Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2014/06/26)

Presentation
Datasets for Anti-Malware Research : MWS Datasets 2014

,  

[Date]2014/6/26
[Paper #]
Authentication for Mobile Devices Using Behavioral Biometrics with Adaptive Templates

Shigeki KARITA,  Kumi NAKAMURA,  Kazuhiro KONO,  Yoshimichi ITO,  Noboru BABAGUCHI,  

[Date]2014/6/26
[Paper #]ISEC2014-21,SITE2014-16,ICSS2014-25,EMM2014-21
A proposal of authentication methods against shoulder surfing using a sub channel

Akira Aratani,  Atsushi Kanai,  

[Date]2014/6/26
[Paper #]ISEC2014-22,SITE2014-17,ICSS2014-26,EMM2014-22
Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method

Shimon MACHIDA,  Tomoko KAJIYAMA,  Shigeru SHIMADA,  Isao ECHIZEN,  

[Date]2014/6/26
[Paper #]ISEC2014-23,SITE2014-18,ICSS2014-27,EMM2014-23
A quantification method of the degree of personal information disclosure using statistical data

Tomoyasu SHIRAYAMA,  Atsushi KANAI,  

[Date]2014/6/26
[Paper #]ISEC2014-24,SITE2014-19,ICSS2014-28,EMM2014-24
Data authentication scheme suitable for broadcast in the sensor networks

Akihito SAKAI,  Yuichi KAJI,  Minoru ITO,  

[Date]2014/6/26
[Paper #]ISEC2014-25,SITE2014-20,ICSS2014-29,EMM2014-25
Forward-Secure Sequential Aggregate Message Authentication Revisited

Shoichi Hirose,  Hidenori Kuwakado,  

[Date]2014/6/26
[Paper #]ISEC2014-26,SITE2014-21,ICSS2014-30,EMM2014-26
On the Standardization of Information Security : ISO/IEC JTC1/SC27/WG2 Report on the Hong Kong Meeting in April, 2014

Atsuko MIYAJI,  Takeshi CHIKAZAWA,  Toshio TATSUTA,  Kenji OHKUMA,  Hajime WATANABE,  Shin'ichiro MATSUO,  

[Date]2014/6/26
[Paper #]ISEC2014-27,SITE2014-22,ICSS2014-31,EMM2014-27
How to Construct PRNGs for distributed Cloud Databases

JIAGENG CHEN,  ATSUKO MIYAJI,  CHUNHUA SU,  

[Date]2014/6/26
[Paper #]
KVMにおける機密情報の拡散追跡機能の設計

,  

[Date]2014/6/26
[Paper #]
The Relation on Sense of Security and Consent for an Information System and Service

KAORI OKUMURA,  MASAMI MOHRI,  YOSHIAKI SHIRAISHI,  AKIRA IWATA,  

[Date]2014/6/26
[Paper #]
プライバシに配慮したデータ処理技術の研究動向 : EDBT2014参加報告

,  

[Date]2014/6/26
[Paper #]
Privacy Invasion and the Concept of the "Digital Person" : Understanding Based on Information Ethics and Goffman's Dramaturgy Theory

Takushi Otani,  

[Date]2014/6/26
[Paper #]ISEC2014-28,SITE2014-23,ICSS2014-32,EMM2014-28
Comparison on Personal Information Protection Ordinates of Prefectures and Government-Designated Cities

Arata ITO,  Tetsutaro UEHARA,  

[Date]2014/6/26
[Paper #]ISEC2014-29,SITE2014-24,ICSS2014-33,EMM2014-29
Problems Concerning the Digitization of the Japanese Government Authorized Textbooks : Study of Open Access and Free License of the Digital Textbooks

Takahiro HAGA,  Tsugumasa Suzuki,  Takushi OTANI,  

[Date]2014/6/26
[Paper #]ISEC2014-30,SITE2014-25,ICSS2014-34,EMM2014-30
Information Ethics in Interdiscplinarity : Codes of Ethics and Belief Revision

Yuko MURAKAMI,  

[Date]2014/6/26
[Paper #]ISEC2014-31,SITE2014-26,ICSS2014-35,EMM2014-31
On Hidden Credential Retrieval

SeongHan SHIN,  Kazukuni KOBARA,  

[Date]2014/6/26
[Paper #]ISEC2014-32,SITE2014-27,ICSS2014-36,EMM2014-32
Cryptanalysis of a matrix variant of NTRU

Takanori YASUDA,  Yuya YAMAGUCHI,  Xavier DAHAN,  Kouichi SAKURAI,  

[Date]2014/6/26
[Paper #]ISEC2014-33,SITE2014-28,ICSS2014-37,EMM2014-33
New Higher Order Differential Property of Piccolo

Naoki SHIBAYAMA,  Toshinobu KANEKO,  

[Date]2014/6/26
[Paper #]ISEC2014-34,SITE2014-29,ICSS2014-38,EMM2014-34
Quantitative Evaluation of the Key Information That is Learned through Timing Attack : The Contribution of Bucketing Technique for RSA Cryptosystem

Yasuyuki KOBAYASHI,  Yuichi KAJI,  Hiroyuki SEKI,  Minoru ITO,  

[Date]2014/6/26
[Paper #]ISEC2014-35,SITE2014-30,ICSS2014-39,EMM2014-35
<<123>> 21-40hit(57hit)