Communication-Communication Systems(Date:2016/07/14)

Presentation
On the Conditions for Successful RF Retroreflector Attacks

Haruka Hoshino(Waseda Univ.),  Masahiro Kinugawa(Sendai KOSEN),  Yuichi Hayashi(Tohoku Gakuin Univ.),  Tatsuya Mori(Waseda Univ.),  

[Date]2016-07-14
[Paper #]ISEC2016-23,SITE2016-17,ICSS2016-23,EMM2016-31
Evaluation of Clustering Analysis Based on Malware Traffic Model

Mitsuhiro Hatada(Waseda Univ./NTT Communications),  Tatsuya Mori(Waseda Univ.),  

[Date]2016-07-14
[Paper #]ISEC2016-24,SITE2016-18,ICSS2016-24,EMM2016-32
A Study of Employment of Error Correcting Codes for the Watermarking Scheme Considering the Characteristic of Noise

Shogo Shigemoto(Okayama Univ.),  Minoru Kuribayashi(Okayama Univ.),  Nobuo Funabiki(Okayama Univ.),  

[Date]2016-07-14
[Paper #]ISEC2016-13,SITE2016-7,ICSS2016-13,EMM2016-21
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing

Motoi Tanaka(KIT),  Hiroyuki Inaba(KIT),  

[Date]2016-07-14
[Paper #]ISEC2016-18,SITE2016-12,ICSS2016-18,EMM2016-26
Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time

Hiroaki Kuno(KIT),  Hiroyuki Inaba(KIT),  

[Date]2016-07-14
[Paper #]ISEC2016-19,SITE2016-13,ICSS2016-19,EMM2016-27
Safety Evaluation for Permutation-Based Image Encryption Schemes against Jigsaw Puzzle Solvers

Tatsuya Chuman(Tokyo Metro. Univ.),  Kenta Kurihara(Tokyo Metro. Univ.),  Hitoshi Kiya(Tokyo Metro. Univ.),  

[Date]2016-07-14
[Paper #]ISEC2016-17,SITE2016-11,ICSS2016-17,EMM2016-25
A Study of a Simple Model of Information Safety Education

Takahiro Haga(GSGU),  Akiko Igarashi(Uchida),  Katsurou Nishioka(UHD),  

[Date]2016-07-14
[Paper #]ISEC2016-20,SITE2016-14,ICSS2016-20,EMM2016-28
Study of an information extraction method using artificial fiber pattern with a clear ink

Yuki Matsue(TUS),  Kitahiro Kaneda(OPU),  Keiichi Iwamura(TUS),  Isao Echizen(NII),  

[Date]2016-07-14
[Paper #]ISEC2016-15,SITE2016-9,ICSS2016-15,EMM2016-23
Cyber security for Industrial control systems(ICS) in IoT era

Yuma Takayama(IsecG(MFE)),  Ichiro Koshijima(nitech),  Tomomi Aoyama(nitech),  

[Date]2016-07-14
[Paper #]ISEC2016-25,SITE2016-19,ICSS2016-25,EMM2016-33
Considerations of Some Obfuscated Operations on the Security of Watermarking Schemes under the Kerckhoffs' principle

Koichiro Yamashita(Okayama Univ.),  Minoru Kuribayashi(Okayama Univ.),  Nobuo Funabiki(Okayama Univ.),  

[Date]2016-07-14
[Paper #]ISEC2016-14,SITE2016-8,ICSS2016-14,EMM2016-22
Developing rules to transmit our intentions in Computer Mediated Communication

Nobuyuki Yoshinga(YPU),  

[Date]2016-07-14
[Paper #]ISEC2016-21,SITE2016-15,ICSS2016-21,EMM2016-29
Technique for Embedding Information by Constructing Protuberance With Inner Walls of Objects Fabricated With 3-D Printers

Kousuke Nakamura(Kanagawa Inst. Tech.),  Masahiro Suzuki(Kanagawa Inst. Tech.),  Youichi Takashima(NTT),  Hideyuki Torii(Kanagawa Inst. Tech.),  Kazutake Uehira(Kanagawa Inst. Tech.),  

[Date]2016-07-14
[Paper #]ISEC2016-16,SITE2016-10,ICSS2016-16,EMM2016-24
Investigation of Android Markets using Static Detector for Packed Applications

Hiroki Nakano(YNU),  Zhiyong Yang(YNU),  Hiroshi Mori(YNU),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2016-07-14
[Paper #]ISEC2016-26,SITE2016-20,ICSS2016-26,EMM2016-34
Privacy Problems and Social Relationships

Takushi Otani(Kibi International Univ.),  

[Date]2016-07-14
[Paper #]ISEC2016-22,SITE2016-16,ICSS2016-22,EMM2016-30
Improvement of Winternitz one time signature and its security proof

Yoshio Yatani(NAIST),  Jason Paul Cruz(NAIST),  Yuichi Kaji(NAIST),  

[Date]2016-07-15
[Paper #]ISEC2016-29,SITE2016-23,ICSS2016-29,EMM2016-37
Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation

Hui Zhao(Kyushu Univ.),  Kouichi Sakurai(Kyushu Univ.),  

[Date]2016-07-15
[Paper #]ISEC2016-31,SITE2016-25,ICSS2016-31,EMM2016-39
Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption

Go Ohtake(NHK),  Reihaneh Safavi-Naini(Univ. of Calgary),  Liang Feng Zhang(ShanghaiTech Univ.),  

[Date]2016-07-15
[Paper #]ISEC2016-30,SITE2016-24,ICSS2016-30,EMM2016-38
Efficient Discrete Gaussian Sampling on Constrained Devices

Yuki Tanaka(NEC),  Isamu Teranishi(NEC),  Kazuhiko Minematsu(NEC),  Yoshinori Aono(NICT),  

[Date]2016-07-15
[Paper #]ISEC2016-32,SITE2016-26,ICSS2016-32,EMM2016-40
Worst Case Short Lattice Point Enumeration on Block Reduced Bases

Atsushi Takayasu(Univ. Tokyo),  Noboru Kunihiro(Univ. Tokyo),  

[Date]2016-07-15
[Paper #]ISEC2016-33,SITE2016-27,ICSS2016-33,EMM2016-41
One-time pad chaotic cryptography using augmented Lorenz equations

Kenichiro Cho(Ritsmeikan Univ),  Takaya Miyano(Ritsmeikan Univ),  

[Date]2016-07-15
[Paper #]ISEC2016-27,SITE2016-21,ICSS2016-27,EMM2016-35
12>> 1-20hit(25hit)