Engineering Sciences/NOLTA-Information Theory(Date:2015/11/06)

Presentation
An approach to assess the risk of information leakage by inference

Kazuhiro Suzuki(Kochi Univ.),  Shohei Kitamura(Kochi Univ.),  Noriki Hirai(Kochi Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-37,SITE2015-24,LOIS2015-31
The threshold value design of recognition score considering the prior probability in a quiz speech recognition system

Hiroyuki Nishi(Sojo Univ.),  Kimurra Yoshimasa(Sojo Univ.),  Kakinoki Toshio(Sojo Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-45,SITE2015-32,LOIS2015-39
Self Information Control as Identity Management

Akiyoshi Kabeya(Chiba Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-36,SITE2015-23,LOIS2015-30
Reducing Authentication Time in Blacklistable Anonymous Credential System Using Accumulator

Yuu Aikou(Hiroshima Univ),  Toru Nakanishi(Hiroshima Univ),  

[Date]2015-11-06
[Paper #]ISEC2015-47,SITE2015-34,LOIS2015-41
Input UI Specification Recovery using Web Operation Monitoring

Daisuke Tashiro(Hitachi),  Katsuro Kikuchi(Hitachi),  Ryota Mibe(Hitachi),  

[Date]2015-11-06
[Paper #]ISEC2015-43,SITE2015-30,LOIS2015-37
Social media guidelines for international students

Daisuke Suzuki(Hokuriku Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-42,SITE2015-29,LOIS2015-36
The Problems of "Consent" in the Big Data Context

Takushi Otani(Kibi International Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-41,SITE2015-28,LOIS2015-35
A Feasibility Study of Autonomous Security Infrastructure in the Internet

Hiroshi KobayashiI(TDU),  Hirofumi Yamaki(TDU),  Yoichiro Ueno(TDU),  Kaoru Sano(TDU),  Ryoichi Sasaki(TDU),  

[Date]2015-11-06
[Paper #]ISEC2015-46,SITE2015-33,LOIS2015-40
A Pruning Method for the Decision Tree constructed on Run-Based Trie.

Takashi Harada(Kanagawa Univ.),  Ken Tanaka(Kanagawa Univ.),  Kenji Mikawa(Niigata Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-38,SITE2015-25,LOIS2015-32
[Invited Talk] Effective Utilization of Mobile Communication Technology for Life-Saving

Noriyoshi Sonetaka(ICPS),  

[Date]2015-11-06
[Paper #]ISEC2015-40,SITE2015-27,LOIS2015-34
[Invited Talk] Design of Learning e-Portfolio System Based on User-centered design

Rieko Inaba(Tsuda Coll.),  Norimichi Kobayashi(Kansai Univ.),  Miho Mohri(Kansai Univ.),  Yasunori Motomoura(Kansai Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-39,SITE2015-26,LOIS2015-33
Postpaid electronic money to keep privacy and its implementation

Tatshuhiko Sukegawa(Kanagawa Univ.),  Mashu Sakai(Kanagawa Univ.),  Hikaru Morita(Kanagawa Univ.),  

[Date]2015-11-06
[Paper #]ISEC2015-48,SITE2015-35,LOIS2015-42
Proposal and Prototyping of a TV Content Providing System using Geolocation

Chigusa Yamamura(NHK),  Hisayuki Ohmata(NHK),  Michihiro Uehara(NHK),  

[Date]2015-11-06
[Paper #]ISEC2015-44,SITE2015-31,LOIS2015-38
Extension of NTRU Using Group Ring and Its Application

Takanori Yasuda(ISIT),  Hiroaki Anada(ISIT),  Kouichi Sakurai(Kyushu Univ.),  

[Date]2015-11-07
[Paper #]ISEC2015-52,SITE2015-39,LOIS2015-46
Encryption and decryption system of composite cellular automata

Toshikazu Ishida(KSU),  

[Date]2015-11-07
[Paper #]ISEC2015-51,SITE2015-38,LOIS2015-45
An Additionable Type ToDo List which Can Support Daily Activities

Noriaki Saito(NTT),  

[Date]2015-11-07
[Paper #]ISEC2015-49,SITE2015-36,LOIS2015-43
Evaluation of the Web System U-MOS for Supporting University Management Operation

Satoshi Taoka(Hiroshima Univ.),  

[Date]2015-11-07
[Paper #]ISEC2015-50,SITE2015-37,LOIS2015-44
A dynamic filtering method to reduce DDoS packets by using access tokens

Ryota Suzuki(Kanagawa Univ.),  Hikaru Morita(Kanagawa Univ.),  

[Date]2015-11-07
[Paper #]ISEC2015-53,SITE2015-40,LOIS2015-47