Engineering Sciences/NOLTA-Information Security(Date:2013/07/11)

Presentation
Supportive Techniques for Masking Sensitive Information in Unstructured Text

Takanori OIKAWA,  Ikuya MORIKAWA,  Kouichi ITO,  Hiroshi TSUDA,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.19,Vol.2013-SPT-6 No.19
細粒度の情報追跡による機密情報送信の動的制御手法(セキュリティ,一般)

,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.20,Vol.2013-SPT-6 No.20
Static Analysis for Highlighting what Android Application does with Permissions

TAKUYA SAKASHITA,  SHINPEI OGATA,  HARUHIKO KAIYA,  KENJI KAIJIRI,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.21,Vol.2013-SPT-6 No.21
A Permission Switching Method based on the Execution Context in Android

SHOTA HIOKI,  SHOICHI SAITO,  KOICHI MOURI,  HIROSHI MATSUO,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.22,Vol.2013-SPT-6 No.22
Dynamic Permission Control to Prevent Unexpected Information Leakage on Android

KANAKO WATANABE,  YUTO OTSUKI,  EIJI TAKIMOTO,  SHOICHI SAITO,  KOICHI MOURI,  

[Date]2013/7/11
[Paper #]Vol.2013-CSEC-62 No.23,Vol.2013-SPT-6 No.23
An Evaluation on Controlling File Size Increase in the Image Partial Scrambling Technique Enabled Quantitative Degradation Degree Control by Exchanging DCT Coefficients

Shingo SHIMAURA,  Syouhei HARADA,  Seok KANG,  Yuji SAKAMOTO,  

[Date]2013/7/11
[Paper #]ISEC2013-22,SITE2013-17,ICSS2013-27,EMM2013-24
Optimization and Information Hiding Techniques of PDF Files for Electronic Display Devices

Toshio MODEGI,  

[Date]2013/7/11
[Paper #]ISEC2013-23,SITE2013-18,ICSS2013-28,EMM2013-25
Wonder Search : An iPhone application for Application Search Based on an improved Ring-structured Graphical Search Interface

Tomoko KAJIYAMA,  

[Date]2013/7/11
[Paper #]ISEC2013-24,SITE2013-19,ICSS2013-29,EMM2013-26
Education for IT Engineers from the Viewpoint of Information Security(Panel Discussion)

Naofumi AOKI,  Takahashi Kumi MITANI,  Manami FUJIMARU,  Takahisa KISHIYA,  Junpei TSUJI,  Tomohiro TAKAHASHI,  

[Date]2013/7/11
[Paper #]ISEC2013-25,SITE2013-20,ICSS2013-30,EMM2013-27
A Hierarchical Access Control Method by the Secret Sharing Scheme

Takashi KURAKAMI,  Masaaki FUJIYOSHI,  Hitoshi KIYA,  

[Date]2013/7/11
[Paper #]ISEC2013-26,SITE2013-21,ICSS2013-31,EMM2013-28
A Content Protection Method Using Secret Sharing and Attribute-Based Encryption

Katsuma TAKIMOTO,  Masaaki FUJIYOSHI,  Shoko IMAIZUMI,  Hitoshi KIYA,  

[Date]2013/7/11
[Paper #]ISEC2013-27,SITE2013-22,ICSS2013-32,EMM2013-29
Implementation and Evaluation of an error correction code suitable for the information hiding method using the single-dot method

Hiroyasu Kitazawa,  Kitahiro KANEDA,  Keiichi IWAMURA,  Isao ECHIZEN,  

[Date]2013/7/11
[Paper #]ISEC2013-28,SITE2013-23,ICSS2013-33,EMM2013-30
Study of an artificial fiber pattern for Augmented Reality system

Tomoki INUI,  Kitahiro KANEDA,  Keiichi IWAMURA,  Isao ETIZEN,  

[Date]2013/7/11
[Paper #]ISEC2013-29,SITE2013-24,ICSS2013-34,EMM2013-31
Image Restoration Using Embedding of Similar Region Information

Kazuki YAMATO,  Kazuma SHINODA,  Madoka HASEGAWA,  Shigeo KATO,  Yuichi TANAKA,  

[Date]2013/7/11
[Paper #]ISEC2013-30,SITE2013-25,ICSS2013-35,EMM2013-32
On a Data-Hiding Technique Based on Complete Complementary Codes

Ryusuke MAYUZUMI,  Tetsuya KOJIMA,  

[Date]2013/7/11
[Paper #]ISEC2013-31,SITE2013-26,ICSS2013-36,EMM2013-33
Study on Speech Watermarking Based on Modifications to LSFs for Tampering Detection

Shengbei WANG,  Masashi UNOKI,  

[Date]2013/7/11
[Paper #]ISEC2013-32,SITE2013-27,ICSS2013-37,EMM2013-34
An Approach to Amplitude Scaling Partial Encryption for Compressed Audio

Twe Ta Oo,  Takao ONOYE,  Kilho SHIN,  

[Date]2013/7/11
[Paper #]ISEC2013-33,SITE2013-28,ICSS2013-38,EMM2013-35
Research on Information and Physical Security Technologies for Embedded Systems(Invited Talk)

Tsutomu MATSUMOTO,  

[Date]2013/7/11
[Paper #]ISEC2013-34,SITE2013-29,ICSS2013-39,EMM2013-36
A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange

Yukou KOBAYASHI,  Naoto YANAI,  Takashi NISHIDE,  Eiji OKAMOTO,  

[Date]2013/7/11
[Paper #]ISEC2013-35,SITE2013-30,ICSS2013-40,EMM2013-37
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol

Daisuke MORIYAMA,  

[Date]2013/7/11
[Paper #]ISEC2013-36,SITE2013-31,ICSS2013-41,EMM2013-38
<<1234>> 21-40hit(69hit)