Information and Systems-Software Science(Date:2021/06/21)

Presentation
Post-Quantum Commitment Scheme with Extending Message Length

Hideaki Miyaji(OU),  Yuntao Wang(JAIST),  Atsuko Miyaji(OU),  

[Date]2021-06-21
[Paper #]IA2021-1,ICSS2021-1
Development and evaluation of condition detection system of harmful animals by interlocking a doppler sensor and a thermal camera

Uchiyama Keigo(Ritsumeikan Univ.),  Yamamoto Hiroshi(Ritsumeikan Univ.),  Utsunomiya Eiji(KDDI Research),  Yoshihara Kiyohito(KDDI Research),  

[Date]2021-06-21
[Paper #]IA2021-6,ICSS2021-6
Verification of Applying Plumtree Algorithm to Blockchain Networks

Yusuke Kitagawa(Kogakuin Univ.),  Kazuyuki Shudo(Tokyo Tech),  Osamu Mizuno(Kogakuin Univ.),  Ryohei Banno(Kogakuin Univ.),  

[Date]2021-06-21
[Paper #]IA2021-7,ICSS2021-7
Development and evaluation of growth estimation sensing system for aquaponics using multiple types of depth cameras

Ryota Murakami(Ritsumeikan Univ.),  Hiroshi Yamamoto(Ritsumeikan Univ.),  

[Date]2021-06-21
[Paper #]IA2021-4,ICSS2021-4
Development and evaluation of fatigue level estimation system using spatio-temporal analysis of Web camera images

Takuro Nonomura(Ritsumei Univ.),  Takashi Hayakawa(NEC Solution Innovators, Ltd.),  Hiroshi Yamamoto(Ritsumei Univ.),  

[Date]2021-06-21
[Paper #]IA2021-5,ICSS2021-5
secure isogeny-based cryptosystem CSIDH for side-channel attacks

Hayato Arai(Osaka Univ.),  Atusko Miyaji(Osaka Univ.),  

[Date]2021-06-21
[Paper #]IA2021-2,ICSS2021-2
An initial evaluation between C language and PRSafe for developing eBPF programs

Mahadevan Sai Veerya(Handai),  Takano Yuuki(Handai),  Miyaji Atsuko(Handai),  

[Date]2021-06-21
[Paper #]IA2021-3,ICSS2021-3
[Invited Talk] An Authentication Scheme for WLAN Physical Layer

Miyuki Hirose(KIT),  

[Date]2021-06-21
[Paper #]IA2021-8,ICSS2021-8
Feature analysis of phishing website and phishing detection based on machine learning algorithms

Yi Wei(Todai),  Yuji Sekiya(Todai),  

[Date]2021-06-22
[Paper #]IA2021-9,ICSS2021-9
Performance Evaluation of MPTCP Scheduler for Video Streaming in Mobile Networks

Masayoshi Kondo(KIT),  Dirceu Cavendish(KIT),  Daiki Nobayashi(KIT),  Takeshi Ikenaga(KIT),  

[Date]2021-06-22
[Paper #]IA2021-12,ICSS2021-12
Simulation Evaluation of Incentives for RPKI Deployment

Tatsuya Oryu(ICU),  Ishibashi Keisuke(ICU),  

[Date]2021-06-22
[Paper #]IA2021-13,ICSS2021-13
A Solution for Recovering Missing Links in Network Topology using Sparse Modeling

Ryotaro Matsuo(Kwansei Gakuin Univ.),  Hiroyuki Ohsaki(Kwansei Gakuin Univ.),  

[Date]2021-06-22
[Paper #]IA2021-14,ICSS2021-14
Etherpot: A honeypot for observing cyberattacks on Ethereum client

Wang Jia(Yokohama National Univ.),  Sasaki Takayuki(Yokohama National Univ.),  Omote Kazumasa(Univ. of Tsukuba),  Yoshioka Katsunari(Yokohama National Univ.),  Matsumoto Tsutomu(Yokohama National Univ.),  

[Date]2021-06-22
[Paper #]IA2021-11,ICSS2021-11
Analtsis of cost-effectiveness in malicious site detection using VirusTotal

Kyohei Takao(YNU),  Hiroshi Mori(Deloitte Tohmatsu Cyber LLC),  Rui Tanabe(YNU),  Katsunari Yoshioka(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2021-06-22
[Paper #]IA2021-10,ICSS2021-10