Communication-Communication Systems(Date:2015/07/02)

Presentation
Proposals of K(AI), K(AII) and K(AIII)Schemes for augmenting code-based PKC, product-sum type PKC and multivariate PKC

Masao Kasahara(Waseda Univ./Chuo Univ.),  

[Date]2015-07-02
[Paper #]ISEC2015-13,SITE2015-11,ICSS2015-23,EMM2015-21
Secure and Robust Image Identification Based on Fuzzy Commitment Scheme for JPEG Image

Kenta Iida(Tokyo Metro Univ.),  Sayaka Shiota(Tokyo Metro Univ.),  Hitoshi Kiya(Tokyo Metro Univ.),  

[Date]2015-07-02
[Paper #]ISEC2015-19,SITE2015-17,ICSS2015-29,EMM2015-27
Making RAW Video and Novel Video Watermarking System

Natsuki Kokui(TUS),  Hyunho Kang(TUS),  Keiichi Iwamura(TUS),  

[Date]2015-07-02
[Paper #]ISEC2015-20,SITE2015-18,ICSS2015-30,EMM2015-28
Study of the color articial fiber pattern for Augmented Reality(AR)

Wakana Tomita(TUS),  Kitahiro Kanada(OPU),  Keiichi Iwamura(TUS),  

[Date]2015-07-02
[Paper #]ISEC2015-21,SITE2015-19,ICSS2015-31,EMM2015-29
Attribute-Based Two-Tier Signatures

Hiroaki Anada(ISIT),  Seiko Arita(IISEC),  Kouichi Sakurai(Kyushu University),  

[Date]2015-07-02
[Paper #]ISEC2015-9,SITE2015-7,ICSS2015-19,EMM2015-17
On the Security of SAPAKE

SeongHan Shin(AIST),  Kazukuni Kobara(AIST),  

[Date]2015-07-02
[Paper #]ISEC2015-10,SITE2015-8,ICSS2015-20,EMM2015-18
Chosen Initial Vector Attack against Pseudorandom Number Generator QP-DYN

Kenichi Arai(Tokyo Univ of Science),  Yasutaka Igarashi(Tokyo Univ of Science),  Toshinobu Kaneko(Tokyo Univ of Science),  

[Date]2015-07-02
[Paper #]ISEC2015-11,SITE2015-9,ICSS2015-21,EMM2015-19
On the Comprehensive Consent in the utilization of personal information

Takushi Otani(Kibi International Univ.),  

[Date]2015-07-02
[Paper #]
Information Security in National Identification Number called My Number in Japan

Takeshi Niiyama(Doshisha Univ.),  Toshiro Kita(Doshisha Univ.),  

[Date]2015-07-02
[Paper #]ISEC2015-12,SITE2015-10,ICSS2015-22,EMM2015-20
Study on Application of Measure Behavior Intention Model for Information Security into Security Action Cyc

Noriaki Yoshikai(Nihon Univ.),  

[Date]2015-07-02
[Paper #]ISEC2015-16,SITE2015-14,ICSS2015-26,EMM2015-24
Survey:automated moral judgment

Yuko Murakami(Tohoku U),  

[Date]2015-07-02
[Paper #]ISEC2015-17,SITE2015-15,ICSS2015-27,EMM2015-25
Experimental Analysis of Path ORAM in Practical Implementation

Karin Sumongkayothin(JAIST),  Atsuko Miyaji(JAIST),  Chunhua Su(JAIST),  Steve Gordon(SIIT),  

[Date]2015-07-02
[Paper #]ISEC2015-15,SITE2015-13,ICSS2015-25,EMM2015-23
Security Analysis of AONT-based Regenerating Codes

Hidenori Kuwakado(Kansai Univ.),  Masazumi Kurihara(Univ. of Electro-Communications),  

[Date]2015-07-02
[Paper #]ISEC2015-14,SITE2015-12,ICSS2015-24,EMM2015-22
Development of an educational material using an injurious scenario regarding the moral rights and its trial

Takako Nabeshima(Tokyo Gakugei Univ.),  Youzou Miyadera(Tokyo Gakugei Univ.),  Atsuo Hazeyama(Tokyo Gakugei Univ.),  Yoshimi Tanaka(Tokyo Gakugei Univ.),  

[Date]2015-07-02
[Paper #]ISEC2015-18,SITE2015-16,ICSS2015-28,EMM2015-26
On Anxiety Factors in Indirect Use for Cloud Type Medical Systems

Youji Fukuta(Aichi Univ. of Educ.),  Yoshiaki Shiraishi(Kobe Univ.),  Masanori Hirotomo(Saga Univ.),  Masami Mohri(Gifu Univ.),  

[Date]2015-07-03
[Paper #]ISEC2015-24,SITE2015-22,ICSS2015-34,EMM2015-32
Report on Workshop on Cybersecurity in a Post-Quantum World

Takanori Yasuda(ISIT),  Tsuyoshi Takagi(Kyushu Univ.),  

[Date]2015-07-03
[Paper #]ISEC2015-22,SITE2015-20,ICSS2015-32,EMM2015-30
Proposal of Accelerating XL algorithm by Assigning Constants to Variables

Masahito Gotaishi(Chuo Univ.),  Shigeo Tsujii(Chuo Univ.),  

[Date]2015-07-03
[Paper #]ISEC2015-23,SITE2015-21,ICSS2015-33,EMM2015-31