Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS |
2022-04-21 14:30 |
Osaka |
Osaka University, and online (Primary: On-site, Secondary: Online) |
Improving accuracy of mobile position detection using millimeter-wave Ryohei Watanabe, Tomotsugu Asada, Yo Koide, Takayuki Maeda (JR Central), Motoki Morita (NEC), Koji Fukukawa (Nippon Signal) RCS2022-4 |
A position detection method of a mobile using wireless communication has been already established in past research. Howe... [more] |
RCS2022-4 pp.12-17 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
ISEC |
2021-05-19 13:25 |
Online |
Online |
Secure Chat and Storage Systems based on Searchable Encryption: Implementation and Evaluation Keita Emura, Sachiko Kanamori, Ryo Nojima (NICT), Yohei Watanabe (UEC/NICT) ISEC2021-5 |
(To be available after the conference date) [more] |
ISEC2021-5 pp.19-24 |
WBS, IT, ISEC |
2021-03-05 09:00 |
Online |
Online |
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62 |
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] |
IT2020-143 ISEC2020-73 WBS2020-62 pp.187-194 |
IN |
2019-01-22 10:00 |
Aichi |
WINC AICHI |
Sightseeing Spot Recommendation Based on Photographer's Preference Extracted from Sightseeing Photographs Hiroki Nakano, Komei Arasawa, Ryohei Watanabe, Shun Hattori (Muroran Inst. of Tech.) IN2018-80 |
Along with the spread of mobile terminal devices, the number of users who take pictures during traveling and post them t... [more] |
IN2018-80 pp.45-50 |
IN |
2019-01-22 10:25 |
Aichi |
WINC AICHI |
Searching the Web for Trivia Inducing Users' Interests by Starting with SNS Trends Junya Matsuda, Komei Arasawa, Ryohei Watanabe, Shun Hattori (Muroran Inst. of Tech.) IN2018-81 |
Trivia are one kind of knowledge about trashy things and trivial things etc., and almost always we do not care whether o... [more] |
IN2018-81 pp.51-56 |
IN |
2019-01-22 10:50 |
Aichi |
WINC AICHI |
Cooking Procedure Tag Extraction and Refinement for Video-attached Recipe Synthesizer from Cooking Videos Tatsuya Ohno, Komei Arasawa, Ryohei Watanabe, Shun Hattori (Muroran Inst. of Tech.) IN2018-82 |
In recent years, when we plan a meal or when a beginner cooks, we often search for recipes using the Internet and/or app... [more] |
IN2018-82 pp.57-62 |
IN |
2019-01-22 11:15 |
Aichi |
WINC AICHI |
Logical Failure Detection in Question-and-Answer Sessions Towards A Practical Mock Interview System Kohei Shimizu, Komei Arasawa, Ryohei Watanabe, Shun Hattori (Muroran Inst. of Tech.) IN2018-83 |
In job hunting, oral interviews are important examinations for job hunters to appeal to their targeted companies and for... [more] |
IN2018-83 pp.63-68 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 09:55 |
Hokkaido |
Sapporo Convention Center |
Truly Efficient Robust Secret Sharing for the Real World Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 |
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] |
ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 pp.1-8 |
IN |
2018-01-23 14:25 |
Aichi |
WINC AICHI |
Community Extraction Using Online Battle Data for Game AIs Capable to Infer Imperfect Information Ryohei Watanabe, Komei Arasawa, Shun Hattori (Muroran Inst. of Tech.) IN2017-87 |
In these days, playing video games competitively, called “e-sports,” is getting in fashion. But most of video games are ... [more] |
IN2017-87 pp.91-96 |
IT |
2017-09-08 13:00 |
Yamaguchi |
Centcore Yamaguchi Hotel |
[Invited Talk]
Broadcast Encryption with Information Theoretic Security
-- Classical Results and Recent Progress -- Yohei Watanabe (UEC) IT2017-44 |
Information-theoretically secure cryptographic protocols have become increasingly important due to progress of quantum c... [more] |
IT2017-44 pp.31-36 |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |