Engineering Sciences/NOLTA-Social Implications of Technology and Information Ethics(Date:2019/07/23)

Presentation
Electromagnetic Analysis Attacks on an ASIC Implementation of a Ring-Oscillator PUF

Mitsuru Shiozaki(Ritsumeikan Univ.),  Takeshi Fujino(Ritsumeikan Univ.),  

[Date]2019-07-24
[Paper #]ISEC2019-39,SITE2019-33,BioX2019-31,HWS2019-34,ICSS2019-37,EMM2019-42
Anonymous Public-Key Certificates based on Elliptic Curve

Kazuomi Oishi(SIST),  

[Date]2019-07-24
[Paper #]ISEC2019-53,SITE2019-47,BioX2019-45,HWS2019-48,ICSS2019-51,EMM2019-56
Server Configuration Training Including Vulnerability Assessment and Remediation process

Daisuke Suzuki(Hokuriku Univ.),  

[Date]2019-07-24
[Paper #]ISEC2019-44,SITE2019-38,BioX2019-36,HWS2019-39,ICSS2019-42,EMM2019-47
Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage

Shugo Kaji(NAIST),  Masahiro Kinugawa(NIT),  Daisuke Fujimoto(NAIST),  Yu-ichi Hayashi(NAIST),  

[Date]2019-07-24
[Paper #]ISEC2019-40,SITE2019-34,BioX2019-32,HWS2019-35,ICSS2019-38,EMM2019-43
Development of the Ethics Assessment for Research & Innovation Guidelines under the SATORI project in Europe (1)

Takushi Otani(Kibi International Univ.),  Hirotaka Osawa(Tsukuba Univ.),  Minao Kukita(Nagoya Univ.),  Reina Saijo(Kyoto Univ.),  

[Date]2019-07-24
[Paper #]ISEC2019-51,SITE2019-45,BioX2019-43,HWS2019-46,ICSS2019-49,EMM2019-54
Recording device identification based on audio distortion depending on system-on-chip

Akira Nishimura(Tokyo Univ. Info. Sci.),  

[Date]2019-07-24
[Paper #]ISEC2019-48,SITE2019-42,BioX2019-40,HWS2019-43,ICSS2019-46,EMM2019-51
Investigation on Blockchain-based Malware Information Sharing Method in Malware Detection System

Ryusei Fuji(Univ. of Miyazaki),  Shotaro Usuzaki(Univ. of Miyazaki),  Kentaro Aburada(Univ. of Miyazaki),  Hisaaki Yamaba(Univ. of Miyazaki),  Tetsuro Katayama(Univ. of Miyazaki),  Mirang Park(Kanagawa Inst. of Tech.),  Norio Shiratori(Chuo Univ.),  Naonobu Okazaki(Univ. of Miyazaki),  

[Date]2019-07-24
[Paper #]ISEC2019-45,SITE2019-39,BioX2019-37,HWS2019-40,ICSS2019-43,EMM2019-48
SecureHID: Securing the USB Interface

Jan Goette(Waseda Univ.),  Naoto Yanai(Osaka Univ.),  Tatsuya Mori(Waseda Univ.),  

[Date]2019-07-24
[Paper #]ISEC2019-35,SITE2019-29,BioX2019-27,HWS2019-30,ICSS2019-33,EMM2019-38
Automatic Node Manipulation System for Active Monitoring Environment

Shingo Yasuda(NICT),  Nobuyuki Kanaya(NICT),  Yu Tsuda(NICT),  Satoshi Ohta(NICT),  Ryosuke Miura(NICT),  Daisuke Inoue(NICT),  

[Date]2019-07-24
[Paper #]ISEC2019-46,SITE2019-40,BioX2019-38,HWS2019-41,ICSS2019-44,EMM2019-49
A Study on Suppression of Inappropriate Use of Illegal Contents Based on Conformity Caused by Normative Influence

Hiroki Yamaguchi(Kansai Univ.),  Kazuhiro Kono(Kansai Univ.),  

[Date]2019-07-24
[Paper #]ISEC2019-47,SITE2019-41,BioX2019-39,HWS2019-42,ICSS2019-45,EMM2019-50
<<123 41-50hit(50hit)