Engineering Sciences/NOLTA-Information Security(Date:2014/11/14)

Presentation
表紙

,  

[Date]2014/11/14
[Paper #]
目次

,  

[Date]2014/11/14
[Paper #]
Accelerating QUAD Stream Cipher using Multi-Stream Method on Graphics Processing Unit

Satoshi TANAKA,  Chen-Mou CHENG,  Takanori YASUDA,  Kouichi SAKURAI,  

[Date]2014/11/14
[Paper #]ISEC2014-56,SITE2014-47,LOIS2014-26
Extension of NTRU using Non-commutative Groups II

Takanori YASUDA,  Xavier DAHAN,  Kouichi SAKURAI,  

[Date]2014/11/14
[Paper #]ISEC2014-57,SITE2014-48,LOIS2014-27
Card-based Generation of Random Permutations without Fixed Points

Rie ISHIKAWA,  Eikoh CHIDA,  Takaaki MIZUKI,  

[Date]2014/11/14
[Paper #]ISEC2014-58,SITE2014-49,LOIS2014-28
Elliptic Curves subjected to the GHS Attack over Prime Degree Extension Fields in Odd Characteristic

Tsutomu IIJIMA,  Jinhui CHAO,  

[Date]2014/11/14
[Paper #]ISEC2014-59,SITE2014-50,LOIS2014-29
Estimating situations of a room using presence sensing log

Yuki KASHIO,  Shinsuke MATSUMOTO,  Sachio SAIKI,  Masahide NAKAMURA,  

[Date]2014/11/14
[Paper #]ISEC2014-60,SITE2014-51,LOIS2014-30
Proposal of the measure behavior intention model in measure against a computer virus

Sho HAMATSU,  Noriaki YOSHIKAI,  Shun-ichi KURINO,  

[Date]2014/11/14
[Paper #]ISEC2014-61,SITE2014-52,LOIS2014-31
Study on Network Community Analysis : High Speed Computing Algorithm and it's Characteristics

Mayako SATO,  Noriaki YOSHIKAI,  Shun-ichi KURINO,  

[Date]2014/11/14
[Paper #]ISEC2014-62,SITE2014-53,LOIS2014-32
An approach to assess the risk ofinformation leakage by inference : A pilot study of a visualization tool and an algorithm using local connectivity in digraphs

Kazuhiro SUZUKI,  Haruka UCHIMA,  Miki KONDO,  

[Date]2014/11/14
[Paper #]ISEC2014-63,SITE2014-54,LOIS2014-33
Hands-free voice command input system using voice power adapted standard patterns

Yuji YOSHIDA,  Hiroyuki NISHI,  Yoshimasa KIMURA,  Toshio KAKINOKI,  

[Date]2014/11/14
[Paper #]ISEC2014-64,SITE2014-55,LOIS2014-34
Interactive System for Supporting Decision of Transportation Path According to User's Preference

Eko SAKAI,  Ken NAKAYAMA,  

[Date]2014/11/14
[Paper #]ISEC2014-65,SITE2014-56,LOIS2014-35
Behavior Prediction from Lifelog Data Using A Virtual Communiation-Network System

Yusuke OMORI,  Ryoichi SHINKUMA,  Kazuhiro YAMAGUCHI,  Tatsuro TAKAHASHI,  

[Date]2014/11/14
[Paper #]ISEC2014-66,SITE2014-57,LOIS2014-36
Improving certificate validation in SSL/TLS implementations

Satoshi KAMEKAWA,  Atsuko MIYAJI,  Yuichi FUTA,  

[Date]2014/11/14
[Paper #]ISEC2014-67,SITE2014-58,LOIS2014-37
How to Utilize Location Information for Distinguishing Users

Takuya FUNAKOSHI,  Masahiro MAMBO,  

[Date]2014/11/14
[Paper #]ISEC2014-68,SITE2014-59,LOIS2014-38
複写される方へ

,  

[Date]2014/11/14
[Paper #]
Reprographic Reproduction outside Japan

,  

[Date]2014/11/14
[Paper #]
奥付

,  

[Date]2014/11/14
[Paper #]
裏表紙

,  

[Date]2014/11/14
[Paper #]