Information and Systems-Life Intelligence and Office Information Systems(Date:2010/11/10)

Presentation
表紙

,  

[Date]2010/11/10
[Paper #]
目次

,  

[Date]2010/11/10
[Paper #]
Proposal and Verification on Universal Profiler System Based on Basic Desires

Takayuki AKIYAMA,  Yaemi TERAMOTO,  Kiyohiro OBARA,  Masaaki TANIZAKI,  

[Date]2010/11/10
[Paper #]ISEC2010-50,LOIS2010-29
Gait Monitoring with a Cellular Phone

Tatsuaki ITO,  Tatsuya ISHIHARA,  Yukihiro NAKAMURA,  Sinyo MUTO,  Masanobu ABE,  

[Date]2010/11/10
[Paper #]ISEC2010-51,LOIS2010-30
Demonstrative experiment of personal health record system using public account for personal information management

Hiroyuki SUZUKI,  Koichi KITA,  TAIRA Naoko /,  Takashi OBI,  Masahiro YAMAGUCHI,  Masuyoshi YACHIDA,  Hiroshige YAMAMOTO,  Kazuhisa URYU,  Takahiro YOKOYAMA,  Nagaaki OHYAMA,  Masataka INOKUCHI,  Fumito TSUCHIYA,  

[Date]2010/11/10
[Paper #]ISEC2010-52,LOIS2010-31
Study on the requirement of the medication history information management

Naoko Taira,  Joong-Sun Lee,  Hiroyuki Suzuki,  Kouichi Kita,  Fumito Tuchiya,  Takashi Obi,  Takahiro Yokoyama,  Nagaaki Ohyama,  

[Date]2010/11/10
[Paper #]ISEC2010-53,LOIS2010-32
Similarity Hashing resistant to file modifications

Susumu SERITA,  Yasuhiro FUJII,  Satoshi KAI,  Takao MURAKAMI,  Yoshinori HONDA,  

[Date]2010/11/10
[Paper #]ISEC2010-54,LOIS2010-33
A Visible-Light Artifact-Metric System Which Extracts Values Unique to Individual Paper

Yasuhiro FUKUDA,  Tsutomu MATSUMOTO,  

[Date]2010/11/10
[Paper #]ISEC2010-55,LOIS2010-34
Improved Broadcast Encryption by Secret Sharing Scheme

Kyota MIWA,  Wataru KISHIMOTO,  

[Date]2010/11/10
[Paper #]ISEC2010-56,LOIS2010-35
Study of Tolerability in Defacing of Y-00 Quantum Stream Cipher

Takehisa IWAKOSHI,  Osamu HIROTA,  

[Date]2010/11/10
[Paper #]ISEC2010-57,LOIS2010-36
Attack Derivation for Cryptographic Assumptions in the Generic Model with a Computer Algebra System

Kenta KUMOJIMA,  Maki YOSHIDA,  Masayuki ABE,  Miyako OHKUBO,  Toru FUJIWARA,  

[Date]2010/11/10
[Paper #]ISEC2010-58,LOIS2010-37
Sample Investigation and the Consideration to Compromising Cryptosystems in SSL

Seiji TAKANO,  Ryota SATO,  Kenichiro MUTO,  Sakae CHIKARA,  Masayuki KANDA,  Yoshiaki SEKI,  

[Date]2010/11/10
[Paper #]ISEC2010-59,LOIS2010-38
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols : A Countermeasure against Compromising of Cryptosystems in SSL

Ryota SATO,  Yoshiaki SEKI,  Katsuhiko YOSHIDA,  Shigeru KAYAGUCHI,  Shinichi HIRATA,  

[Date]2010/11/10
[Paper #]ISEC2010-60,LOIS2010-39
A Method for Protecting User Passwords at Agent Server Node

Hiromitsu UEDA,  Yukio Rikiso,  

[Date]2010/11/10
[Paper #]ISEC2010-61,LOIS2010-40
Evaluation of Information Provision Methods for Website Audience on a Life Log Collection System

Iori OSADA,  Takashi YOSHINO,  

[Date]2010/11/10
[Paper #]ISEC2010-62,LOIS2010-41
Recording Receipts for Consumer-Oriented Lifelog Services

Seiki TOKUNAGA,  Shinsuke MATSUMOTO,  Masahide NAKAMURA,  

[Date]2010/11/10
[Paper #]ISEC2010-63,LOIS2010-42
Implementing Database and Web Services for Life-Log Mashup APIs

Akira SHIMOJO,  Shinsuke MATSUMOTO,  Masahide NAKAMURA,  

[Date]2010/11/10
[Paper #]ISEC2010-64,LOIS2010-43
複写される方へ

,  

[Date]2010/11/10
[Paper #]
奥付

,  

[Date]2010/11/10
[Paper #]
裏表紙

,  

[Date]2010/11/10
[Paper #]