 |
Chiba |
|
On Decoding Method of Cyclic Codes over Symbol-Pair Read Channels Makoto Takita (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.) IT2014-42 |
Cassuto and Blaum proposed new error correcting codes which are called symbol-pair codes. They gave a coding framework f... [more] |
IT2014-42 pp.7-12 |