Vol.59 No (Sep. 2018) 1,a) , CPU CPU CPU CPU CASS 2 CASS General Constructions of Computer-aided Security Sch

Size: px
Start display at page:

Download "Vol.59 No (Sep. 2018) 1,a) , CPU CPU CPU CPU CASS 2 CASS General Constructions of Computer-aided Security Sch"

Transcription

1 1,a) , CPU CPU CPU CPU CASS 2 CASS General Constructions of Computer-aided Security Schemes Yasuyoshi Jinno 1,a) Takashi Tsuchiya 1 Tetsushi Ohki 1 Kenta Takahashi 2 Wakaha Ogata 3 Masakatsu Nishigaki 1 Received: December 11, 2017, Accepted: June 8, 2018 Abstract: CPU performance has been increasing continually. To resist attacks in such a technological environment, we must increase the entropy of secrets. However, the progress of CPU performance benefits not only attackers but also legitimate users. Security schemes specifically designed to enhance legitimate users security by exploiting CPU performance have been proposed. In this paper, we call such schemes computeraided security schemes, or CASS, and classify them into two types in terms of the aiding mechanism. We propose general constructions and provide security proofs of CASS for one type. We discuss the feasibility of CASS. Keywords: cryptology, computer-aided security, general construction, symmetric key encryption, message authentication code, public key encryption, digital signature, user authentication 1. 1 Shizuoka University, Hamamatsu, Shizuoka , Japan 2 Hitachi Ltd., Yokohama, Kanagawa , Japan 3 Tokyo Institute of Technology, Meguro, Tokyo , Japan a) yasu @gmail.com CPU c 2018 Information Processing Society of Japan 1557

2 PUF [1] [2] PUF CPU CASS bcrypt [3] PBKDF2 [4] [7] f s short s long f(s short ) CASS f L [5], [6] f [6] f(s short ) s short L CASS log 2 L [6] CASS [7] CASS s short r s short r = s long s short s short r s short r r s short r h(h(s short r)) s short r CASS CASS [7] CASS CASS [7] CASS CASS &C&R CASS CASS CASS CASS 2. CASS s long k s long k = 128 [8] CASS k u <k s short CASS s short s long s short CASS s long s long = s short r 2 s short s short r s short s long s short r CASS [7] r s short c 2018 Information Processing Society of Japan 1558

3 3. CASS C&R CASS Π SKE 3 (Gen, Enc, Dec) Gen 1 k k s long Enc s long m {0, 1} l(k) c l(k) k {0, 1} l(k) l(k) Enc Dec s long c m Dec k s long Gen(1 k ) m Dec(s long, Enc(s long,m)) = m Π SKE IND-P2-C2 [9] IND-P2-C2 Gen(1 k ) s long m i c j c i = Enc(s long,m i ) m j = Dec(s long,c j ) (m 0,m 1 ) b c b = Enc(s long,m b ) b b = b Pr[b = b ] 1/2 ΠSKE Π SKE 3 (Ĝen, Ênc, Dec) & Ĝen 1 k str {0, 1} ku s short {0, 1} ku hint Ĝen str s short k u s short s short k u CASS & str Ênc s long s short m hint c = Ênc(s short,m,hint) Dec sshort c hint m = Dec(sshort,c,hint) k str (s short, hint) Ĝen(1 k, str) m Dec(s short, Ênc(s short,m,hint), hint) =m 1 Π SKE Π SKE (Gen, Enc, Dec) (Ĝen, Ênc, Dec) Ĝen s short hint hint IND-P2-C2 Ĝen(1 k, str) (s short, hint) hint m i c j c i = Ênc(s short,m i, hint) m j = Dec(sshort,c j, hint) (m 0,m 1 ) b c b = Ênc(s short,m b, hint) b b = b Π SKE =(Gen, Enc, Dec) ΠSKE =(Ĝen, Ênc, Dec) s short Ĝen & Ĝen(1 k, str) 1 k s long = Gen(1 k ) N m 0,...,m N 1 c 0 = Enc(s long,m 0 ),...,c N 1 = Enc(s long,m N 1 ) N (s short, hint) s long = s short r s short = str = k u hint =((m 0,c 0 ),...,(m N 1,c N 1 )) Ênc(s short,m,hint) Dec((s short r), c 0 )=m 0,...,Dec((s short r),c N 1 )=m N 1 r s long = s short r s long m c = Enc(s long,m) Dec(sshort,c,hint) Ênc s short hint s long c m = Dec(s long,c) N s long =(s short r),m 0,...,m N 1 Dec((s short r ), Enc((s short r),m 0 )) = m 0. Dec((s short r ), Enc((s short r),m N 1 )) = m N 1 r r δ(n) ΠSKE 1 δ(n) c 2018 Information Processing Society of Japan 1559

4 r δ(n) N N (1 δ(n)) r N Π SKE Π SKE δ = 2 (Nl(k) k+ku) N r r m Pr[Dec((s short r ), Enc((s short r),m)) = m] =1/2 l(k) δ(n) δ(n) = Pr[ r ( r) i {0,...,N 1} : Dec((s short r ), Enc((s short r),m i )) = m i ] =1 Pr[ r ( r) i {0,...,N 1} : Dec((s short r ), Enc((s short r),m i )) m i ] ( ( 1 =1 1 2 l(k) ( 1 1 2k ku 2 Nl(k) =2 Nl(k)+k ku = δ ) N ) 2 k ku 1 ) ( 2 k k u 1 2Nl(k) l(k) =k = 128 k u = 102 δ<2 128 N =2 Π SKE N δ(n) s short Ĝen s long Π SKE ΠSKE Π SKE Π SKE ΠSKE Theorem 1. Π SKE IND-P2-C2 ΠSKE IND-P2-C2 ΠSKE q IND-P2-C2 A Π SKE q + N IND-P2-C2 B ) Proof. B ΠSKE IND-P2-C2 ε A A 1/2 ± ε Π SKE IND-P2-C2 Π SKE IND-P2-C2 ΠSKE IND-P2-C2 hint ΠSKE IND-P2-C2 Π SKE IND-P2-C2 B A hint A B A A B A hint A N Gen(1 k ) s long B A hint N m 0,...,m N 1 m 0,...,m N 1 c 0 = Enc(s long,m 0 ),...,c N 1 = Enc(s long,m N 1 ) B B ((m 0,c 0 ),...,(m N 1,c N 1 )) hint A B A A B m i c j B m i m i c i = Enc(s long,m i ) A c i B c j m j = Dec(s long,c j ) A A (m 0,m 1 ) B B (m 0,m 1 ) b c b = Enc(s long,m b ) B B A c b A b B b Π SKE (1 δ(n)) r A ΠSKE IND-P2-C2 A 1/2 ± ε b = b b δ(n) A Π SKE IND-P2-C2 A b = b b B Π SKE IND-P2-C2 Pr[r ]Pr[b = b r ] +Pr[r ]Pr[b = b r ] =(1 δ(n)) Pr[b = b r ] + δ(n)pr[b = b r ] A 1/2+ε 0 <ε<1/2 b = b b c 2018 Information Processing Society of Japan 1560

5 Pr[B Π SKE IND-P2-C2 ] =1/2+ε δ(n)(1/2+ε) 1/2+ε δ(n) (1 δ(n)) Pr[b = b r ] + δ(n) 0=(1 δ(n))(1/2+ε) (1/2+ε 1 ) B ε δ(n) A 1/2 ε 0 <ε<1/2 b = b b B ε δ(n) B ε δ(n) Q.E.D. Π SKE ΠSKE Π Mac 3 (Gen, Mac, Ver ) Gen 1 k k s long Mac s long m {0, 1} t {0, 1} l {0, 1} Mac Ver s long m t b b =1 b =0 Ver *1 k s long Gen(1 k ) m Ver (s long,m,mac(s long,m)) = 1 Π Mac EUF-CMA EUF-CMA Gen(1 k ) s long m i t i = Mac(s long,m i ) m t Ver (s long,m,t )=1 ΠMac Π Mac 3 (Ĝen, Mac, Ver ) & Ĝen 1 k str {0, 1} ku *1 Mac Ver Mac s short {0, 1} ku hint Mac slong s short m hint t = Mac(sshort,m,hint) Ver sshort m t hint b b =1 b =0 k str (s short, hint) Ĝen(1 k, str) m Ver (sshort,m, Mac(sshort,m,hint), hint) =1 1 Π Mac Π Mac ΠSKE (Gen, Mac, Ver ) (Ĝen, Mac, Ver ) hint Π MAC =(Gen, Mac, Ver ) ΠMAC =(Ĝen, Mac, Ver ) & Ĝen(1 k, str) 1 k s long = Gen(1 k ) N m 0,...,m N 1 t 0 = Mac(s long,m 0 ),...,t N 1 = Mac(s long,m N 1 ) (s short, hint) s long = s short r s short = str = k u hint = ((m 0,t 0 ),..., (m N 1,t N 1 )) Mac(sshort,m,hint) Ver ((s short r), m 0,t 0 )=1,...,Ver ((s short r),m N 1,t N 1 )=1 r s long = s short r s long m t = Mac(s long,m) Ver (sshort,m,t,hint) Mac sshort hint s long s long m t b = Ver (s long,m,t) N Ver ((s short r ),m i,t i )=1 i {0,...,N 1} r r δ(n) r N Π Mac MAC CBC-MAC HMAC Ver Mac Π MAC Pr[Mac((s short r ),m i )=Mac(s long,m i )]=1/2 l c 2018 Information Processing Society of Japan 1561

6 δ(n) = 2 l N+(k ku) l N k k u N l = 256 k = 128 CBC-MAC k u = 102 δ <2 k N =1 N δ(n) Π MAC N =1 δ(1) δ(1) Π MAC ΠMAC Π MAC Π MAC Π MAC Theorem 2. Π MAC EUF-CMA ΠMAC EUF-CMA ΠMAC q EUF-CMA A Π MAC q + N EUF-CMA B Proof. Theorem 1 Theorem 1 IND-P2-C2 EUF-CMA A ΠMAC EUF-CMA ε 1 δ(n) r r r Ver ((s short r),m 0,t 0 ) 1,...,Ver ((s short r),m N 1, t N 1 ) 1 1 B A ΠMAC EUF-CMA B Π MAC EUF-CMA ε B (1 δ(n))ε >ε δ(n) Π MAC EUF-CMA Q.E.D. Π MAC ΠMAC Π PKE 3 (Gen, Enc, Dec) Gen 1 k k sk pk Gen r k l (k) Gen(1 k ; r) Enc pk m c Dec sk c m k (sk, pk) Gen(1 k ; r) m Dec(sk, Enc(pk,m)) = m Π PKE IND-CCA2 [10] IND-CCA2 IND-P2-C2 Gen(1 k ; r) (sk, pk) pk RSA [11] sk p q (p 1)(q 1) e p q PRG [12] Π PKE PRG Π PRG PKE Π PRG PKE 3 (Gen PRG, Enc, Dec) Gen PRG 1 k (sk, pk) =Gen(1 k ; PRG(seed )) seed Gen PRG k Π PKE ΠPKE PRG Gen PRG (sk, pk) Π PKE RSA 2,048 [8] s long = s short r s short c 2018 Information Processing Society of Japan 1562

7 r ΠPKE ΠPKE PRG PRG s long PRG ΠPKE ΠPKE PRG 3 (Ĝen, Ênc, Dec) & Ĝen 1 k str {0, 1} ku s short {0, 1} ku hint pk Ênc Enc Dec sshort c hint m k str (s short, hint, pk) Ĝen(1 k, str) m Dec(sshort, Ênc(pk,m), hint) =m 1 Π PKE ΠPKE PRG CASS (Gen PRG, Enc, Dec) (Ĝen, Ênc, Dec) hint ΠPKE PRG = (Gen PRG, Enc, Dec) ΠPKE = (Ĝen, Ênc, Dec) & Ĝen(1 k, str) k s long (pk, sk) =Gen PRG (1 k ; s long ) (s short, hint, pk) s long = s short r s short = str = k u hint = pk (s short, pk) Ênc(pk,m) c = Enc(pk,m) Dec(sshort,c,hint) Gen PRG (1 k ; s short r) = pk r s long = s short r sk c m = Dec(sk,c) r r Gen PRG (1 k ; s short r) = (pk, sk) Gen PRG (1 k ; s short r) = (pk, sk ) & r r sk sk Π PKE sk sk ΠPKE RSA-OAEP hint s long h(s long ) h(s long )=h(s short r) r r CASS ΠPKE Π PKE 2 1 Π PKE ΠPKE PRG PRG Π PKE 2 ΠPKE PRG ΠPKE ΠPKE PRG Π PKE PRG Π PRG PKE ΠPRG PKE ΠPKE Π PKE Π PKE PRG Π PKE Π PKE ΠPKE PRG PRG Π PKE PRG b b =0 r b =1 seed r = PRG(seed ) r b b = b Pr[b = b ] 1/2 Theorem 3. Π PKE IND-CCA2 PRG ΠPKE PRG IND-CCA2 Π PKE IND-CCA2 Π PRG PKE IND- CCA2 A PRG B Proof. A Π PKE IND-CCA2 A ΠPKE PRG IND-CCA2 A Π PKE IND-CCA2 γ (1/2 ± γ) Π PRG PKE IND-CCA2 ζ (1/2 ± ζ) Π PKE IND-CCA2 ΠPKE PRG IND-CCA2 PRG B A 2 PRG (ζ γ)/2 PRG b b =0 r b =1 seed r = PRG(seed ) B r B r Gen (sk, pk) B (sk, pk) A IND-CCA2 c 2018 Information Processing Society of Japan 1563

8 A IND-CCA2 B r b =0 A IND-CCA2 B r b =1 b =0 B b =0 A Π PKE IND-CCA2 1 (1/2 ± γ) b =1 B b =1 A ΠPKE PRG IND-CCA2 1/2 ± ζ B (1 ± γ ± ζ)/2 PRG (ζ γ)/2 Q.E.D. Π PKE PRG ΠPKE PRG ΠPKE PRG ΠPKE ΠPKE PRG Theorem 4. ΠPKE PRG IND-CCA2 ΠPKE IND-CCA2 ΠPKE q IND-CCA2 A ΠPKE PRG q IND-CCA2 B Proof. ΠPKE hint = pk Theorem 1 2 ΠPKE PRG IND-CCA2 ΠPKE IND-CCA2 B hint pk A B A A A ΠPKE IND-CCA2 ε A 1/2 ± ε seed seed (pk, sk) Gen PRG (1 k ; seed ) B pk B pk A B A A B c i B c i c i m i = Dec(sk,c i ) A m i A (m 0,m 1 ) B B (m 0,m 1 ) b c b = Enc(pk,m b ) B B A c b A b B b A ΠPKE IND-CCA2 A 1/2 ± ε b = b B 1/2 ± ε Π PRG PKE IND-CCA2 ε Q.E.D. ΠPKE PRG ΠPKE Π DS 3 (Gen, Sig, Ver ) Gen 1 k k sk pk Gen r k l (k) Gen(1 k ; r) Sig sk m σ Ver pk m σ b b =1 b =0 k (sk, pk) Gen(1 k ; r) m Ver (pk,m,sig(sk,m)) = 1 Π DS EUF-CMA [13] EUF-CMA MAC EUF-CMA Gen(1 k ; r) (sk, pk) pk Π DS PRG ΠDS PRG ΠDS PRG 3 (Gen PRG, Sig, Ver ) Gen PRG 1 k (sk, pk) = Gen(1 k ; PRG(seed )) seed Gen PRG k Π DS ΠDS PRG Gen PRG (sk, pk) Π DS PRG ΠDS ΠDS PRG 3 (Ĝen, Ŝig, Ver ) & Ĝen 1 k str {0, 1} ku s short {0, 1} ku hint pk Ŝig s short m hint σ Ver c 2018 Information Processing Society of Japan 1564

9 Ver k str (s short, hint, pk) Ĝen(1 k, str) m Ver (pk,m,ŝig(s short,m,hint)) = 1 1 Π DS Π DS PRG CASS (Gen PRG, Sig, Ver ) (Ĝen, Ŝig, Ver ) hint Π PRG DS =(Gen PRG, Sig, Ver ) ΠDS =(Ĝen, Ŝig, Ver ) & Ĝen(1 k, str) k s long (pk, sk) =Gen PRG (1 k ; s long ) (s short, hint, pk) s long = s short r s short = str = k u hint = pk (s short, pk) Ŝig(s short,m,hint) Gen PRG (1 k ; s short r)=pk r s long = s short r sk m σ = Sig(sk,m) Ver (pk,m,σ) pk m σ b = Ver (pk,m,σ) r r Gen PRG (1 k ; s short r) = (pk, sk) Gen PRG (1 k ; s short r )=(pk, sk ) & r r sk sk Π DS sk sk ΠDS Π PRG DS hint h(s long ) Π PKE ΠDS 2 Π DS ΠDS PRG ΠDS Theorem 5. Π DS EUF-CMA PRG Π DS PRG EUF-CMA Π DS EUF-CMA Π DS PRG EUF-CMA A PRG B Proof. Theorem 3 IND-CCA2 EUF- CMA Q.E.D. Π DS PRG Π DS PRG Theorem 6. EUF-CMA ΠDS EUF-CMA ΠDS q EUF-CMA A Π PRG DS Π PRG DS q EUF-CMA B Proof. Theorem 4 Thereom 4 IND-CCA2 EUF-CMA A ΠDS EUF-CMA ε B A ΠDS EUF-CMA B ε Π PRG DS EUF-CMA Q.E.D. ΠDS PRG ΠDS 3.5 C R C&R Π CRUA 5 (Gen, Enr, CG, C 2R, Ver ) Gen 1 k k k s long Enr s long VI CG 1 k C C 2R s long C R Ver C R VI b b =1 b =0 k s long Gen(1 k ) C CG(1 k ) Ver (C, C 2R(s long,c), Enr(s long )) = 1 Π CRUA concurrent man-in-the-middle attack IMP-CMIM [16], [20] Gen(1 k ) s long Enr(s long ) VI VI c 2018 Information Processing Society of Japan 1565

10 P j *2 P j s long C j P j P j R j = C 2R(s long,c j) C C P j C R Ver (C,R, VI )=1 C&R ΠCRUA Π CRUA 5 (Ĝen, Ênr, ĈG,Ĉ2R, Ver ) & Ĝen 1 k str {0, 1} ku s long {0, 1} k s short {0, 1} ku hint Ênr Enr ĈG CG Ĉ 2R s short C hint R Ver Ver k str (s long,s short, hint) Ĝen(1 k, str) C ĈG(1 k ) Ver (C, Ĉ 2R(sshort,C,hint), Ênr(s long )) = 1 1 Π CRUA Π CRUA CASS (Gen, Enr, CG, C 2R, Ver ) (Ĝen, Ênr, ĈG,Ĉ2R, Ver ) hint Π CRUA = (Gen, Enr, CG, C 2R, Ver ) Π CRUA =(Ĝen, Ênr, ĈG,Ĉ2R, Ver ) & Ĝen(1 k, str) 1 k s long = Gen(1 k ) CG 1 k N C 0,...,C N 1 R 0 = C 2R(s long,c 0 ),...,R N 1 = C 2R(s long,c N 1 ) (s long,s short, hint) s long = s short r s short = str = k u hint =((C 0,R 0 ),...,(C N 1,R N 1 )) Ênr(s long ) Enr s long VI ĈG(1 k ) CG 1 k C C 2R(sshort,C,hint) Ver (C 0,R 0, Enr(s short r)) = 1,...,Ver (C N 1,R N 1, *2 concurrent left-concurrency Enr(s short r)) = 1 r s long = s short r s long C R = C 2R(s long,c) Ver (C, R, VI ) Ver C R VI b N MAC Ver (C i,r i, Enr(s short r )) = 1 i {0,...,N 1} r r δ(n) r N Π CRUA Π CRUA h VI = h(s long ) R = h(h(s long ),C) Ver N =1 δ(1) δ(1) δ(n) C&R Π CRUA Π CRUA ΠCRUA Π CRUA Π CRUA ΠCRUA Theorem 7. Π CRUA IMP-CMIM ΠCRUA IMP-CMIM ΠCRUA q IMP-CMIM A Π CRUA q + N IMP-CMIM B Proof. Theorem 1 2 Theorem1 2 IND-P2-C2 EUF-CMA IMP-CMIM A ΠCRUA IMP-CMIM ε A P 0,...,P q 1 B P 0,...,P q 1+N B Enr(Gen(1 k )) VI B A hint c 2018 Information Processing Society of Japan 1566

11 N CG(1 k ) C 0,...,C N 1 C 0,...,C N 1 P q,...,p q 1+N P q,...,p q 1+N R 0 = C 2R(s long,c 0 ),...,R N 1 = C 2R(s long,c N 1 ) B B ((C 0,R 0 ),...,(C N 1,R N 1 )) hint VI A B A A B C i P j B P j A C = CG(1 k ) B B A C A R B R 1 δ(n) r r r Ver (C 0,R 0, Enr(S short r )) 1,...,Ver (C N 1,R N 1, Enr(s short r )) 1 1 B A ΠCRUA IMP-CMIM B Π CRUA IMP-CMIM ε B (1 δ(n))ε >ε δ(n) Π CRUA IMP-CMIM π CRUA man-in-the-middle attack concurrent attack [14] ΠCRUA 4. CASS CASS s long s short r CPU s long r s short r s long s short CASS s short r 26 s short 102 [15] s short 102 s long = s short r r r 1 CASS s short [17] S S f G (x) f I (x) Kullback-Leibler [18] D(f G f I ) S OK /NG 2 β α β 1 α 1 β D(f G f I )=(1 β)log 2 α + β log 2 β 1 D(f G f I )= log 2 α [19] α = D(f G f I )= α 102 s short CPU s long r s short r 1 s long CASS CASS PUF [1] Gassend, B., Clarke, D., Dijk, M. and Devadas, S.: Silicon physical random functions, 9th ACM Conference c 2018 Information Processing Society of Japan 1567

12 on Computer and Communications Security, pp (2002). [2] Juels, A. and Wattenberg, M.: A fuzzy commitment scheme, 6th ACM Conference on Computer and Communications Security, pp (1999). [3] Proves, N. and Mazieres, D.: A Future-Adaptable Password Scheme, USENIX Annual Technical Conference (1999). [4] Turan, M.S., Barker, E., Burr, W. and Chen, L.: Recommendation for Password-Based Key Derivation Part 1: Storage Applications, NIST Special Publication, (2010). [5] Kelsey, J., Schneier, B., Hall, C. and Wagner, D.: Secure Applications of Low-Entropy Keys, 1997 Information Security Workshop, pp (1997). [6] Yao, F.F. and Yin, Y.L.: Design and Analysis of Password-Based Key Derivation Functions, IEEE Trans. Information Theory, Vol.51, No.9, pp (2005). [7] Vol.55, No.9, pp (2014). [8] Barker, E. and Roginsky, A.: Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, NIST Special Publication, A Revision 1 (2015). [9] Katz, J. and Yung, M.: Characterization of Security Notions for Probabilistic Private-Key Encryption, Journal of Cryptology, Vol.19, No.1, pp (2006). [10] Rackoff, C. and Simon, D.R.: Non-interactive zeroknowledge proof of knowledge and chosen ciphertext attack, Proc. Advances in Cryptology CRYPTO 91, Vol.576, pp (1991). [11] Rivest, R.L., Shamir, A. and Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Comm. ACM, Vol.21, No.2, pp (1978). [12] Yao, A.C.: Theory and Applications of Trapdoor Functions, 23rd Annual Symposium on Foundations of Computer Science, pp (1982). [13] Goldwasser, S., Micali, S. and Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks, SIAM Journal on Computing, Vol.17, No.2, pp (1988). [14] Bellare, M. and Palacio, A.: GQ and Schnorr Identification Schemes, Proofs of Security against Impersonation under Active and Concurrent Attacks, Advances in Cryptology CRYPTO 2002, pp (2002). [15] Fujita, M., Yamada, M., Arimura, S., Ikeya, Y. and Nishigaki, M.: An Attempt to Memorize Strong Passwords while Playing Games, Network-Based Information Systems, pp (2015). [16] Gennaro, R.: Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks, Advances in Cryptology CRYPTO 2004, pp (2004). [17] Takahashi, K. and Murakami, T.: A Measure of Information Gained through Biometric Systems, Elsevier Image and Vision Computing, Vol.32, No.12, pp (2014). [18] Kullback, S. and Leibler, R.A.: On Information and Sufficiency, The Annuals of Mathematical Statistics, Vol.22, No.1, pp (1951). [19] Murakami, T., Ohki, T. and Takahashi, K.: Optimal sequential fusion for multibiometric cryptosystems, Vol.32, pp (2016). [20] Anada, H. and Arita, S.: Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the- Middle Attacks, International Conference on Provable Security, ProveSec 2010, pp (2010) SISAP Best paper 2012 IEEE BTAS Best reviewed paper c 2018 Information Processing Society of Japan 1568

13 PD c 2018 Information Processing Society of Japan 1569

( )

( ) NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya

More information

28 SAS-X Proposal of Multi Device Authenticable Password Management System using SAS-X 1195074 2017 2 3 SAS-X Web ID/ ID/ Web SAS-2 SAS-X i Abstract Proposal of Multi Device Authenticable Password Management

More information

21 Key Exchange method for portable terminal with direct input by user

21 Key Exchange method for portable terminal with direct input by user 21 Key Exchange method for portable terminal with direct input by user 1110251 2011 3 17 Diffie-Hellman,..,,,,.,, 2.,.,..,,.,, Diffie-Hellman, i Abstract Key Exchange method for portable terminal with

More information

/ ( ) 1 1.1 323 206 23 ( 23 529 529 323 206 ) 23 1.2 33 1.3 323 61 61 3721 3721 323 168 168 323 23 61 61 23 1403 323 111 111 168 206 323 47 111 323 47 2 23 2 2.1 34 2 2.2 2 a, b N a b N a b (mod N) mod

More information

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63> 2008 年度版リストガイド ( メッセージ認証コード ) 平成 21 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 1 1 1.1............................. 1 1.1.1............................ 1 1.1.2....................... 1 1.1.3...........................

More information

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya,

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE {s-kasihr, wakamiya, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE. 565-0871 1 5 E-mail: {s-kasihr, wakamiya, murata}@ist.osaka-u.ac.jp PC 70% Design, implementation, and evaluation

More information

1

1 VM Secure Processor for Protecting VM and its Application to Authentication 26 2 6 48-126444 1 OS OS TPM Trusted Boot TPM Trusted Boot OS TPM Trusted Boot OS OS OS OS OS OS VM VM 2 1 1 2 3 2.1 DRM...................................

More information

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6)

DPA,, ShareLog 3) 4) 2.2 Strino Strino STRain-based user Interface with tacticle of elastic Natural ObjectsStrino 1 Strino ) PC Log-Log (2007 6) 1 2 1 3 Experimental Evaluation of Convenient Strain Measurement Using a Magnet for Digital Public Art Junghyun Kim, 1 Makoto Iida, 2 Takeshi Naemura 1 and Hiroyuki Ota 3 We present a basic technology

More information

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a 1, 1,a) 1, 2 1 1, 3 2 1 2011 6 17, 2011 12 16 Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a) Kazuki Kanamori 1, 2 Mie Nakatani 1 Hirokazu Kato 1, 3 Sanae H. Wake 2 Shogo Nishida

More information

04.™ƒ”R/’Ô”�/’Xfl©

04.™ƒ”R/’Ô”�/’Xfl© Digicashecash PC IC AI LicenseCoin License Pk A L Pk A W Rc C Coin License Okamoto and Ohta Okamoto and Ohta IC Digicashecash TTP Trusted Third Party TTP TTP TTP TTP: Trusted Third Party TTPTTP TTP TTP

More information

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro TV 1,2,a) 1 2 2015 1 26, 2015 5 21 Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Rotation Using Mobile Device Hiroyuki Kawakita 1,2,a) Toshio Nakagawa 1 Makoto Sato

More information

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for 1 2 3 3 1 Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for Mobile Terminals Kaoru Wasai 1 Fumio Sugai 2 Yosihiro Kita 3 Mi RangPark 3 Naonobu

More information

特集_03-07.Q3C

特集_03-07.Q3C 3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution

More information

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came 3DCG 1,a) 2 2 2 2 3 On rigid body animation taking into account the 3D computer graphics camera viewpoint Abstract: In using computer graphics for making games or motion pictures, physics simulation is

More information

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.,, 464 8601 470 0393 101 464 8601 E-mail: matsunagah@murase.m.is.nagoya-u.ac.jp, {ide,murase,hirayama}@is.nagoya-u.ac.jp,

More information

CryptoGame201712

CryptoGame201712 2017.12.22 9 (CRISMATH 2017) n l l 2 n A B n l à l à l à A \ B (, ) (, ) (, ) (, ) 3 n n n l n l A \ B ( -1, -1 ) ( -10, 0 ) ( 0, -10 ) ( -3, -3 ) 4 n l vs pk b m 0, m 1 b R {0,1} c c = Enc pk (m b ) n

More information

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF   a m Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki

More information

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan SNS 1,a) 2 3 3 2012 3 30, 2012 10 10 SNS SNS Development of Firefighting Knowledge Succession Support SNS in Tokyo Fire Department Koutarou Ohno 1,a) Yuki Ogawa 2 Hirohiko Suwa 3 Toshizumi Ohta 3 Received:

More information

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2 CHLAC 1 2 3 3,. (CHLAC), 1).,.,, CHLAC,.,. Suspicious Behavior Detection based on CHLAC Method Hideaki Imanishi, 1 Toyohiro Hayashi, 2 Shuichi Enokida 3 and Toshiaki Ejima 3 We have proposed a method for

More information

i

i 21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed

More information

Computer Security Symposium October 2013 Android OS kub

Computer Security Symposium October 2013 Android OS kub Computer Security Symposium 2013 21-23 October 2013 Android OS 243-0292 1030 y.kita@ccy.kanagawa-it.ac.jp mirang@nw.kanagawa-it.ac.jp 889-2192 1-1 kubota@cs.miyazaki-u.ac.jp oka@cs.miyazaki-u.ac.jp Android

More information

<4D F736F F D F81798E518D6C8E9197BF33817A88C38D868B5A8F70834B D31292E646F63>

<4D F736F F D F81798E518D6C8E9197BF33817A88C38D868B5A8F70834B D31292E646F63> 参考資料 3 CRYPTREC 暗号技術ガイドライン (SHA-1) 2014 年 3 月 独立行政法人情報通信研究機構独立行政法人情報処理推進機構 目次 1. 本書の位置付け... 1 1.1. 本書の目的... 1 1.2. 本書の構成... 1 1.3. 注意事項... 1 2. ハッシュ関数 SHA-1 の利用について... 2 2.1. 推奨されない利用範囲... 2 2.2. 許容される利用範囲...

More information

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf 1,a) 2,b) 4,c) 3,d) 4,e) Web A Review Supporting System for Whiteboard Logging Movies Based on Notes Timeline Taniguchi Yoshihide 1,a) Horiguchi Satoshi 2,b) Inoue Akifumi 4,c) Igaki Hiroshi 3,d) Hoshi

More information

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe

IPSJ SIG Technical Report Vol.2009-DPS-141 No.20 Vol.2009-GN-73 No.20 Vol.2009-EIP-46 No /11/27 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Spe 1. MIERUKEN 1 2 MIERUKEN MIERUKEN MIERUKEN: Speech Visualization System Based on Augmented Reality Yuichiro Nagano 1 and Takashi Yoshino 2 As the spread of the Augmented Reality(AR) technology and service,

More information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information

Vol.54 No (July 2013) [9] [10] [11] [12], [13] 1 Fig. 1 Flowchart of the proposed system. c 2013 Information Vol.54 No.7 1937 1950 (July 2013) 1,a) 2012 11 1, 2013 4 5 1 Similar Sounds Sentences Generator Based on Morphological Analysis Manner and Low Class Words Masaaki Kanakubo 1,a) Received: November 1, 2012,

More information

28 Horizontal angle correction using straight line detection in an equirectangular image

28 Horizontal angle correction using straight line detection in an equirectangular image 28 Horizontal angle correction using straight line detection in an equirectangular image 1170283 2017 3 1 2 i Abstract Horizontal angle correction using straight line detection in an equirectangular image

More information

[I486S] 暗号プロトコル理論

[I486S]  暗号プロトコル理論 [I486S] 2018 5 1 (JAIST) 2018 5 1 1 / 22 : I486S I URL:https://wwwjaistacjp/~fujisaki/i486S (Tuesdays) 5 17:10 18:50 4/17, 4/24, 5/1, 5/15, 5/22, 5/29, 6/5, 6/19, 6/26, 7/3, 7/10, 7/17, 7/24, 7/31 (JAIST)

More information

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a

Vol.54 No (Mar. 2013) 1,a) , A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a 1,a) 2012 6 1, 2012 12 20 A Case Study of the Publication of Information on the Japan Earthquake Naoto Matsumoto 1,a) Received: June 1, 2012, Accepted: December 20, 2012 Abstract: On the disasters, the

More information

LAN LAN LAN LAN LAN LAN,, i

LAN LAN LAN LAN LAN LAN,, i 22 A secure wireless communication system using virtualization technologies 1115139 2011 3 4 LAN LAN LAN LAN LAN LAN,, i Abstract A secure wireless communication system using virtualization technologies

More information

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c

1 1 CodeDrummer CodeMusician CodeDrummer Fig. 1 Overview of proposal system c CodeDrummer: 1 2 3 1 CodeDrummer: Sonification Methods of Function Calls in Program Execution Kazuya Sato, 1 Shigeyuki Hirai, 2 Kazutaka Maruyama 3 and Minoru Terada 1 We propose a program sonification

More information

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us

& Vol.2 No (Mar. 2012) 1,a) , Bluetooth A Health Management Service by Cell Phones and Its Us 1,a) 1 1 1 1 2 2 2011 8 10, 2011 12 2 1 Bluetooth 36 2 3 10 70 34 A Health Management Service by Cell Phones and Its Usability Evaluation Naofumi Yoshida 1,a) Daigo Matsubara 1 Naoki Ishibashi 1 Nobuo

More information

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q

4. C i k = 2 k-means C 1 i, C 2 i 5. C i x i p [ f(θ i ; x) = (2π) p 2 Vi 1 2 exp (x µ ] i) t V 1 i (x µ i ) 2 BIC BIC = 2 log L( ˆθ i ; x i C i ) + q x-means 1 2 2 x-means, x-means k-means Bayesian Information Criterion BIC Watershed x-means Moving Object Extraction Using the Number of Clusters Determined by X-means Clustering Naoki Kubo, 1 Kousuke

More information

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s

(a) 1 (b) 3. Gilbert Pernicka[2] Treibitz Schechner[3] Narasimhan [4] Kim [5] Nayar [6] [7][8][9] 2. X X X [10] [11] L L t L s L = L t + L s 1 1 1, Extraction of Transmitted Light using Parallel High-frequency Illumination Kenichiro Tanaka 1 Yasuhiro Mukaigawa 1 Yasushi Yagi 1 Abstract: We propose a new sharpening method of transmitted scene

More information

Vol.8 No (July 2015) 2/ [3] stratification / *1 2 J-REIT *2 *1 *2 J-REIT % J-REIT J-REIT 6 J-REIT J-REIT 10 J-REIT *3 J-

Vol.8 No (July 2015) 2/ [3] stratification / *1 2 J-REIT *2 *1 *2 J-REIT % J-REIT J-REIT 6 J-REIT J-REIT 10 J-REIT *3 J- Vol.8 No.2 1 9 (July 2015) 1,a) 2 3 2012 1 5 2012 3 24, 2013 12 12 2 1 2 A Factor Model for Measuring Market Risk in Real Estate Investment Hiroshi Ishijima 1,a) Akira Maeda 2 Tomohiko Taniyama 3 Received:

More information

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website

The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website The copyright of this material is retained by the Information Processing Society of Japan (IPSJ). The material has been made available on the website by the author(s) under the agreement with the IPSJ.

More information

soturon.dvi

soturon.dvi 12 Exploration Method of Various Routes with Genetic Algorithm 1010369 2001 2 5 ( Genetic Algorithm: GA ) GA 2 3 Dijkstra Dijkstra i Abstract Exploration Method of Various Routes with Genetic Algorithm

More information

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati 2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Group Name Implemation Group /Project No. 13-C /Project Leader 1009087 Takahiro Okubo /Group Leader 1009087

More information

DEIM Forum 2009 B4-6, Str

DEIM Forum 2009 B4-6, Str DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data

More information

ICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に

ICカードに利用される暗号アルゴリズムの安全性について:ENV仕様の実装上の問題点を中心に IC IC IC ICIC EMVEMV IC EMVIC EMV ICEMVRSAkey TDES TDES-MAC E-mail: masataka.suzuki@boj.or.jp NTTE-mail: kanda.masayuki@lab.ntt.co.jp IC IC IC IC EMV JCCA ICJCCA ICEMV EMVIC EMV EMV EMVEMVCo EMV EMV EMVICIC

More information

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple

IPSJ SIG Technical Report Vol.2016-CE-137 No /12/ e β /α α β β / α A judgment method of difficulty of task for a learner using simple 1 2 3 4 5 e β /α α β β / α A judgment method of difficulty of task for a learner using simple electroencephalograph Katsuyuki Umezawa 1 Takashi Ishida 2 Tomohiko Saito 3 Makoto Nakazawa 4 Shigeichi Hirasawa

More information

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing

[2] OCR [3], [4] [5] [6] [4], [7] [8], [9] 1 [10] Fig. 1 Current arrangement and size of ruby. 2 Fig. 2 Typography combined with printing 1,a) 1,b) 1,c) 2012 11 8 2012 12 18, 2013 1 27 WEB Ruby Removal Filters Using Genetic Programming for Early-modern Japanese Printed Books Taeka Awazu 1,a) Masami Takata 1,b) Kazuki Joe 1,c) Received: November

More information

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて

電子マネー・システムにおけるセキュリティ対策:リスク管理に焦点を当てて 1999 IC IC 2008 2 5 10 E-mail: masataka.suzuki@boj.or.jp E-mail: hirokawa@imes.boj.or.jp E-mail: une@imes.boj.or.jp //2008.8 39 1. 1990 2007 1 IC 1 1 20072006 2007 1 Edy Edy IC 2007 2 22 IC PASMO IC 2008

More information

Vol.57 No (Dec. 2016) CHAP 1,a) , CHAP 1 CHAP CHAP CHAP 2 Proposal and Evaluation of Methods for Mounting Protocol of M

Vol.57 No (Dec. 2016) CHAP 1,a) , CHAP 1 CHAP CHAP CHAP 2 Proposal and Evaluation of Methods for Mounting Protocol of M CHAP 1,a) 2016 3 10, 2016 9 6 CHAP 1 CHAP CHAP CHAP 2 Proposal and Evaluation of Methods for Mounting Protocol of Multi-factor Authentication over CHAP Only Masaki Inamura 1,a) Received: March 10, 2016,

More information

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1

(Requirements in communication) (efficiently) (Information Theory) (certainly) (Coding Theory) (safely) (Cryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding Theory) (safely) (ryptography) I 1 (Requirements in communication) (efficiently) (Information Theory) (certainly) (oding

More information

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP

MAC root Linux 1 OS Linux 2.6 Linux Security Modules LSM [1] Security-Enhanced Linux SELinux [2] AppArmor[3] OS OS OS LSM LSM Performance Monitor LSMP LSM OS 700-8530 3 1 1 matsuda@swlab.it.okayama-u.ac.jp tabata@cs.okayama-u.ac.jp 242-8502 1623 14 munetoh@jp.ibm.com OS Linux 2.6 Linux Security Modules LSM LSM Linux 4 OS OS LSM An Evaluation of Performance

More information

zsj2017 (Toyama) program.pdf

zsj2017 (Toyama) program.pdf 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88

More information

88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88

More information

_170825_<52D5><7269><5B66><4F1A>_<6821><4E86><5F8C><4FEE><6B63>_<518A><5B50><4F53><FF08><5168><9801><FF09>.pdf

_170825_<52D5><7269><5B66><4F1A>_<6821><4E86><5F8C><4FEE><6B63>_<518A><5B50><4F53><FF08><5168><9801><FF09>.pdf 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88 th Annual Meeting of the Zoological Society of Japan Abstracts 88

More information

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0

Core1 FabScalar VerilogHDL Cache Cache FabScalar 1 CoreConnect[2] Wishbone[3] AMBA[4] AMBA 1 AMBA ARM L2 AMBA2.0 AMBA2.0 FabScalar AHB APB AHB AMBA2.0 AMBA 1 1 1 1 FabScalar FabScalar AMBA AMBA FutureBus Improvement of AMBA Bus Frame-work for Heterogeneos Multi-processor Seto Yusuke 1 Takahiro Sasaki 1 Kazuhiko Ohno 1 Toshio Kondo 1 Abstract: The demand

More information

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:

More information

橡表紙参照.PDF

橡表紙参照.PDF CIRJE-J-58 X-12-ARIMA 2000 : 2001 6 How to use X-12-ARIMA2000 when you must: A Case Study of Hojinkigyo-Tokei Naoto Kunitomo Faculty of Economics, The University of Tokyo Abstract: We illustrate how to

More information

生体認証システムにおける情報漏洩対策技術の研究動向

生体認証システムにおける情報漏洩対策技術の研究動向 ATM 1 IC ATM ATM IC IC ATM E-mail: masataka.suzuki@boj.or.jp E-mail: inuma.manabu@aist.go.jp E-mail: a-otsuka@aist.go.jp //2010.4 229 1. 2004 ATM PC ATM FISC FISC [2009] FISC [2009] 35-1 ATM IC ATM ATM

More information

Kyushu Communication Studies 第2号

Kyushu Communication Studies 第2号 Kyushu Communication Studies. 2004. 2:1-11 2004 How College Students Use and Perceive Pictographs in Cell Phone E-mail Messages IGARASHI Noriko (Niigata University of Health and Welfare) ITOI Emi (Bunkyo

More information

9_18.dvi

9_18.dvi Vol. 49 No. 9 3180 3190 (Sep. 2008) 1, 2 3 1 1 1, 2 4 5 6 1 MRC 1 23 MRC Development and Applications of Multiple Risk Communicator Ryoichi Sasaki, 1, 2 Yuu Hidaka, 3 Takashi Moriya, 1 Katsuhiro Taniyama,

More information

DS0 0/9/ a b c d u t (a) (b) (c) (d) [].,., Del Barrio [], Pilato [], [].,,. [],.,.,,.,.,,.,, 0%,..,,, 0,.,.,. (variable-latency unit)., (a) ( DFG ).,

DS0 0/9/ a b c d u t (a) (b) (c) (d) [].,., Del Barrio [], Pilato [], [].,,. [],.,.,,.,.,,.,, 0%,..,,, 0,.,.,. (variable-latency unit)., (a) ( DFG )., DS0 0/9/,.,,.,,,.,.,.0%,.%.,,,, Speculative Execution in Distributed Controllers for High-Level Synthesis Shimizu iho Ishiura Nagisa bstract: This article proposes a method of incorporating speculative

More information

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L

Vol. 48 No. 4 Apr LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for L Vol. 48 No. 4 Apr. 2007 LAN TCP/IP LAN TCP/IP 1 PC TCP/IP 1 PC User-mode Linux 12 Development of a System to Visualize Computer Network Behavior for Learning to Associate LAN Construction Skills with TCP/IP

More information

Table 1 Type of polymeric coating materials Fig. 2 Results of suppressive effects of polymeric coating materials on the progress of neutralization of concrete. Table 2 Evaluation of the suppressive effects

More information

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig. 1 The scheme of glottal area as a function of time Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels). Fig, 4 Parametric representation

More information

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou

2. 2.1 Lytro [11] The Franken Camera [12] 2.2 Creative Coding Community Creative Coding Community [13]-[19] Sketch Fork 2.3 [20]-[23] 3. ourcam 3.1 ou 情 報 処 理 学 会 インタラクション 2013 IPSJ Interaction 2013 2013-Interaction (3EXB-06) 2013/3/2 ourcam: 1 2 ourcam ourcam: On-Site Programming Environment for Digital Photography RYO OSHIMA 1 YASUAKI KAKEHI 2 In these

More information

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of IEEE802.11 [1]Bluetooth [2] 1 1 (1) [6] Ack (Ack) BEC FEC (BEC) BEC FEC 100 20 BEC FEC 6.19% 14.1% High Throughput and Highly Reliable Transmission in MANET Masaaki Kosugi 1 and Hiroaki Higaki 1 1. LAN

More information

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme

DEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community

More information

,, 2024 2024 Web ,, ID ID. ID. ID. ID. must ID. ID. . ... BETWEENNo., - ESPNo. Works Impact of the Recruitment System of New Graduates as Temporary Staff on Transition from College to Work Naoyuki

More information

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A Vol. 45 No. 8 Aug. 2004, 1999 11 (1) (2) (3) 2003 7 Digital Evidence Enhancement for the Japanese Official Gazette Data Providing Services Atsuko Umezawa,, Hiroyuki Ueno, Yukio Miyata, Yasuharu Saikawa,

More information

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) 2 3 4 5 6 2. Vocaloid2 2006 1 PV 2009 1 1100 200 YouTube 1 minato minato ussy 3D MAD F EDis ussy 1, 2 3 1, 2 Web Fischer Social Creativity 1) Social Creativity CG Network Analysis of an Emergent Massively Collaborative Creation Community Masahiro Hamasaki, 1, 2 Hideaki Takeda 3 and Takuichi Nishimura

More information

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [

1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The Boston Public Schools system, BPS (Deferred Acceptance system, DA) (Top Trading Cycles system, TTC) cf. [13] [ Vol.2, No.x, April 2015, pp.xx-xx ISSN xxxx-xxxx 2015 4 30 2015 5 25 253-8550 1100 Tel 0467-53-2111( ) Fax 0467-54-3734 http://www.bunkyo.ac.jp/faculty/business/ 1 [1, 2, 3, 4, 5, 8, 9, 10, 12, 15] The

More information

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L

Input image Initialize variables Loop for period of oscillation Update height map Make shade image Change property of image Output image Change time L 1,a) 1,b) 1/f β Generation Method of Animation from Pictures with Natural Flicker Abstract: Some methods to create animation automatically from one picture have been proposed. There is a method that gives

More information

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( ) 1,a) 2 4 WC C WC C Grading Student programs for visualizing progress in classroom Naito Hiroshi 1,a) Saito Takashi 2 Abstract: To grade student programs in Computer-Aided Assessment system, we propose

More information

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット

第62巻 第1号 平成24年4月/石こうを用いた木材ペレット Bulletin of Japan Association for Fire Science and Engineering Vol. 62. No. 1 (2012) Development of Two-Dimensional Simple Simulation Model and Evaluation of Discharge Ability for Water Discharge of Firefighting

More information

<95DB8C9288E397C389C88A E696E6462>

<95DB8C9288E397C389C88A E696E6462> 2011 Vol.60 No.2 p.138 147 Performance of the Japanese long-term care benefit: An International comparison based on OECD health data Mie MORIKAWA[1] Takako TSUTSUI[2] [1]National Institute of Public Health,

More information

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig

Table 1. Reluctance equalization design. Fig. 2. Voltage vector of LSynRM. Fig. 4. Analytical model. Table 2. Specifications of analytical models. Fig Mover Design and Performance Analysis of Linear Synchronous Reluctance Motor with Multi-flux Barrier Masayuki Sanada, Member, Mitsutoshi Asano, Student Member, Shigeo Morimoto, Member, Yoji Takeda, Member

More information

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal

2. Eades 1) Kamada-Kawai 7) Fruchterman 2) 6) ACE 8) HDE 9) Kruskal MDS 13) 11) Kruskal AGI Active Graph Interface 3) Kruskal 5) Kruskal 4) 3. Kruskal 1 2 3 A projection-based method for interactive 3D visualization of complex graphs Masanori Takami, 1 Hiroshi Hosobe 2 and Ken Wakita 3 Proposed is a new interaction technique to manipulate graph layouts

More information

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit

IPSJ SIG Technical Report Vol.2014-MBL-70 No.49 Vol.2014-UBI-41 No /3/15 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twit 2,a) 2,b) 2,c) 2,d),e) WiFi WiFi WiFi 1. SNS GPS Twitter Facebook Twitter Ustream 1 Graduate School of Information Science and Technology, Osaka University, Japan 2 Cybermedia Center, Osaka University,

More information

Vol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support

Vol.57 No (Mar. 2016) 1,a) , L3 CG VDI VDI A Migration to a Cloud-based Information Infrastructure to Support 1,a) 1 1 2015 6 22, 2015 12 7 L3 CG 50 600 VDI VDI A Migration to a Cloud-based Information Infrastructure to Support University Education and It s Analysis Kaori Maeda 1,a) Nobuo Suematsu 1 Toshiaki Kitamura

More information

2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225

2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225 2006 Indexed Fuzzy Vault 3ADM1117 3ADM3225 1 1 2 Fuzzy Vault Scheme 2 2.1................................... 2 2.2............................... 2 2.3............................. 2 3 3 3.1 Reed-Solomon...........................

More information

”Лï−wŁfl‰IŠv‚æ89“ƒ/‚qfic“NŸH

”Лï−wŁfl‰IŠv‚æ89“ƒ/‚qfic“NŸH March Servio P KURATA YASUMICHI, A Consideration on Change of Welfare Institutions for the Aged through the History of Japan JAPAN JOURNAL OF SOCIAL SERVICES, MAY, NUMBERJAPANESE SOCIETY FOR THE STUDY

More information

P2P P2P peer peer P2P peer P2P peer P2P i

P2P P2P peer peer P2P peer P2P peer P2P i 26 P2P Proposed a system for the purpose of idle resource utilization of the computer using the P2P 1150373 2015 2 27 P2P P2P peer peer P2P peer P2P peer P2P i Abstract Proposed a system for the purpose

More information

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum

IPSJ SIG Technical Report PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fum 1 2 1 3 PIN(Personal Identification Number) An Examination of Icon-based User Authentication Method for Mobile Terminals Fumio Sugai, 1 Masami Ikeda, 2 Naonobu Okazaki 1 and Mi RangPark 3 In recent years,

More information

25 About what prevent spoofing of misusing a session information

25 About what prevent spoofing of misusing a session information 25 About what prevent spoofing of misusing a session information 1140349 2014 2 28 Web Web [1]. [2] SAS-2(Simple And Secure password authentication protocol, ver.2)[3] SAS-2 i Abstract About what prevent

More information

1 1 tf-idf tf-idf i

1 1 tf-idf tf-idf i 14 A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles 1055104 2003 1 31 1 1 tf-idf tf-idf i Abstract A Method of Article Retrieval Utilizing Characteristics in Newspaper Articles

More information

paper.dvi

paper.dvi 28 Confined Decoding System for Medical Data Distributed by Secret Sharing Scheme and Its Security Evaluation 1195046 2017 3 6 DMAT i Abstract Confined Decoding System for Medical Data Distributed by Secret

More information

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S

60 90% ICT ICT [7] [8] [9] 2. SNS [5] URL 1 A., B., C., D. Fig. 1 An interaction using Channel-Oriented Interface. SNS SNS SNS SNS [6] 3. Processing S 1,a) 1 1,b) 1,c) 1,d) Interaction Design for Communication Between Older Adults and Their Families Using Channel-Oriented Interface Takeda Keigo 1,a) Ishiwata Norihiro 1 Nakano Teppei 1,b) Akabane Makoto

More information

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô 1 / 37 (Cryptographic Hash Functions) H : {0, 1} {0, 1} l (Unkeyed hash function) (MDC: Manipulation Detection Code) (Keyed hash function) (MAC: Message Authentication Code) 2 / 37 OAEP (One-wayness) (Preimage

More information

3_23.dvi

3_23.dvi Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems

More information

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000

2797 4 5 6 7 2. 2.1 COM COM 4) 5) COM COM 3 4) 5) 2 2.2 COM COM 6) 7) 10) COM Bonanza 6) Bonanza 6 10 20 Hearts COM 7) 10) 52 4 3 Hearts 3 2,000 4,000 Vol. 50 No. 12 2796 2806 (Dec. 2009) 1 1, 2 COM TCG COM TCG COM TCG Strategy-acquisition System for Video Trading Card Game Nobuto Fujii 1 and Haruhiro Katayose 1, 2 Behavior and strategy of computers

More information

知能と情報, Vol.30, No.5, pp

知能と情報, Vol.30, No.5, pp 1, Adobe Illustrator Photoshop [1] [2] [3] Initital Values Assignment of Parameters Using Onomatopoieas for Interactive Design Tool Tsuyoshi NAKAMURA, Yuki SAWAMURA, Masayoshi KANOH, and Koji YAMADA Graduate

More information

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169

第 1 回バイオメトリクス研究会 ( 早稲田大学 ) THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169 THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS Proceedings of Biometrics Workshop,169-8555 3-4-1,169-8555 3-4-1 E-mail: s hayashi@kom.comm.waseda.ac.jp, ohki@suou.waseda.jp Wolf

More information

,,.,.,,.,.,.,.,,.,..,,,, i

,,.,.,,.,.,.,.,,.,..,,,, i 22 A person recognition using color information 1110372 2011 2 13 ,,.,.,,.,.,.,.,,.,..,,,, i Abstract A person recognition using color information Tatsumo HOJI Recently, for the purpose of collection of

More information

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu

Vol.53 No (July 2012) EV ITS 1,a) , EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Commu EVITS 1,a) 2 2 2011 10 21, 2012 4 2 EV 1 EV ITS EV ITS EV EV EV Development and Evaluation of ITS Information Communication System for Electric Vehicle Yuriko Hattori 1,a) Tomokazu Shimoda 2 Masayoshi

More information

29 jjencode JavaScript

29 jjencode JavaScript Kochi University of Technology Aca Title jjencode で難読化された JavaScript の検知 Author(s) 中村, 弘亮 Citation Date of 2018-03 issue URL http://hdl.handle.net/10173/1975 Rights Text version author Kochi, JAPAN http://kutarr.lib.kochi-tech.ac.jp/dspa

More information

08-特集04.indd

08-特集04.indd 5 2 Journal of Multimedia Aided Education Research 2008, Vol. 5, No. 2, 3543 ICT ICT ICT 2 ICT ICT 1100 2008 ICT ICT 2007 ICT ICT ICT ICT IPtalk2008 2006 LAN TCP/IP 1 35 5 22008 1 Enter 1 IPtalk 2 2 2IPtalk

More information

DEIM Forum 2009 E

DEIM Forum 2009 E DEIM Forum 2009 E5-3 464-8601 1 606-8501 464 8601 1 E-mail: lifushi@arch.itc.nagoya-u.ac.jp, mayumi@mm.media.kyoto-u.ac.jp, {hirano,kajita,mase}@itc.nagoya-u.ac.jp Abstract Study on a Recipe Recommendation

More information

04-“²†XŒØ‘�“_-6.01

04-“²†XŒØ‘�“_-6.01 Bull. Natn. Sci. Mus., Tokyo, Ser. E, 28, pp. 31 47, December 22, 2005 169 0073 3 23 1 153 8904 4 6 1 270 2261 2 16 4 124 0014 2 10 15 523 0058 961 The Mechanism of Automatic Display for the Temporal Hour

More information

:

: An Analysis of TV Game Market: From the viewpoints of network externalities and whole of services Masaki Matsumura, Hiroyuki Kurimoto, and Toshio Kobayashi It has been understood that a standard would

More information

1 2 4 5 9 10 12 3 6 11 13 14 0 8 7 15 Iteration 0 Iteration 1 1 Iteration 2 Iteration 3 N N N! N 1 MOPT(Merge Optimization) 3) MOPT 8192 2 16384 5 MOP

1 2 4 5 9 10 12 3 6 11 13 14 0 8 7 15 Iteration 0 Iteration 1 1 Iteration 2 Iteration 3 N N N! N 1 MOPT(Merge Optimization) 3) MOPT 8192 2 16384 5 MOP 10000 SFMOPT / / MOPT(Merge OPTimization) MOPT FMOPT(Fast MOPT) FMOPT SFMOPT(Subgrouping FMOPT) SFMOPT 2 8192 31 The Proposal and Evaluation of SFMOPT, a Task Mapping Method for 10000 Tasks Haruka Asano

More information

1 p.27 Fig. 1 Example of a koto score. [1] 1 1 [1] A 2. Rogers [4] Zhang [5] [6] [7] Löchtefeld [8] Xiao [

1 p.27 Fig. 1 Example of a koto score. [1] 1 1 [1] A 2. Rogers [4] Zhang [5] [6] [7] Löchtefeld [8] Xiao [ 1,a) 1 2017 6 7, 2017 12 8 25 Evaluation of Koto Learning Support Method Considering Articulations Mayuka Doi 1,a) Homei Miyashita 1 Received: June 7, 2017, Accepted: December 8, 2017 Abstract: Koto players

More information

2 ( ) i

2 ( ) i 25 Study on Rating System in Multi-player Games with Imperfect Information 1165069 2014 2 28 2 ( ) i ii Abstract Study on Rating System in Multi-player Games with Imperfect Information Shigehiko MORITA

More information

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc

IPSJ SIG Technical Report iphone iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Proc iphone 1 1 1 iphone,,., OpenGl ES 2.0 GLSL(OpenGL Shading Language), iphone GPGPU(General-Purpose Computing on Graphics Processing Unit)., AR Realtime Natural Feature Tracking Library for iphone Makoto

More information

Microsoft Word - deim2011_new-ichinose-20110325.doc

Microsoft Word - deim2011_new-ichinose-20110325.doc DEIM Forum 2011 B7-4 252-0882 5322 E-mail: {t08099ai, kurabaya, kiyoki}@sfc.keio.ac.jp A Music Search Database System with a Selector for Impressive-Sections of Continuous Data Aya ICHINOSE Shuichi KURABAYASHI

More information

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-

IPSJ SIG Technical Report Vol.2011-EC-19 No /3/ ,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi- 1 3 5 4 1 2 1,.,., Peg-Scope Viewer,,.,,,,. Utilization of Watching Logs for Support of Multi-View Video Contents Kosuke Niwa, 1 Shogo Tokai, 3 Tetsuya Kawamoto, 5 Toshiaki Fujii, 4 Marutani Takafumi,

More information