Engineering Sciences/NOLTA-Information Security(Date:2019/03/07)

Password for Prevention of Shoulder Surfing by Rear-Facing Camera

Shota Ushiyachi(Tokyo Univ. of Tech.),  Ryuya Uda(Tokyo Univ. of Tech.),  

[Paper #]IT2018-75,ISEC2018-81,WBS2018-76
Innovations, σ-Fields, and Martingales Associated with Viterbi Decoding of Convolutional Codes

Masato Tajima(*),  

[Paper #]IT2018-98,ISEC2018-104,WBS2018-99
Evaluation of a Probability Approximation Method for ANS with Multi-ary Sources

Leonardo Inoue(Gunma Univ.),  Hidetoshi Yokoo(Gunma Univ.),  

[Paper #]IT2018-93,ISEC2018-99,WBS2018-94
Coded caching and a subspace based on the distribution of the number of requests

Masazumi Kurihara(UEC),  

[Paper #]IT2018-99,ISEC2018-105,WBS2018-100
Studies on evaluating system for shortened RS code of q-ary linear block codes based on q-input q×R-output symmetric channels

Keiji Shirakawa(UEC),  Kyoshiro Furuya(UEC),  Kazuhiko Yamaguchi(UEC),  

[Paper #]IT2018-100,ISEC2018-106,WBS2018-101
Exploring Malicious URL in Dark Web Using Tor Crawler

Yuki Kawaguchi(Kobe Univ.),  Seiichi Ozawa(Kobe Univ.),  

[Paper #]IT2018-76,ISEC2018-82,WBS2018-77
A New Variation of Asymmetric Numeral Systems

Qi Xin(Gunma Univ.),  Hidetoshi Yokoo(Gunma Univ.),  

[Paper #]IT2018-94,ISEC2018-100,WBS2018-95
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity

Shoya Ogaki(Univ. Kitakyushu),  Shunsuke Araki(Kyutech),  Takeru Miyazaki(Univ. Kitakyushu),  Satoshi Uehara(Univ. Kitakyushu),  Yasuyuki Nogami(Okayama Univ.),  

[Paper #]IT2018-84,ISEC2018-90,WBS2018-85
Coherence-based Spoken Machine Translation Recognition: Towards an Efficient Gateway to Detect Untrusted Information

Nguyen Son Hoang Quoc(KDDI Research),  Tran Phuong Thao(KDDI Research),  Seira Hidano(KDDI Research),  Shinsaku Kiyomoto(KDDI Research),  

[Paper #]IT2018-77,ISEC2018-83,WBS2018-78
A study on dimming control scheme for visible-light communication using modified prime sequence codes

Ryo Kawamoto(Polytechnic Univ.),  Yuto Doi(Polytechnic Univ.),  Kenmu Kamimura(Polytechnic Univ.),  Shinichiro Miyazaki(Polytechnic Univ.),  Kotoku Omura(Polytechnic Univ.),  Tomoko K. Matsushima(Polytechnic Univ.),  Shoichiro Yamasaki(Polytechnic Univ.),  

[Paper #]IT2018-97,ISEC2018-103,WBS2018-98
[Invited Talk] Deepning and evolution of Deep learning technology

Hayaru Shouno(UEC),  

[Paper #]IT2018-88,ISEC2018-94,WBS2018-89
An Implementation and Evaluation of Pairing Library ELiPS for BLS Curve with Several Techniques

Yuto Takahashi(Okayama Univ.),  Tadaki Kanenari(Okayama Univ.),  Yuki Nanjo(Okayama Univ.),  Md. Al-Amin Khandaker(Okayama Univ.),  Takuya Kusaka(Okayama Univ.),  Yasuyuki Nogami(Okayama Univ.),  

[Paper #]IT2018-78,ISEC2018-84,WBS2018-79
A Consideration of the Properties of Edwards Curve Whose Order is a Power of 2

Hiromasa Miura(Okayama Univ.),  Kazuya Kobayashi(Okayama Univ.),  Takuya Kusaka(Okayama Univ.),  Yasuyuki Nogami(Okayama Univ.),  

[Paper #]IT2018-79,ISEC2018-85,WBS2018-80
Steganography for character strings by using deep learning

Takayuki Masui(Kanagawa Univ.),  Taiki Shigeta(Graduate School, Kanagawa Univ.),  Hikaru Morita(Kanagawa Univ.),  

[Paper #]IT2018-82,ISEC2018-88,WBS2018-83
Steganography for images by using deep learning

Taiki Shigeta(Graduate Schoool, Kanagawa Univ),  Hikaru Morita(Graduate Schoool, Kanagawa Univ),  

[Paper #]IT2018-83,ISEC2018-89,WBS2018-84
A Two-Step LZY Code by Excluding the Nodes Which Will Not be Used from the Candidate Set

Mitsuharu Arimnura(Shonan Inst. Tech.),  

[Paper #]IT2018-92,ISEC2018-98,WBS2018-93
On Multiterminal Hypothesis Testing Problem

Yasutada Oohama(UEC),  

[Paper #]IT2018-90,ISEC2018-96,WBS2018-91
String commitment with output locality

Hideaki Miyaji(OU),  Akinori Kawachi(OU),  Atsuko Miyaji(OU),  

[Paper #]IT2018-85,ISEC2018-91,WBS2018-86
Identification Scheme Based on the Hardness of Ideal Lattice Problems in all Rings.

Kaoru Takemure(UEC),  Bagus Santoso(UEC),  

[Paper #]IT2018-81,ISEC2018-87,WBS2018-82
A New Family of Isomorphism of Polynomials and Its Application to Public Key Encryption Scheme

Bagus Santoso(UEC),  

[Paper #]IT2018-80,ISEC2018-86,WBS2018-81
123>> 1-20hit(54hit)