Session Details

[A-7]情報セキュリティ

Thu. Mar 7, 2024 9:00 AM - 12:15 PM JST
Thu. Mar 7, 2024 12:00 AM - 3:15 AM UTC
School of Integrated Arts and Sciences K210(HIROSHIMA UNIVERSITY Higashi-Hiroshima campus)
Chair:Yuji Suga(Internet Initiative Japan Inc.), Hikaru Tsuchida(NEC Corporation)

[A-7-13]A Study on Vulnerability and Countermeasure for WebRTC

○Kazuma Kudo1, Juichi Takahashi2, Yohei Takagi2, Masahiko Kato1, Yoshihiro Kita1 (1. University of Nagasaki, 2. AGEST)
PDF DownloadDownload PDF

[A-7-14]Proposal of Anonymous FIDO Authentication and its Application

○Ryuichi Ogawa1, Taika Kato1, Keita Emura2, Toshihiro Ohigashi1 (1. Tokai Univ., 2. Kanazawa Univ.)
PDF DownloadDownload PDF

[A-7-15]Implementation and Workload Measurement of Proof-of-Verification I : Transaction Signature Verification

○Takurou Hosoi1, Kanta Matsuura1 (1. The University of Tokyo)
PDF DownloadDownload PDF

[A-7-16]Audio Adersarial Example identification method using multiple features

Daisuke Suzuki1, ○Yuya Tarutani1, Fukushima Yukinobu1, Tokumi Yokohira1 (1. Okayama University)
PDF DownloadDownload PDF

[A-7-17]Examination of an identification method using skeletal coordinates of the hand fingers during Enter keystrokes.

○Hitoshi Saito1, Kazuhiro Notomi1 (1. Kanagawa Institute of Technology Graduate School)
PDF DownloadDownload PDF

[A-7-18]A Method of Avatar Player Authentication in Metaverse

○Amane Uchikoshi1, Shungo Hayashi1, Tsutomu Matsumoto1 (1. Graduate School of Environment and Information Sciences, Yokohama National University)
PDF DownloadDownload PDF

Break time

[A-7-19]Development of Secure Chat Application Based Quantum Key Distribution

○Yudai Yudai Takihara1, Hoang Le D.1, Anh Pham T.1 (1. University of Aizu)
PDF DownloadDownload PDF

[A-7-20]素数の周期性を発見

○Shigeru Nakajima1 (1. Device Analysis)
PDF DownloadDownload PDF

[A-7-21]Implementation with Distinguished Point Method of ID-NIKS using Discrete Logarithm Problem

○Hayato Inoue1, Mizuki Miki1, Ryuichi Sakai1, Yasuyuki Murakami1 (1. Osaka Electro-Communication University)
PDF DownloadDownload PDF

[A-7-22]Reducing costs of ENUM by reordering lattice basis vectors

○Katsuya Nakashima1, Atsuko miyaji1, Yuntao Wang1 (1. Osaka Univ.)
PDF DownloadDownload PDF

[A-7-23]Card-Based Threshold Function Protocol Using Directional Cards in Commercial Playing Cards

Kanta Moriyama1, Tomohiro Taguchi1, Hayato Inoue1, ○Yasuyuki Murakami1 (1. Osaka Electro-Communication University)
PDF DownloadDownload PDF

[A-7-24]A classification of non-commitment card protocols with 6 cards in terms of the graph vertices distances

○YUJI SUGA1 (1. Internet Initiative Japan Inc.)
PDF DownloadDownload PDF