21 Key Exchange method for portable terminal with direct input by user
|
|
- ゆき なかきむら
- 5 years ago
- Views:
Transcription
1 21 Key Exchange method for portable terminal with direct input by user
2 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i
3 Abstract Key Exchange method for portable terminal with direct input by user Sasuke KOMATSU Diffie-Hellman key exchange and the key exchange method with public key cryptosystem is a typical key exchange method. These standerd methods were vulnerable to Man-in-the-middle Attacks. Then, new methods improved sacurity against Man-in-themiddle Attacks by combining authentication with PKI is studied, and used generically now. however, two problems occur when those methods use the authentication by PKI. one is the cost which to issue and to manage public key certificate, and another is a problem that is necessary to be able to connect to certificate authority to verify public key certificate. In this paper, we propose the method that combine key exchange and direct input by user especially for PDA. Direct input function in authentication in place of PKI. As a result, we examined the effectiveness of the proposed method by the comparison with existing methods, and mentioned application examples. key words Man-in-the-middle Attacks, key exchange, Diffie-Hellman, authentication ii
4 Diffie-Hellman Diffie-Hellman Diffie-Hellman iii
5 iv
6 2.1 Diffie-Hellman Diffie-Hellman v
7 vi
8 1 1.1,,,,,,,,.,.., Diffie-Hellman,.,,.,,. 1.2,,. 2, Diffie-Hellman,. 3,., 1
9 1.2. 4,.,,. 2
10 2,.,,., DES[1], AES[2], FEAL[3].,,..,, Diffie-Hellman [4],,.,. 2.1, Diffie-Hellman., Diffie-Hellman Diffie-Hellman, B.W.Diffie M.E.Hellman. Diffi-Hellman,, 3
11 2.1. Diffie-Hellman. Alice,. Bob,. Eve,. P. G P. a, b. G a modp Alice. G b modp Bob. K. Diffie-Hellman Diffie-Hellman, Alice Bob,. 2.1, Diffie-Hellman,., P, G Eve,, Alice, Bob,. 1. Alice a. 2. Bob b. 3. Alice a, P, G G a modp. 4. Bob b, P, G G b modp. 5. Alice, Bob G a modp. 4
12 Diffie-Hellman 6. Bob, Alice G b modp. 7. Alice, G b modp a K. 8. Bob, G a modp b K. Eve P, G, G a modp, G b modp 4. Eve K, a b., Eve a, b.., Eve K., Diffie-Hellman (DH)., Alice Bob Eve K. 5
13 B.W.Diffie M.E.Hellman, RSA[5],.,.,.,,.. Alice,. Bob,. Eve,. P K B Bob. SK B Bob. K. P E [X] (Y ), X Y. P D [X] (Y ), X Y., Alice, Bob,. 2.2,. 1. Bob P K B SK B. 2. Bob, Alice P K B. 6
14 Alice K. 4. Alice P K B K α, Bob. 5. Bob, α, SK B, K. P K B α,, Eve 2., Eve P K B SK B, α., P K B α K., Alice Bob, Eve K. 2.2 Diffie-HEllman,.,, 7
15 2.2., Diffie-Hellman, (Manin-the-middle Attacks).,.,., Diffie-Hellman,. Diffie-Hellman. Alice,. Bob,. Mallory,. P. G P. a, b, x, y. G a modp Alice. G b modp Bob. G x modp Mallory Bob. G y modp Mallory Alice. P K B Bob. SK B Bob. P K M Mallory. 8
16 2.2 SK M Mallory. K. P E [X] (Y ), X Y. P D [X] (Y ), X Y. Diffie-Hellman Diffie-Hellman, Mallory, Alice Bob,. 2.3, Diffie-Hellman., 2.1.1, P, G Alice, Bob, Mallory. 1. Alice a. 2. Bob b. 3. Mallory x, y. 4. Alice a, P, G G a modp. 5. Bob b, P, G G b modp. 6. Mallory x, P, G G x modp. 7. Mallory y, P, G G y modp. 8. Alice, Bob G a modp. 9. Mallory G a modp G x modp. 10. Bob, Alice G b modp. 11. Mallory G b modp G y modp. 12. Alice, G y modp a, K Bob, G x modp b, K Mallory, G a modp y, K1. 9
17 Mallory, G b modp x, K2. Alice Bob, Alice K1. Mallory,, K1, Alice Bob., Mallory, K2, Bob. Bob K2. Bob Alice, Mallory., Alice Bob,,., Mallory, Alice Bob,. 2.3 Diffie-Hellman 10
18 2.2, Mallory, Bob,. 2.4n,. 1. Bob P K B SK B. 2. Mallory P K M SK M. 3. Bob, Alice P K B. 4. Mallory P K B P K M. 5. Alice K. 6. Alice, P K M K α, Bob. 7. Mallory,, α SK M, K. 8. Mallory, K P K B β, Bob. 9. Bob, β, SK B, K., Alice Bob, Bob P K B., Mallory Alice Bob, K, Diffi-Hellman,, (PKI).,, 11
19 , ISO ISO [6], IEEE Menezes-Qu-Vanstone (MQV) [7], MQV HMQV [8].,,.,. 2.,,.,., 1 12
20 ,600 [9]., ,050 [10].,., LAN. 13
21 3, Diffie-Hellman. 3.1 Diffie-Hellman,,,,,.,,, Diffie-Hellman,,.,,.,,. 3.2, 2.,.., 14
22 3.2.,,., ,.. Alice, A. Bob, B. Eve,. P,. G, P. a1, ai, an, b1, bi, bn. Na Alice. Nb Bob. G a1 modp, G an modp Alice. G ai modp Alice. Pa Alice. G b1 modp, G bn modp Bob. G bi modp Bob. Pb Bob. K. 15
23 ,., Diffie-Hellman, P, G Alice n, Na. 2. Bob n, Nb. 3. Alice Na, P, G Na Pa. 4. Bob Nb, P, G Nb Pb. 5. Alice, Bob Pa. 6. Bob, Alice Pb ,. 16
24 Alice, Pb GbimodP. 10. Bob, Pa GaimodP. 11. Alice, G bi modp ai K. 12. Bob, G ai modp bi K. Eve P, G,Pa,Pb 4., Diffie-Hellman DH, Eve K ,,.,.,,.,.,,,,. 3.2,. Apple iphone 3GS. 3.2,.,, 17
25 ,. 3.2,,,., OK,.,,. 18
26 4,., 2,. 4.1 Diffie-Hellman,,.,,,. N, N ,, 3, 4.1.,,.,.,,,.,, 19
27 PKI.,,. 4.3, Diffie-Hellman,.,, N 2.,,.,,.,,,.,,.,.,,,.,,. 20
28 4.3,,,.,.,. SAS-2, [11].. 21
29 5,., Diffie-Hellman,,,,.,, Diffie-Hellman,.,.,,. 22
30 ,,. 23
31 [1] U.S Dept. of Commerce, Data Encryption Standard (DES), FIPS Publication 46-3, [2] National Institute of Standards and Technology, Announcling the Advanced Encryption Standard (AES), FIPS Publication 197, [3],, FEAL,, Vol.J70-D, No.7, pp , [4] W.Diffie, and M.E.Hellman, New directions in cryptography, IEEE Transactions on Information Theory, vol.it-22, No.6, pp , Nov, [5] R.Rivest, A.Shamir, and L.Adleman, A method for obtaining digital signatures and public-key cryptosystems. Commun.of the ACM, Vol.21, No.2, pp [6] ISO/IEC IS , Entity authentication mechanisms - Part 3: Entity authentication using asymmetric techniques, [7] L.Law, A.Menezes, M.Qu, J.Solinas, and S.Vanstone, An efficient protocol for authenticated key agreement, Des.Codes Cryptogr., vol.28, no.pp ,2003. [8] H.Krawczyk, HMQV: A high-performance secure Diffie-Hellman protocol, Advances in Cryptology, CRYPTO 2005, LNCS 3621, pp2005, [9] 2 ID / Verisign / /, [10], detail.html,
32 [11] T.Tsuji, and A.Shimizu, Simple nad secure password authentication protocol, ver.2 (SAS-2), IEICE Technical Reports, OIS ,
28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management
More informationWi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i
26 A Study on Secure Remote Control Methods 1175078 2015 2 27 Wi-Fi Wi-Fi Wi-Fi Wi-Fi SAS SAS-2 Wi-Fi i Abstract A Study on Secure Remote Control Methods SHINGAI, Tatsuro In recent years, communication
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationi
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
More information7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
More informationWeb Basic Web SAS-2 Web SAS-2 i
19 Development of moving image delivery system for elementary school 1080337 2008 3 10 Web Basic Web SAS-2 Web SAS-2 i Abstract Development of moving image delivery system for elementary school Ayuko INOUE
More information25 About what prevent spoofing of misusing a session information
25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent
More informationLAN LAN LAN LAN LAN LAN,, i
22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies
More information(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1
(Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding
More information, (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,, i
25 Estimation scheme of indoor positioning using difference of times which chirp signals arrive 114348 214 3 6 , (GPS: Global Positioning Systemg),.,, (LBS: Local Based Services).. GPS,.,. RFID LAN,.,.,.,,,.,..,.,.,,,
More information25 Removal of the fricative sounds that occur in the electronic stethoscope
25 Removal of the fricative sounds that occur in the electronic stethoscope 1140311 2014 3 7 ,.,.,.,.,.,.,.,,.,.,.,.,,. i Abstract Removal of the fricative sounds that occur in the electronic stethoscope
More informationIPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for
1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu
More informationWeb Web Web Web Web, i
22 Web Research of a Web search support system based on individual sensitivity 1135117 2011 2 14 Web Web Web Web Web, i Abstract Research of a Web search support system based on individual sensitivity
More informationBlock cipher
18 12 9 1 2 1.1............................... 2 1.2.................. 2 1.3................................. 4 1.4 Block cipher............................. 4 1.5 Stream cipher............................
More informationWeb Web ID Web 16 Web Web i
24 Web Proposal of Web Application Password Operations Management System 1130343 2013 3 1 Web Web ID Web 16 Web Web i Abstract Proposal of Web Application Password Operations Management System Tatsuro
More informationsoturon.dvi
12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm
More information,,.,,., II,,,.,,.,.,,,.,,,.,, II i
12 Load Dispersion Methods in Thin Client Systems 1010405 2001 2 5 ,,.,,., II,,,.,,.,.,,,.,,,.,, II i Abstract Load Dispersion Methods in Thin Client Systems Noritaka TAKEUCHI Server Based Computing by
More information,,.,.,,.,.,.,.,,.,..,,,, i
22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of
More information58 10
57 Multi-channel MAC Protocol with Multi-busytone in Ad-hoc Networks Masatoshi Fukushima*, Ushio Yamamoto* and Yoshikuni Onozato* Abstract Multi-channel MAC protocols for wireless ad hoc networks have
More information1 1 tf-idf tf-idf i
14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles
More informationDTN DTN DTN DTN i
28 DTN Proposal of the Aggregation Message Ferrying for Evacuee s Data Delivery in DTN Environment 1170302 2017 2 28 DTN DTN DTN DTN i Abstract Proposal of the Aggregation Message Ferrying for Evacuee
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More information28 Horizontal angle correction using straight line detection in an equirectangular image
28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image
More information<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>
2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................
More information29 jjencode JavaScript
Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa
More information4.1 % 7.5 %
2018 (412837) 4.1 % 7.5 % Abstract Recently, various methods for improving computial performance have been proposed. One of these various methods is Multi-core. Multi-core can execute processes in parallel
More information23 The Study of support narrowing down goods on electronic commerce sites
23 The Study of support narrowing down goods on electronic commerce sites 1120256 2012 3 15 i Abstract The Study of support narrowing down goods on electronic commerce sites Masaki HASHIMURA Recently,
More information特集_03-07.Q3C
3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution
More informationIT,, i
22 Retrieval support system using bookmarks that are shared in an organization 1110250 2011 3 17 IT,, i Abstract Retrieval support system using bookmarks that are shared in an organization Yoshihiko Komaki
More information21 VoIP An encrypted VoIP communication system for mobile telephones
21 VoIP An encrypted VoIP communication system for mobile telephones 1095702 2010 3 4 VoIP, IP., IP, VoIP(Voice over Internet Protocol)., VoIP,., VoIP over SSL(VoIPs), VoIPs.,,.,, VoIP., LAN VoIP. LAN
More information25 D Effects of viewpoints of head mounted wearable 3D display on human task performance
25 D Effects of viewpoints of head mounted wearable 3D display on human task performance 1140322 2014 2 28 D HMD HMD HMD HMD 3D HMD HMD HMD HMD i Abstract Effects of viewpoints of head mounted wearable
More informationID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR
Vol. 51 No. 11 2081 2088 (Nov. 2010) 2 1 1 1 which appended specific characters to the information such as identification to avoid parity check errors, before QR Code encoding with the structured append
More informationWeb Web Web Web i
28 Research of password manager using pattern lock and user certificate 1170369 2017 2 28 Web Web Web Web i Abstract Research of password manager using pattern lock and user certificate Takuya Mimoto In
More informationVirtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Social Networking
23 An attribute expression of the virtual window system communicators 1120265 2012 3 1 Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual Window System Virtual
More informationWebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i
26 WebRTC The data distribution system using browser cache sharing and WebRTC 1150361 2015/02/27 WebRTC P2P Web Proxy P2P Web Proxy WebRTC WebRTC Web, HTTP, WebRTC, P2P i Abstract The data distribution
More informationSobel Canny i
21 Edge Feature for Monochrome Image Retrieval 1100311 2010 3 1 3 3 2 2 7 200 Sobel Canny i Abstract Edge Feature for Monochrome Image Retrieval Naoto Suzue Content based image retrieval (CBIR) has been
More informationPC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i
21 The private mailers synchronization operation for plural terminals 1125083 2010 3 1 PC PDA SMTP/POP3 1 POP3 SMTP MUA MUA MUA i Abstract The private mailers synchronization operation for plural terminals
More information2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati
2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087
More information20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow
20 Method for Recognizing Expression Considering Fuzzy Based on Optical Flow 1115084 2009 3 5 3.,,,.., HCI(Human Computer Interaction),.,,.,,.,.,,..,. i Abstract Method for Recognizing Expression Considering
More information1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
More informationkut-paper-template.dvi
26 Discrimination of abnormal breath sound by using the features of breath sound 1150313 ,,,,,,,,,,,,, i Abstract Discrimination of abnormal breath sound by using the features of breath sound SATO Ryo
More information17 Proposal of an Algorithm of Image Extraction and Research on Improvement of a Man-machine Interface of Food Intake Measuring System
1. (1) ( MMI ) 2. 3. MMI Personal Computer(PC) MMI PC 1 1 2 (%) (%) 100.0 95.2 100.0 80.1 2 % 31.3% 2 PC (3 ) (2) MMI 2 ( ),,,, 49,,p531-532,2005 ( ),,,,,2005,p66-p67,2005 17 Proposal of an Algorithm of
More information* * 2
* * Study on Fire Resistance of Reinforced Concrete Columns with Ultra High Strength Material Munehiro UMEMOTO * Shigemi KIKUTA * The reinforced concrete column made with the high-strength concrete has
More information29 Short-time prediction of time series data for binary option trade
29 Short-time prediction of time series data for binary option trade 1180365 2018 2 28 RSI(Relative Strength Index) 3 USD/JPY 1 2001 1 2 4 10 2017 12 29 17 00 1 high low i Abstract Short-time prediction
More informationn 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i
15 Comparison and Evaluation of Dynamic Programming and Genetic Algorithm for a Knapsack Problem 1040277 2004 2 25 n 2 n (Dynamic Programming : DP) (Genetic Algorithm : GA) 2 i Abstract Comparison and
More informationDPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)
1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology
More information& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro
TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato
More information, IT.,.,..,.. i
25 To construct the system that promote a interactive method as a knowledge acquisition 1140317 2014 2 28 , IT.,.,..,.. i Abstract To construct the system that promote a interactive method as a knowledge
More informationTHE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. E-mail: {ytamura,takai,tkato,tm}@vision.kuee.kyoto-u.ac.jp Abstract Current Wave Pattern Analysis for Anomaly
More information16_.....E...._.I.v2006
55 1 18 Bull. Nara Univ. Educ., Vol. 55, No.1 (Cult. & Soc.), 2006 165 2002 * 18 Collaboration Between a School Athletic Club and a Community Sports Club A Case Study of SOLESTRELLA NARA 2002 Rie TAKAMURA
More informationISO/IEC 9798プロトコルの安全性評価
ISO/IEC 9798 2011 2 4 ISO/IEC 9798-2 (Mechanisms using symmetric encipherment algorithms), ISO/IEC 9798-3 (Mechanisms using digital signature techniques), ISO/IEC 9798-4 (Mechanisms using a cryptographic
More informationInput image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L
1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives
More informationVol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A
Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,
More informationuntitled
11-19 2012 1 2 3 30 2 Key words acupuncture insulated needle cervical sympathetick trunk thermography blood flow of the nasal skin Received September 12, 2011; Accepted November 1, 2011 I 1 2 1954 3 564-0034
More informationP2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i
26 P2P Reduction of search packets by sharing peer information in P2P communication 1175073 2015 2 27 P2P P2P Winny 3 P2P 15 20 P2P 1 P2P, i Abstract Reduction of search packets by sharing peer information
More information3D UbiCode (Ubiquitous+Code) RFID ResBe (Remote entertainment space Behavior evaluation) 2 UbiCode Fig. 2 UbiCode 2. UbiCode 2. 1 UbiCode UbiCode 2. 2
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS HCG HUMAN COMMUNICATION GROUP SYMPOSIUM. UbiCode 243 0292 1030 E-mail: {ubicode,koide}@shirai.la, {otsuka,shirai}@ic.kanagawa-it.ac.jp
More information2 ( ) i
25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA
More informationi
14 i ii iii iv v vi 14 13 86 13 12 28 14 16 14 15 31 (1) 13 12 28 20 (2) (3) 2 (4) (5) 14 14 50 48 3 11 11 22 14 15 10 14 20 21 20 (1) 14 (2) 14 4 (3) (4) (5) 12 12 (6) 14 15 5 6 7 8 9 10 7
More informationkut-paper-template.dvi
14 Application of Automatic Text Summarization for Question Answering System 1030260 2003 2 12 Prassie Posum Prassie Prassie i Abstract Application of Automatic Text Summarization for Question Answering
More information(Visual Secret Sharing Scheme) VSSS VSSS 3 i
13 A Visual Secret Sharing Scheme for Continuous Color Images 10066 14 8 (Visual Secret Sharing Scheme) VSSS VSSS 3 i Abstract A Visual Secret Sharing Scheme for Continuous Color Images Tomoe Ogawa The
More informationESIGN-TSH 1.0 NTT
ESIGN-TSH 10 NTT 2002 5 23 1 3 2 4 3 4 31 (I2BSP) 4 32 (BS2IP) 6 33 (BS2OSP) 6 34 (OS2BSP) 7 35 (I2OSP) 7 36 (OS2IP) 8 4 8 41 ESIGN 8 42 ESIGN 9 5 9 51 KGP-ESIGN-TSH 9 52 SP-ESIGN-TSH 9 53 VP-ESIGN-TSH
More informationIPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple
1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa
More information知能と情報, Vol.30, No.5, pp
1, Adobe Illustrator Photoshop [1] [2] [3] Initital Values Assignment of Parameters Using Onomatopoieas for Interactive Design Tool Tsuyoshi NAKAMURA, Yuki SAWAMURA, Masayoshi KANOH, and Koji YAMADA Graduate
More information大学における原価計算教育の現状と課題
1 1.1 1.2 1.3 2 2.1 2.2 3 3.1 3.2 3.3 2014a 50 ABC Activity Based Costing LCC Lifecycle Costing MFCA Material Flow Cost Accounting 2 2 2016 9 1 2 3 2014b 2005 2014b 2000 1 2 1962 5 1 3 2 3 4 5 50 2012
More informationkut-paper-template2.dvi
19 A Proposal of Text Classification using Formal Concept Analysis 1080418 2008 3 7 ( ) Hasse Web Reuters 21578 Concept Explorer 2 4 said i Abstract A Proposal of Text Classification using Formal Concept
More information26 Development of Learning Support System for Fixation of Basketball Shoot Form
26 Development of Learning Support System for Fixation of Basketball Shoot Form 1175094 ,.,,.,,.,,.,,,.,,,,.,,,.,,,,, Kinect i Abstract Development of Learning Support System for Fixation of Basketball
More information,,,,,,,,,,,,,,,,,,, 976%, i
20 Individual Recognition using positions of facial parts 1115081 2009 3 5 ,,,,,,,,,,,,,,,,,,, 976%, i Abstract Individual Recognition using positions of facial parts YOSHIHIRO Arisawa A facial recognition
More information23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones
23 A Comparison of Flick and Ring Document Scrolling in Touch-based Mobile Phones 1120220 2012 3 1 iphone..,. 2 (, ) 3 (,, ),,,.,..,. HCI i Abstract A Comparison of Flick and Ring Document Scrolling in
More information橡最新卒論
Research of improving of recognition ability in Face recognition system Abstract The age when baiometrics was used as a password came today. Because various baiometrics such as a voice, a fingerprint,
More information(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s
1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene
More information1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,
THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,
More information/ ( ) 1 1.1 323 206 23 ( 23 529 529 323 206 ) 23 1.2 33 1.3 323 61 61 3721 3721 323 168 168 323 23 61 61 23 1403 323 111 111 168 206 323 47 111 323 47 2 23 2 2.1 34 2 2.2 2 a, b N a b N a b (mod N) mod
More informationTakens / / 1989/1/1 2009/9/ /1/1 2009/9/ /1/1 2009/9/30,,, i
21 Market forecast using chaos theory 1100334 2010 3 1 Takens / / 1989/1/1 2009/9/30 1997/1/1 2009/9/30 1999/1/1 2009/9/30,,, i Abstract Market forecast using chaos theory Hiroki Hara The longitudinal
More information2 1 ( ) 2 ( ) i
21 Perceptual relation bettween shadow, reflectance and luminance under aambiguous illuminations. 1100302 2010 3 1 2 1 ( ) 2 ( ) i Abstract Perceptual relation bettween shadow, reflectance and luminance
More information24 Region-Based Image Retrieval using Fuzzy Clustering
24 Region-Based Image Retrieval using Fuzzy Clustering 1130323 2013 3 9 Visual-key Image Retrieval(VKIR) k-means Fuzzy C-means 2 200 2 2 20 VKIR 5 18% 54% 7 30 Fuzzy C-means i Abstract Region-Based Image
More information2 The Bulletin of Meiji University of Integrative Medicine 3, Yamashita 10 11
1-122013 1 2 1 2 20 2,000 2009 12 1 2 1,362 68.1 2009 1 1 9.5 1 2.2 3.6 0.82.9 1.0 0.2 2 4 3 1 2 4 3 Key words acupuncture and moxibustion Treatment with acupuncture, moxibustion and Anma-Massage-Shiatsu
More information1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan
SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:
More informationIPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
More information13 RoboCup The Interface System for Learning By Observation Applied to RoboCup Agents Ruck Thawonmas
13 RoboCup The Interface System for Learning By Observation Applied to RoboCup Agents 1020302 Ruck Thawonmas 2002 2 8 RoboCup RoboCup SemiReal SemiReal RAIK-NTG4 Huma SemiReal Huma RoboCup. i Abstract
More informationIR0036_62-3.indb
62 3 2016 253 272 1921 25 : 27 8 19 : 28 6 3 1921 25 1921 25 1952 27 1954 291960 35 1921 25 Ⅰ 0 5 1 5 10 14 21 25 34 36 59 61 6 8 9 11 12 16 1921 25 4 8 1 5 254 62 3 2016 1 1938.8 1926 30 1938.6.23 1939.9
More informationkiyo5_1-masuzawa.indd
.pp. A Study on Wind Forecast using Self-Organizing Map FUJIMATSU Seiichiro, SUMI Yasuaki, UETA Takuya, KOBAYASHI Asuka, TSUKUTANI Takao, FUKUI Yutaka SOM SOM Elman SOM SOM Elman SOM Abstract : Now a small
More informationWMN Wi-Fi MBCR i
27 WMN Proposal of routing method that improves transmission capability in WMN 1185081 2016 2 26 WMN Wi-Fi MBCR i Abstract Proposal of routing method that improves transmission capability in WMN KOBAYASHI
More informationuntitled
22 2 ii 20 10 iii iv 1...1 1.1....1 1.2....2 1.3....3 2...10 2.1....10 2.1.1....10 2.1.1.1.... 11 2.1.1.2....13 2.1.2....16 2.1.3....18 2.1.3.1....18 2.1.3.2....21 2.1.3.3....22 2.2....25 3...29 3.1....29
More informationNINJAL Research Papers No.3
(NINJAL Research Papers) 3: 143 159 (2012) ISSN: 2186-134X print/2186-1358 online 143 2012.03 i ii iii 2003 2004 Tsunoda forthcoming * 1. clause-linkage marker CLM 2003 2004 Tsunoda forthcoming 2 3 CLM
More informationIPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum
1 2 1 3 PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fumio Sugai, 1 Masami Ikeda, 2 Naonobu Okazaki 1 and Mi RangPark 3 In recent years,
More informationVol. 42 No. SIG 8(TOD 10) July HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Spe
Vol. 42 No. SIG 8(TOD 10) July 2001 1 2 3 4 HTML 100 Development of Authoring and Delivery System for Synchronized Contents and Experiment on High Speed Networks Yutaka Kidawara, 1 Tomoaki Kawaguchi, 2
More information..,,,, , ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i
25 Feature Selection for Prediction of Stock Price Time Series 1140357 2014 2 28 ..,,,,. 2013 1 1 12 31, ( ) 3.,., 3.,., 500, 233.,, 3,,.,, i Abstract Feature Selection for Prediction of Stock Price Time
More information浜松医科大学紀要
On the Statistical Bias Found in the Horse Racing Data (1) Akio NODA Mathematics Abstract: The purpose of the present paper is to report what type of statistical bias the author has found in the horse
More informationP2P P2P peer peer P2P peer P2P peer P2P i
26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose
More information(1) (2) (3) (4) (5) (6) (7) (8) (9) PLC PLC LAN MASTER PLC LAN MASTER PLC LAN MASTER PLC LAN MASTER PLC LAN MASTER MASTER MASTER PLC LAN PLC LAN PLC LAN MASTER PLC LAN MASTER MASTER TERMINAL MASTER TERMINAL
More information[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing
1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November
More information2017 (413812)
2017 (413812) Deep Learning ( NN) 2012 Google ASIC(Application Specific Integrated Circuit: IC) 10 ASIC Deep Learning TPU(Tensor Processing Unit) NN 12 20 30 Abstract Multi-layered neural network(nn) has
More information28 TCG SURF Card recognition using SURF in TCG play video
28 TCG SURF Card recognition using SURF in TCG play video 1170374 2017 3 2 TCG SURF TCG TCG OCG SURF Bof 20 20 30 10 1 SURF Bag of features i Abstract Card recognition using SURF in TCG play video Haruka
More informationIPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came
3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is
More informationICT Web Web ICT Web 2. 新 学 習 指 導 要 領 の 理 念 と 教 育 の 情 報 化 の 意 義 2-1 新 学 習 指 導 要 領 の 理 念 20 3 23 1 ICT 2
30 2012 Web キーワード Web CIRRI Educational Method and Technology, Elementary School, School Library Website, Information Literacy, CIRRI Contents Model 1.はじめに ICTInformation and Communication Technology :
More informationuntitled
() No.4 2006 pp.50-61 1 1 ( 020-0193 152-52) 2004 2004 11 737 364 Yahoo! 35%2004 10% 39% 12%2003 15% 21% 2004 : Victoria(2001) 1989 Loma Prieta ( 2004) (disaster subculture)( 19972000 ) (2004)1997 7 10
More informationP2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i
27 Verification of the usefulness of the data distribution method by browser cache sharing 1160285 2016 2 26 P2P Web Proxy P2P Web Proxy P2P P2P Web Proxy P2P Web Proxy Web P2P WebProxy i Abstract Verification
More informationSNS ( ) SNS(Social Networking Service) SNS SNS i
22 SNS Job-Hunting Activities situation Understanding Support System Using SNS 1110252 2011 03 01 SNS ( ) SNS(Social Networking Service) SNS SNS i Abstract Job-Hunting Activities situation Understanding
More information