Engineering Sciences/NOLTA-Information Security(Date:2018/03/08)

Presentation
Succinct Oblivious RAM

Taku Onodera(IMSUT),  Tetsuo Shibuya(IMSUT),  

[Date]2018-03-08
[Paper #]IT2017-119,ISEC2017-107,WBS2017-100
[Invited Talk] On Traitor Tracings and Related Topics

Shota Yamada(AIST),  

[Date]2018-03-08
[Paper #]IT2017-114,ISEC2017-102,WBS2017-95
High Efficient Scalar Multiplication in Elliptic Curve Cryptography

Noboru Takeuchi(TUT),  Toshiyuki Kinoshita(TUT),  

[Date]2018-03-08
[Paper #]IT2017-120,ISEC2017-108,WBS2017-101
Evaluation of deep learning method for detection of intrusion packets

Tomoki Ueno(GIFU Univ),  Mitiko Harayama(GIFU Univ),  

[Date]2018-03-08
[Paper #]IT2017-122,ISEC2017-110,WBS2017-103
The Access Structure of a Secret Sharing Scheme Using Locally Repairable Codes

Masanobu Nakata(Tokyo Tech),  Tomohiko Uyematsu(Tokyo Tech),  Tetsunao Matsuta(Tokyo Tech),  

[Date]2018-03-08
[Paper #]IT2017-107,ISEC2017-95,WBS2017-88
Outage Capacity of a Two-User MIMO Interference Channel for Simultaneous Information and Energy Transfer

Kengo Ikebata(Tokyo Tech),  Tomohiko Uyematsu(Tokyo Tech),  Ryutaroh Matsumoto(Nagoya Univ),  Tetsunao Matsuta(Tokyo Tech),  

[Date]2018-03-08
[Paper #]IT2017-110,ISEC2017-98,WBS2017-91
Effect on randomizing components to the security of Minalpher

Yuki Kishi(Kanagawa Univ),  Keita Osafune(Kanagawa Univ),  Yuta Kuwano(Kanagawa Univ),  Taroh Sasaki(Kanagawa Univ),  Atsushi Fujioka(Kanagawa Univ),  

[Date]2018-03-08
[Paper #]IT2017-117,ISEC2017-105,WBS2017-98
Digital watermark using deep-learning classification

Mashu Sakai(Kanagawa Univ.),  Taiki Shigeta(Kanagawa Univ.),  Hikaru Morita(Kanagawa Univ.),  

[Date]2018-03-08
[Paper #]IT2017-121,ISEC2017-109,WBS2017-102
Shifted Coded Slotted ALOHA

Tomokazu Emoto(Yamaguchi Univ.),  Takayuki Nozaki(Yamaguchi Univ.),  

[Date]2018-03-08
[Paper #]IT2017-113,ISEC2017-101,WBS2017-94
Evaluation of the Worst-Case Redundancy of Strongly Universal FV Source Codes Using the Source Approximation and the Asymptotically Sufficient Statistic

Mitsuharu Arimura(Shonan Inst. Tech.),  Hiroshi Nagaoka(Univ. of Electro-Comm.),  

[Date]2018-03-08
[Paper #]IT2017-106,ISEC2017-94,WBS2017-87
A study on hierarchical secret sharing schemes applicable to any level based on XOR operations

Koji Shima(IISEC),  Hiroshi Doi(IISEC),  

[Date]2018-03-08
[Paper #]IT2017-118,ISEC2017-106,WBS2017-99
Information Geometrical Study of Cluster-Model Approximation for Boltzmann Machines

Kenta Toyoda(Univ. of Electro- Commu.),  Tomohiro Ogawa(Univ. of Electro- Commu.),  

[Date]2018-03-08
[Paper #]IT2017-104,ISEC2017-92,WBS2017-85
Constructions of the (3,n) and (4,n) Threshold Visual Cryptography Using Combinatorial Designs and Their Performance Evaluation

Kotaro Okada(Univ. of Tsukuba),  Hiroki Koga(Univ. of Tsukuba),  

[Date]2018-03-08
[Paper #]IT2017-109,ISEC2017-97,WBS2017-90
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations

Hibiki Ono(Kogakuin Univ.),  Yoshifumi Manabe(Kogakuin Univ.),  

[Date]2018-03-08
[Paper #]IT2017-124,ISEC2017-112,WBS2017-105
Optimality for the Iterative Construction Scheme of AIFV-$m$ codes

Ryusei Fujita(Univ. of Fukui),  Ken-ichi Iwata(Univ. of Fukui),  Hirosuke Yamamoto(The Univ. of Tokyo),  

[Date]2018-03-08
[Paper #]IT2017-111,ISEC2017-99,WBS2017-92
Reply analysis between Twitter users using machine learning

Takakuwa Ranka(KU),  Sasaki Taroh(KU),  Fujioka Atsushi(KU),  

[Date]2018-03-08
[Paper #]IT2017-123,ISEC2017-111,WBS2017-104
Evaluation of Bayes Predictive Distributions under Unknown Parametric Models on Misspecified Models

Hirokazu Kono(Waseda Univ.),  Shota Saito(Waseda Univ.),  Toshiyasu Matsushima(Waseda Univ.),  

[Date]2018-03-08
[Paper #]IT2017-103,ISEC2017-91,WBS2017-84
Construction of Secret Sharing Schemes with Small Thresholds for Countably Infinite Participants

Takashi Hisatome(Univ. Tsukuba),  Hiroki Koga(Univ. Tsukuba),  

[Date]2018-03-08
[Paper #]IT2017-108,ISEC2017-96,WBS2017-89
[Invited Talk] On fast multiplications of multiple-valued logic polynomials by discrete Fourier transforms

Hajime Matsui(Toyota Technological Institute),  

[Date]2018-03-08
[Paper #]IT2017-116,ISEC2017-104,WBS2017-97
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors

Youhei Shimizu(Kanagawa Univ),  Yuki Kishi(Kanagawa Univ),  Taroh Sasaki(Kanagawa Univ),  Atsushi Fujioka(Kanagawa Univ),  

[Date]2018-03-08
[Paper #]IT2017-125,ISEC2017-113,WBS2017-106
123>> 1-20hit(50hit)