Presentation 2016-11-07
Application of the Method for Similarity Search of Time-Series Data to User Authentication
Satoshi Hiraiwa, Masahiro Mambo,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) In recent years life log has received much attention and various researches and developments using life log have been conducted. There is an authentication technique using behavior information obtained from wireless LAN. However, the accuracy of the authentication is not suffient due to noise and outliers included in the behavior information. Also life log contains personal information from which privacy can be violated. In this paper, we examine whether user authentication is possible from wireless LAN information by using order-preserving matching in the data analysis.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Wi-Fi / Behavior information / Authentication / Risk-based Authentication / Order-preserving matching
Paper # ISEC2016-56,SITE2016-46,LOIS2016-34
Date of Issue 2016-10-31 (ISEC, SITE, LOIS)

Conference Information
Committee ISEC / LOIS / SITE
Conference Date 2016/11/7(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Community Hall & AOSSA Mall, Fukui
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair Masahiro Mambo(Kanazawa Univ.) / Hiroyuki Nishi(Sojo Univ.) / Hitoshi Okada(NII)
Vice Chair Kazuto Ogawa(NHK) / Atsushi Fujioka(Kanagawa Univ.) / Tomohiro Yamada(NTT) / Tetsuya Morizumi(Kanagawa Univ.) / Masaru Ogawa(Kobe Gakuin Univ.)
Secretary Kazuto Ogawa(Toshiba) / Atsushi Fujioka(Tohoku Univ.) / Tomohiro Yamada(NTT) / Tetsuya Morizumi(Nagasaki Univ.) / Masaru Ogawa(Kyushu Univ.)
Assistant Toshihiro Ohigashi(Tokai Univ.) / Yuuji Suga(IIJ) / Atsuo Inomata(Tokyo Denki Univ.) / Yukihiro Nakamura(NTT) / Kanako Kawaguchi(Tokyo Univ. of the Arts)

Paper Information
Registration To Technical Committee on Information Security / Technical Committee on Life Intelligence and Office Information Systems / Technical Committee on Social Implications of Technology and Information Ethics
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Application of the Method for Similarity Search of Time-Series Data to User Authentication
Sub Title (in English)
Keyword(1) Wi-Fi
Keyword(2) Behavior information
Keyword(3) Authentication
Keyword(4) Risk-based Authentication
Keyword(5) Order-preserving matching
1st Author's Name Satoshi Hiraiwa
1st Author's Affiliation Kanazawa University(Kanazawa Univ.)
2nd Author's Name Masahiro Mambo
2nd Author's Affiliation Kanazawa University(Kanazawa Univ.)
Date 2016-11-07
Paper # ISEC2016-56,SITE2016-46,LOIS2016-34
Volume (vol) vol.116
Number (no) ISEC-289,SITE-290,LOIS-291
Page pp.pp.33-38(ISEC), pp.33-38(SITE), pp.33-38(LOIS),
#Pages 6
Date of Issue 2016-10-31 (ISEC, SITE, LOIS)