News

2019.9.18

講演会のご案内(Prof. Edgar R. Weippl, SBA Research)

この度,SBA ResearchからProf. Edgar R. Weipplを お招きして,下記の 講演会を9月18日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能 ですので,ふるってご参加 頂けますと幸いです.
* Title: Distributed Ledger Technology, Blockchain & Crypto Currencies – An Opportunity for Inter- and Trans-Disciplinary Research
* Speaker: Prof. Edgar R. Weippl, SBA Research
* 日時: 9月18日(水) 13:30-14:30
* 場所: 国立情報学研究所 18階 1810室


***Abstract***
https://blockchain.sba-research.org/
With the increase of interconnectivity and ubiquitous data access, new services have emerged. Distributed Ledger Technologies and their underlying principles can be used to reach agreement or consensus upon a distributed state in a highly distributed environment. They have many different aspects and can therefore be viewed from various angles, including the financial and economic, legal, political, and sociological perspective, as well as considering technical and socio-technical points of view. In the presentation I will show three properties that are important in our research: (1) theoretical foundations, (2) understanding real world phenomena, and (3) impact. For instance, proof-of-work (PoW) as used in Bitcoin is not only relevant to achieving consensus but also serves as a source of randomness used leader selection. Moreover, understanding economic incentives and malicious behavior (aka incentive attacks) to undermine consensus in public blockchains is important to create a stable blockchain environment upon which new services can be built.

***Bio of Prof. Edgar R. Weippl***
www.sba-research.org
www.sqi.at
Edgar R. Weippl is Research Director of SBA Research, Head of the Christian Doppler Laboratory for Security and Quality Improvement in Production Systems at TU Wien, and Key Researcher for one area in the Austrian Blockchain Center (ABC). He also teaches and supports research at UAS St. Pölten. Edgar focuses on (1) fundamental and applied research on blockchain and distributed ledger technologies and (2) security of production systems engineering.
He is on the editorial board of Elsevier’s Computers & Security journal (COSE), was PC chair of ESORICS 2015, general chair of ACM CCS 2016 and PC Chair of SACMAT 2017.
After graduating with a Ph.D. from the Vienna University of Technology, Edgar worked for two years in a research startup. He spent one year teaching as an assistant professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant for an HMO in New York, NY and Albany, NY, and for the financial industry in Frankfurt, Germany. In 2004 he joined the Vienna University of Technology and together with A Min Tjoa and Markus Klemen founded the research center SBA Research.

2019.8.30

講演会のご案内(Prof. Dr. Dr. h.c. Günter Müller, University of Freiburg)

この度,University of FreiburgからProf. Dr. Dr. h.c. Günter Müllerを お招きして,下記の 講演会を8月30日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能 ですので,ふるってご参加 頂けますと幸いです.
* Title: What does EU General Data Protection Regulation (GDPR) protect?
* Speaker: Prof. Dr. Dr. h.c. Günter Müller, University of Freiburg
* 日時: 8月30日(金) 13:30-14:30
* 場所: 国立情報学研究所 19階 1901室

***Abstract***
The GDPR is an EU Directive about Data Protection, just one year old, and causes more criticism than applause. Some claim that GDPR does not protect data, like “sun protection” does not protect the sun. Indeed, the limitation to procedural rules, lacking a legal objective, has e.g. made the Facebook Cambridge Analytica scandal a violation of widely felt digital codes, but not covered by the GDPR. On the other hand, there is hardly any other regulation to control the eight dominant platforms and Big Data. GDPR has innovations, i.e. the right to be forgotten and data portability, and it discusses the decision of algorithms. The passive secrecy approach to data protection omits anonymous data, i.e. those with no direct personal relationship, that constitute about 80% of all Big Data, and can be easily personalized. The focus of GDPR is on the time of “Data Delivery” while users are left alone with understanding the “Data Response”, not knowing the structure of algorithms nor the kind of data used for the response. The double secrecy of GDPR and the Big Data of platforms increases information asymmetry. Based on a Studies in Freiburg University, on the most advanced transparency tool GoogelMyAccount and the analysis of transactions, a control infrastructure with transparency replacing the secrecy of GDPR will be presented.

***Bio of Prof. Dr. Dr. h.c. Günter Müller***
https://www.telematik.uni-freiburg.de/aboutus/staff/staff?person=M%C3%BCller_G

2018.9.25

講演会のご案内(Professor Guenter Mueller, University of Freiburg)

この度,University of FreiburgからProf. Guenter Muellerを お招きして,下記の 講演会を9月25日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能 ですので,ふるってご参加 頂けますと幸いです.

* Title: Why business processes are not secure ?
* Speaker: Professor Guenter Mueller, University of Freiburg
* 日時: 9月25日(火) 14:00-15:00
* 場所: 国立情報学研究所 19階 1903室

***Abstract***
Cases like Worldcom, Societee General show how easy it is to manipulate digital business processes to reach deviating outcomes. One approach to counter this is process mining. Logs are analyzed and compared to business models. Experiences with a posteri process mining are discussed.

***Bio of Professor Guenter Mueller***
https://www.telematik.uni-freiburg.de/aboutus/staff/staff?person=M%C3%BCller_G

2018.9.3

Deepfake detection: a method to automatically detect face tampering in videos
We are the first in the world to develop new technology for accurately detecting hyper-realistic forged videos: deepfake and face2face. Traditional image forensics techniques are usually not well suited to videos due to their compression that strongly degrades the data. Thus, we follow a deep learning approach and build two networks, both with a low number of layers to focus on mesoscopic properties of the image. We evaluate those fast networks on both an existing dataset and a dataset we have constituted from online videos. Our tests demonstrate a successful detection for more than 98% for deepfake and 95% for face2face.


Reference:
MesoNet: a Compact Facial Video Forgery Detection Network, Darius Afchar, Vincent Nozick, Junichi Yamagishi and Isao Echizen, in
IEEE Workshop on Information Forensics and Security, WIFS, December 2018.


2017.7.31

PrivacyVisor 2nd modelの製品化資金の募集(FAAVOさばえ)

鯖江市が管理・運営するクラウドファンディング事業(FAAVOさばえ)にて、 PrivacyVisor 2nd modelの製品化資金の募集を開始しました。
https://faavo.jp/sabae/project/2023

2017.1.16

News video titled "'Peace' signs risk fingerprint theft, says Japanese study" is released from Reuters.
http://www.reuters.com/video/2017/01/16/peace-signs-risk-fingerprint-theft-says?videoId=370920514

2017.1.16

BiometricJammerの講演スライド公開

先般の報道で多くの方から技術および評価実験の詳細の問い合わせがありましたの で,コンピュータセキュリティシンポジウム2016(CSS2016)で発表した下記講演ス ライドを公開致します
BiometricJammer: ユーザの利便性を考慮した指紋の盗撮防止手法

2016.12.23

越前研究室がテクノロジストマガジンに掲載されました
https://www.criprof.com/magazine/2016/12/23/post-3567/

2016.12.12

越前教授がIEEE SPS Information Forensics and Security Technical Committee (IFS TC)のMemberに選出されました
IEEE SPS Information Forensics and Security

2016.10.20
National Institute of Informatics, Digital Content and Media Sciences Research Division
Echizen Laboratory, Postdoctoral Fellow

  1. Job title
    Postdoctoral fellow
    * Based on performance, successful applicants may be named Assistant Professor by Special Appointment.
  2. Number of positions
    Several
  3. Work location
    National Institute of Informatics
    (Gakujutsu Sougou Center, Hitotsubashi 2-1-2, Chiyoda-ku, Tokyo)
    Directions: 3-5 minutes walk from exit A9 of the Jimbocho subway station on the Toei Shinjuku Line, or from exit 1b of the Takebashi subway station on the Tozai Line (refer to the map at
    http://www.nii.ac.jp/en/about/access).
    URL:http://www.nii.ac.jp/en/
  4. Affiliation
    Echizen Laboratory, Digital Content and Media Sciences Research Division, National Institute of Informatics (NII)
  5. Work description
    Echizen and Yamagishi Laboratories of the National Institute of Informatics have taken a leading role in tackling research issues relating to JSPS Grant-in-Aid for Scientific Research (S) project Communication System for Defending against Attacks of Media Clones. This project involves a number of research areas including media processing, pattern recognition, machine learning, computer vision, biometrics, and privacy enhancing technologies. For an overview of this project, take a look at this site: http://www2c.comm.eng.osaka-u.ac.jp/proj/mc/eindex.html
  6. Reference sites
    JSPS Grant-in-Aid for Scientific Research (S) Communication System for Defending against Attacks of Media Clones: http://www2c.comm.eng.osaka-u.ac.jp/proj/mc/eindex.html
    Echizen Laboratory, National Institute of Informatics: http://research.nii.ac.jp/~iechizen/official/index-e.html
    Yamagishi Laboratory, National Institute of Informatics: http://www.nii.ac.jp/en/faculty/digital_content/yamagishi_junichi/
  7. Qualifications
    Applicants should hold or expect to hold a doctoral degree or equivalent academic credential by the appointment date. Note that preference will be shown to applicants with experience and knowledge of more than one of the areas listed in Item 5 above.
  8. Period of employment
    April 1, 2017 to March 31, 2018
    * The job starting date is negotiable
    * The starting date may be updated based on assessment of work, current status of work, budgetary consideration, etc. However, under no circumstances will the job go beyond March 31, 2018. The contract may be renewed on a yearly basis.
  9. Workdays
    Five days a week, Monday through Friday
    * Days off: Saturdays, Sundays, public holidays, and year-end and New Year's holidays (December 29 - January 3).
    * Summer vacation: Any two consecutive days between August 12 and 18, excluding Saturdays and Sundays.
  10. Working hours
    Seven hours and 45 minutes per day under a discretionary work system.
  11. Vacation
    Conferred in accordance with regulations:
    Annual paid leave
    Vacation other than annual paid leave
  12. Salary
    Paid in accordance with regulations:
    Basic wage: from \300,000 to \400,000 per month (calculated based on experience)
    Commuting allowance: Amount paid to cover actual commuting costs
    Payday: At month-end closing, generally on the 17th of the next month
  13. Social insurance
    Employment and workers' compensation insurance covered by the Ministry of Education, Culture, Sports, Science and Technology Mutual Aid Association in accordance with laws and regulations.
  14. Documentation
    Mail the following documents to Echizen Laboratory, and write on the envelop "Application for postdoc fellowship position at Echizen Laboratory" in red ink: Curriculum vitae (including academic records, degrees, awards and prizes, return address, and photograph), a list of publications (divided clearly into refereed journal papers and others), copies of three relevant papers, a brief summary of research and related contributions (up to one A4 page in length), and the name and address of one personal reference who can speak on behalf of the applicant.
  15. Selection procedure
    After reviewing application documents, interviews will be arranged with applicants where required. All travel and accommodation expenses incurred in connection with the selection process shall be borne by the applicants.
  16. Notification of application results
    Applicants will be promptly notified of the results of the selection process.
  17. Application deadline
    Application must be received by Monday, February 20, 2017 (screening can be conducted at any time, and the selection process will be terminated when successful applicants have been chosen).
  18. Inquires and address to send applications
    Digital Content and Media Sciences Research Division National Institute of Informatics Hitotsubashi 2-1-2, Chiyoda-ku Tokyo 101-8430
    Contact: Isao Echizen
    Tel: 03-4212-2516
    E-mail: iechizen (at) nii.ac.jp (replace (at) with @ when sending email).
  19. Other
    Please send all inquiries by e-mail to the address shown in Item 17 above. Please include "Echizen Laboratory postdoctoral fellow application" in the subject line.

  20. * Application document will be used solely for the purpose of assessing applicants. At the conclusion of the selection process, all application documents will be destroyed (and cannot be returned) except for those of the successful applicants, which will be used to provide personnel, employment, and salary details.

2016.9.14

越前功教授らが国際会議IFIP I3E2016でBest Paper Awardを受賞

Authors : Eina Hashimoto, Masatsugu Ichino, Tetsuji Kuboyama, Isao Echizen, Hiroshi Yoshiura
Title : Breaking Anonymity of Social Network Accounts by Using Coordinated and Extensible Classifiers based on Machine Learning, e-Services and e-Society, LNCS 9844, pp.455-470, Swansea, UK, Sep, 2016.  
IFIP I3E2016

2016.9.9

特任研究員 募集 (締切日延長しました)

国立情報学研究所 コンテンツ科学研究系 越前研究室 特任研究員(特定有期雇用職員)

1.職名:

  • 特任研究員(特定有期雇用職員)
    ※入所後、業績により特任助教の称号付与を行う場合有

2.募集人員:

  • 若干名

3.勤務地:

4.所属:

  • 国立情報学研究所 コンテンツ科学研究系 越前研究室

5.職務内容:

6.資格・条件:

  • 既に博士号取得あるいは採用予定日までに取得見込みの者、もしくは博士号取得相当の研究業績があると認められる者
  • 上記5.で挙げた研究分野のうち,複数の分野に知見があることが望ましい

7.雇用期間:

  • 平成28年12月1日 ~ 平成29年3月31日
    ※ 着任日は応相談
    ※ 業務の評価結果、業務の状況及び予算等により更新することがある。ただし、最長で平成33年3月31日まで。契約の更新は年度ごとに行うこととする。

8.勤務日:

  • 週5日(月~金)
    ※ 土・日曜日、祝日法に基づく休日、12月29日~1月3日は休日
    ※ 夏季休業:8月12日~18日の土・日を除く連続する2日間

9.勤務時間:

  • 裁量労働制(1日7時間45分勤務したとみなす)

10.休 暇:

  • 規則に基づき付与
  • 年次有給休暇
  • 年次有給休暇以外の休暇

11.給 与:

  • 規則に基づき支給
    • 基本給 : 月額30~40万円程度(経験に応じ算定)
    • 通勤手当: 支給要件を満たした場合に実費相当額を支給
    • 支給日 : 毎月末締め、原則当月17日

12.社会保険:

  • 文部科学省共済組合、雇用保険及び労災保険については、法令及び規則に基づき加入する

13.提出書類:

  • 封筒に「越前研究室 特任研究員応募書類」と朱書の上、下記を郵送してください。

    1. 履歴書(学歴、学位、受賞歴、連絡先メールアドレスを記入、写真添付)および、研究業績一覧(論文/発表種別、査読有無で分類して記載)
    2. 主要な学術論文のコピー(3編以内)
    3. これまでの研究概要と研究の抱負(計A4用紙1枚程度)
    4. 本人に関する所見を求め得る方1名の氏名と連絡先

14.選考方法:

  • 書類選考の後、必要に応じて面接日をご連絡します。
    面接試験等、来所に係る旅費等は応募者の負担とします。

15.採否通知:

  • 採否については、速やかに本人あてに通知します。

16.応募締切:

  • 平成29年2月20日(月)(必着)(随時選考。決まり次第締め切ります。)

17.書類送付先・問い合わせ先:

  1. 書類送付先・問い合わせ先
    〒101-8430 東京都千代田区一ツ橋2-1-2
    国立情報学研究所 コンテンツ科学研究系
    担当 : 越前 功
    TEL : 03-4212-2516
    E-mail : iechizen(a)nii.ac.jp
    (a)を@に置き換えてください。

18.その他:

  • お問い合わせは、上記17.まで、なるべくメールでお願いいたします。件名は「越前研究室 特任研究員応募」としてください。
  • 本公募に提出された個人情報については、選考の目的に限って利用し、選考終了後は、職員として採用される方の情報を除き、すべての個人情報は責任をもって破棄します。職員として採用される方については、人事、労務、給与関係処理等採用手続き及び所内の各種手続きに使用させていただきますので、あらかじめご了承願います。

2016.8.9

講演会のご案内(Professor Guenter Mueller, University of Freiburg)

この度,University of FreiburgからProf. Guenter Muellerを お招きして,下記の 講演会を8月9日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能 ですので,ふるってご参加 頂けますと幸いです.

* Title: Heuristic Approaches to Horizontal Security for Industry 4.0
* Speaker: Professor Guenter Mueller, University of Freiburg
* 日時: 8月9日(火) 14:00-15:00
* 場所: 国立情報学研究所 20階 2004室

***Abstract***
There is no security in IoT (Internet of things) especially not in Industry 4.0, unless the concept of security is modified in two directions:?

    1. If access control no longer only includes user identities and if authentication not only examines PII (Personal Identity Information) but demands proof according to rules, then security is possible.
    2. If authorization not only means that a given user identity is included in the access control list but a proven functionality, then security is possible.

?This talk presents new set of heuristic approaches to security since finding an optimal solution seems impossible or impractical, while heuristic detection methods can be used to speed up the process of finding a satisfactory solution for security in IoT. ?For this purpose Petri-Nets of the are used for the proof for rules and functionality. In this talk it is assumed that ?Industry 4.0 processes are logged and analyzed according to security relevant criteria; e.g. obstruction, behavioral deviation, resource and time or Performance Clustering.? Deviation from expected behavior is considered a hint for potential security issues, but it is not a proof of security violations.


***Bio of Professor Guenter Mueller***
https://www.telematik.uni-freiburg.de/aboutus/staff/staff?person=M%C3%BCller_G

2016.7.5

越前教授が科研費 基盤研究(S)「メディアクローン攻撃を防御するコミュニケーショ ン系」に研究分担者として参画

越前教授が,科研費 基盤研究(S)「メディアクローン攻撃を防御するコミュニケー ション系」(研究代表者 大阪大学 馬場口 登 教授,H28-32年度)に研究分担者とし て参画しました.

科研費 基盤研究(S)「メディアクローン攻撃を防御するコミュニケーション系」の
Webサイト

2016.7.6

講演会のご案内(Professor Edgar Weippl, Vienna University of Technology)

この度,ウィーン工科大学からEdgar Weippl先生をお招きして,下記の講演会を7月6
日に開催致します.
参加費無料,事前登録不要,どなたでも参加可能ですので,ふるってご参加頂けます
と幸いです.


* 日時: 7月6日(水) 14:00-15:00
* 場所: 国立情報学研究所 19階 1902室
* Title: Empirical Research in Information Security
* Speaker: Professor Edgar Weippl, Vienna University of Technology, Austria
                 
http://www.ifs.tuwien.ac.at/~weippl/

***Abstract***
Empirical research in information security is becoming increasingly important as many large scale cloud systems and complex decentralized networked systems are used today by millions of people. Often, the systems’
characteristics cannot be observed directly, either because the operators of centralized services do not provide this information (e.g. Facebook, Amazon) or because the decentralized nature does not allow doing so (e.g. crypto protocols used on servers, Tor). In addition, software development becomes more complex as software is developed in large, globally distributed teams so that one has to operate under the assumption that within any large team there are people trying to incorporate malicious code into the code base. Up to date there is little work that provides any empirical evidence on how widespread such problems are and whether there are effective means (and
which) to mitigate this risk.

Research methodology in information security is evolving and many of the earlier well-known empirical research findings are hard to reproduce for two main reasons: First, the original data is not or no longer available or may have been altered. Second, research ethics have changed and some experiments are no longer an acceptable practice.

In this presentation I will (1) highlight the impact of our past research in the field, (2) show how promising theoretical concepts can be explored and applied to important empirical problems, and (3) explore future research paths in the field.


***Bio of Professor Edgar Weippl***
After working at a research startup for two years, Edgar spent one year teaching Algorithms, AI and Database Systems as an Assistant Professor at Beloit College, WI. From 2002 to 2004, while with the software vendor ISIS Papyrus, he worked as a consultant in New York, NY and Albany, NY, and in Frankfurt, Germany. In 2004 he joined the TU Wien and founded the research center SBA Research together with A Min Tjoa and Markus Klemen, where he has been working full time as Research Director since 2006.

Edgar R. Weippl is member of the editorial board of Elsevier’s Computers & Security (COSE), organizes the ARES conference and was General Chair of SACMAT 2015, PC Chair of Esorics 2015 and is General Chair of ACM CCS 2016.
He is member of many PCs including ACM CCS and Esorics. In 2015 he received the ACM SIGSAC Service Award.

2016.6.24

越前教授が「めがねのまち さばえ」でワークショップを開催

6月23日・24日、コンテンツ科学研究系の越前功教授は、福井県鯖江市立の進徳小学校と片上小学校でワークショップ「プライバシーを守るめがねをつくろう!」を行いました。

詳細
牧野鯖江市長のBlog
福井新聞Online

2016.5.27

PrivacyVisorが株式会社ニッセイ(眼鏡資材総合商社・福井県鯖江市)より製品化されました。

株式会社ニッセイによるプレスリリース
牧野鯖江市長のBlog

2016.3.25

総研大の町田史門さんが国立情報学研究所優秀学生賞を受賞しました。

BestStudentAward

2016.2.16

越前功教授が情報セキュリティ文化賞を受賞

越前功教授が情報セキュリティ大学院大学の第12回情報セキュリティ文化賞を受賞し ました。
本賞は、わが国の情報セキュリティ分野の進展に大きく貢献した個人を表彰すること を通じ、情報セキュリティの高度化に寄与することを目的として、情報セキュリティ 大学院大学が2005年2月に制定したものです。

受賞理由
撮像にノイズを混入させるという独創的な着眼点により画像の盗撮を無効化する新しい盗撮防止技術を確立し著作権侵害や情報漏えいの防止に寄与するとともに、これを人間に応用し、カメラの写りこみによるプライバシー侵害を防止する技術を世界で初めて確立してサイバーとフィジカルの境界におけるプライバシー保護を実現するなど、情報セキュリティの確保およびプライバシー保護に関する顕著な研究業績により実社会のセキュリティ向上に多大な貢献をしたこと。

情報セキュリティ大学院大学|第12回「情報セキュリティ文化賞」受賞者を決定




2015.12.01

ドイツ技術博物館の常設展示品にPrivacyVisorが選定

ベルリンのドイツ技術博物館(German Museum of Technology)で今年9月から開催し ている常設展 “The Network: People, Cables, Data Streams” に,PrivacyVisor が選定・展示されました.
German Museum of Technology
[Permanent exhibition] The Network: People, Cables, Data Streams

            

2015.9.8

講演会のご案内(Professor Guenter Mueller, University of Freiburg)

この度,University of FreiburgからProf. Guenter Muellerを お招きして,下記の講演会を9月8日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能ですので,ふるってご参加 頂けますと幸いです.

* Date: 14h00-15h00PM, Tuesday, September 8th
* Venue: Rooms #1903, 19th floor, National Institute of Informatics
* Title: BitCoin - Better than Money?
* Speaker: Professor Guenter Mueller, University of Freiburg

***Abstract***
The presently dominating money system has huge transaction costs. These are the profits of the financial organizations and the speculation in exchange rates and prices. The term financial industry implicates an independence from the real economy. Bubbles show that this is an illusion. Bubbles happen when too much money is available, and thus money must be destroyed. CryptoCurrencies can theoretically solve this, and BitCoin is the most advanced cryptosystem. It is not the first, but the most accepted CryptoCurrency. Decentralization by eliminating banks resulted in reduction of transaction cost. Control of money is done by cryptographic algorithms and under the observation of the whole net community in the block chain. This idealistic picture has recently experienced severe damages. Several criminal cases, like the theft at Mt Gox or the money laundering in Silkroad, but also the limited privacy as well as the in transparent decision making of anonymous centralized bodies to solve doublespending and volatility of exchange rates has caused comments that CryptoCurrency at its present state of development supports rather criminals than normal users.
***Bio of Professor Guenter Mueller***
 
https://www.telematik.uni-freiburg.de/aboutus/staff/staff?person=M%C3%BCller_G

2015.5.12

越前功教授がNIIオープンハウスにて小中学生のための情報学ワークショップを行います。
対象は小学生(5~6年)・中学生で、予約制となっております。
予約方法等詳細は下記リンクをご参照ください。
  
小中学生のための情報学ワークショップ
  NIIオープンハウス2015

2014.12.26

越前功教授が雑誌AERAの特集号「日本を突破する100人」の一人として紹介されました。

2015年1月5日発行,AERA (朝日新聞出版),特集「日本を突破する100人 2015, vol. 28, no.1487, p.35

2014.10.24

10月25日(土)から27日(日)に鯖江市にて開催予定の 「さばえものづくり博覧会」にて,プライバシーバイザーの展示を行います。

関連記事:
MONOist,10/23,3Dプリンタを活用した鯖江の眼鏡づくり技術が“個人情報を守る眼鏡”の研究に貢献   http://monoist.atmarkit.co.jp/mn/articles/1410/23/news068.html
マイナビニュース,10/23,個人情報を保護する眼鏡「プライバシーバイザー」の開発に3Dプリンタが貢献  http://news.mynavi.jp/news/2014/10/23/174/

2014.10.7

越前功 教授が、第13回ドコモ・モバイル・サイエンス賞において先端技術部門優秀賞を受賞しました。

応募業績: 「サイバーとフィジカルの境界におけるセキュリティ・プライバシー保護技術の研究開発」
受賞者: 越前 功(国立情報学研究所 コンテンツ科学研究系 教授)

NPO法人 モバイル・コミュニケーション・ファンド
ドコモ・モバイル・サイエンス賞

2014.10.7

総研大の町田史門さんが一般社団法人情報処理学会2014年度山下記念研究賞を受賞

町田史門さん(総合研究大学院大学 越前研究室)がコンピュータセキュリティシンポジウム(CSS2013)において発表した以下の論文が2014年度山下記念研究賞(社団法人情報処理学会)を受賞しました。

論文名: “SNS上のプライバシーセンシティブ情報の漏洩検知に基づく公開範囲の設定方式” 情報処理学会コンピュータセキュリティシンポジウム2013 (CSS2013)論文集,2F3-1,8 pages,2013年10月
著者名: 町田史門,嶋田 茂,越前 功

一般社団法人情報処理学会 2014年度山下記念研究賞

2014.7.7

越前 功教授は、プライバシーバイザーの共同開発者である安藤 毅氏(エアスケープ建築設計事務所)と福井県鯖江市の牧野百男市長を訪問しました。

牧野百男 鯖江市長ブログ:http://ameblo.jp/hyakuo/entry-11890404077.html

国立情報学研究所 facebook:https://www.facebook.com/jouhouken?hc_location=timeline

安藤 毅 氏のブログ:http://airscape.seesaa.net/article/401427060.html

2014.6.6

越前 功教授らが、一般社団法人 情報処理学会「2013年度 論文賞」を受賞しました。

論文名 「人間とデバイスの感度の違いを利用したディスプレイ盗撮防止方式」

著者名 山田隆行、合志清一、越前 功

2014.5.23

講演会のご案内(Dr. Ioannis Krontiris, Goethe University Frankfurt, Germany)

この度,Goethe University Frankfurt, GermanyからDr. Ioannis Krontirisをお招きして,下記の講演会を6月9日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能ですので,ふるってご参加 頂けますと幸いです.

* 日時: 6月9日(月) 14:00-15:00
* 場所: 国立情報学研究所 19階 1901室
* アクセス: 
http://www.nii.ac.jp/about/access/
* Speaker: Dr. Ioannis Krontiris, Goethe University Frankfurt, Germany
* Title: "Privacy Attribute-Based Credentials in practice - concepts and trials"

* Abstract:
When using the Internet people leave various digital tracks that are being used for profiling and identification. Although privacy-enhancing technologies (PETs) can help online users to protect their privacy effectively, not many of them have found their way into the everyday life.
Most frequently stated reasons for the poor adoption are the difficulties for non-specialists to grasp the purpose of the technologies and the necessity of privacy protection, and also poor usability of the tools.
Privacy Attribute-Based Credentials (Privacy-ABCs) is a specific PET that allows users to minimally disclose certified information when authenticating with online service providers. The EU-project ABC4Trust tests for the first time this technology with large-scale user trials and brings it closer to practical adoption. In this presentation we will discuss the possibilities that Privacy-ABCs have to offer for privacy protection and then focus on the experiences from the project and especially from the trials, discussing how the users interacted with the technology.

*Bio of Dr. Ioannis Krontiris:
Dr. Ioannis Krontiris is a senior researcher in the Deutsche Telekom Chair of Mobile Business & Multilateral Security at Goethe University Frankfurt, Germany. Dr. Krontiris holds a Ph.D. in Computer Science from Mannheim University, Germany and a M.Sc. in Information Networking from Carnegie Mellon University, USA. His research focuses on identity management, online privacy, and privacy in mobile applications. He is technical coordinator of ABC4Trust, an EU-project that investigates common architectures for privacy respecting attribute based credential systems and their deployment in practice. He is also the chair of the IFIP WG11.2 on Pervasive Systems Security.

2014.5.20

NIIオープンハウスにてデモ・ポスター展示のご案内

国立情報学研究所では毎年オープンハウス(研究成果発表・一般公開)を開催し、研究成果や活動についてのポスター展示・デモ、講演会などを行っています。

越前研究室にて行うデモ・ポスター展示は以下のとおりとなります。どうぞお気軽にお越し下さい。

・デモ
カメラの写りこみによるプライバシー侵害を防止するには
プライバシーバイザー:光の反射・吸収特性を利用した撮影画像からの顔検出防止手法
要旨 ▼
カメラ付き携帯端末の普及や、SNSや画像検索技術の進展により、無断で撮影・開示 された写真を通じて、被撮影者がいつ・どこにいたかという情報が容易に公開される ことになり、被撮影者のプライバシー保護が求められています。本技術は、光の反 射・吸収特性を利用したプライバシーバイザーを被撮影者が装着することで、人対人 の自然なコミュニケーションを確保しつつ、撮影された画像からの人物の顔検出を失 敗させることが可能です。
詳細 : http://www.nii.ac.jp/event/openhouse/posters#F

・ポスター展示
ソーシャル・メディアを安心・安全に楽しむために
SNSでプライバシー漏洩を防ぐための公開範囲の設定手法
要旨 ▼
自分自身や友人の不用意なSNS投稿によってセンシティブな情報が漏洩し、予期しな い問題を引き起こすことがあります。SNSでは、どのような情報を投稿しない方が良 いのでしょうか?また、誰に対して非公開とすべきしょうか。本研究では、投稿者が 投稿予定のメッセージからセンシティブな情報を検知し、その投稿内容に応じた公開 範囲を自動提案する手法を提案します。
町田 史門(総研大)
梶山 朋子、嶋田 茂、越前 功

詳細 : http://www.nii.ac.jp/event/openhouse/posters/#H

2014.3.04

講演会のご案内(Professor Guenter Mueller, University of Freiburg)

この度,University of FreiburgからProfessor Guenter Mueller をお招きして,下記の講演会を3月13日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能ですので, ふるってご参加頂けますと幸いです.

* Date: 14h00-15h00PM, Thursday, March 13th
* Venue: Room 2004, 20th floor, National Institute of Informatics
* Title: "Is Privacy an inferior property in Smart Grids?"
* Speaker: Professor Guenter Mueller, University of Freiburg

***Abstract***
Smart Meters allow the remote collection of fine-grained readings to support energy management. It is expected that energy consumption will be reduced and a load management for renewable energy is possible. In the US, but especially in Germany and in the European Union Directive 2009/72/EC promotes the deployment of smart grids. It states that, where initial pilots are positive, 80% of consumers shall be equipped with smart meters by year 2020. Experiences in the United States and Holland have shown that such an efficiency oriented legislation leaves consumers without choice but to accept the associated privacy threats. The success of the infrastructure remains limited. Till to date, policy tools, e.g. data protection laws or voluntary regulation, represent the only employed protective measures against privacy invasions by outsiders or insiders of the energy industry. The talk discusses the European and German approaches and will show in so called feedback loops that pseudonyms have deficits. In the European project IUrban, the author is responsible for privacy mechanisms to be studied in experimental smart grids of the city of Rijeka in Croatia and Plowdiv in Bulgaria. The objective is to reach both privacy and efficiency in energy management.

***Bio of Professor Guenter Mueller***
2011 The Technical University of Darmstadt has honored Prof. Muller with an honorary doctoral degree (Dr. rer. nat. h.c.) in order to recognize his achievements in the field of computer science, especially research in databases, internet, and IT security. Also, the award honors his participation in establishing IT security as its own discipline of research both in Germany and internationally. His contributions to establishment of scientific channels between Japan and Germany was especially honored. 2010 On March 5, Prof. Muller has received the "Ehrenkreuz erster Klasse", a decoration with medal, for services rendered to science and arts. The Austrian consul general, representing the Federal President of Austria, has awarded this distinction to Professor Muller in Munich. A major reason for this award are Professor Muller's contributions to the area of open computer networks. 2009 Upon the recommendation of Prof. Muller, the Austrian President has visited NII in September 2009, especially Prof. Sonehara’s field of activity. 2008 Established MOU between NII and University of Freiburg on behalf of the University of Freiburg, Germany 2006 Chair of International Conference on Emerging Trends in Information and Communication Security (ETRICS) From 1999 to 2006 he represented German Research Foundation with regard to security (research priority program "Security in information and communication technology“). Before, he did the same on more industrialized fashion for Daimler-Benz Foundation. The results are ISO standards for protection goals. 1990 Call of the University of Freiburg as Full Professor and Founder Director of new Institute for Computer Science and Society, University of Freiburg, Germany 1987 Director of IBM and demonstration of first heterogeneous Network at Telecom 87, with OSI, where X-400 (e-mail has been defined) 1985 Founder of European center for computer network research of IBM Heidelberg, Germany 1983 Venia Docendi for Applied Computer Science (University of Vienna, Austria) 1978 IBM Germany GmbH 1977/78 IBM/USA, research lab San Jose, California, USA ("Postdoc") 1976 PhD for applied computer sciences at University of Duisburg, Germany

2014.2.06

連続講義のご案内(Prof. Edgar Weippl, Vienna University of Technology)

この度,ウィーン工科大学からEdgar Weippl先生をお招きして, “Recent Trends in Cyber Security”に関する連続講義を2月18日-21日 の4日間で開催致します.(無料,事前登録不要です)
Weippl先生は,ウィーン工科大が出資した産学連携センター(SBA Research)の Research directorを兼務されており,ARES ConferenceのOrganizerでもあります. 皆さま,奮ってご参加ください.

*講義スケジュール
Lecture 1: Cloud Security and Mobile Application Security (Feb 18 14:00-15:30)
Lecture 2: Social Engineering (Feb 19 10:30-12:00)
Lecture 3: Privacy (Feb 20 10:00-11:30)
Lecture 4: Malware Analysis, Software Obfuscation and the Ethics of Large Scale Malware Evaluation (Feb 21 10:30-12:00)


* 詳しい講義情報につきましては,下記のページをご参照ください.
http://www.nii.ac.jp/en/event/list/0218
*場所 国立情報学研究所 20階 2005号室
*アクセス  http://www.nii.ac.jp/about/access/

2014.1.28

越前功准教授がBBCからInterviewを受けました

BBC News(UK)BBC One, BBC Two, BBC News Channel and BBC World News Channel Click, January 25, 2014
 
https://www.youtube.com/watch?v=1I0pqEdgaA8&feature=c4-overview&list=UUYNExa kJwt5T9B6UyI7Qbkw '  

2013.12.03

講演会のご案内(Dr. Klaus Rechert, University of Freiburg)

この度,University of FreiburgからDr. Klaus Rechertをお招きして,下記の講演会を12月16日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能ですので,ふるってご参加 頂けますと幸いです.

* 日時: 12月16日(月) 13:30-14:30
* 場所: 国立情報学研究所 19階 1901室
* アクセス: 
http://www.nii.ac.jp/about/access/
* Title: "Securing access to complex electronic business processes and? research data: requirements, challenges and lessons learned"
* Speaker: Dr. Klaus Rechert, University of Freiburg

* Abstract:
The information age has changed the economic landscape and research environments thoroughly. Nearly every piece of valuable scientific or business information is created, transferred and stored digitally.
Moreover, the information is not necessarily bound to single, easy identifiable digital objects but can be embedded in complex (business) processes, which may include multiple interconnected machines. In terms of digital objects and environments even ten years are a huge timespan when trying to keep them accessible and usable as they are threatened by constantly changing technologies and the associated risk of hardware and software obsolescence. Reconstructing and re-enacting these processes and associated digital objects, e.g. due to regulation or legislative requirements, a legal dispute or an audit, may be required at some point. Then, both authenticity of reproduction and associated costs will matter.

*Bio of Dr. Klaus Rechert:
Klaus Rechert is currently the project coordinator of state-wide initiative on research data management and long-term accessibility of research data. His research focus is on privacy protection in complex data and digital forensics.

From 2006-2009 Klaus was a lecturer at the University of Freiburg. In
2010 Klaus was a guest lecturer at Malta College of Art, Science & Technology. From Oct. 2010 - Mar. 2011 he was a visiting researcher at the National Institute of Informatics (NII) in Tokyo, Japan.

Since 2013 Klaus holds doctoral degree from the University of Freiburg.
In 2006 Klaus received the EXIST-Seed scholarship sponsored by the Federal Ministry of Economics and Technology. Klaus studied Computer Science and Economics at the University of Freiburg and received a Diploma in Computer Science in 2005.

2013.11.12

総研大の町田 史門さんが、情報処理学会コンピュータセキュリティシンポジウム2013 (CSS2013)にてコンセプト論文賞・優秀論文賞を受賞しました。

論文タイトル:「SNS上のプライバシーセンシティブ情報の漏洩検知に基づく公開範囲の設定方式 」町田 史門、嶋田 茂、越前 功

CSS2013 CSS2013

 
2013.9.06

越前功准教授がBBC RadioからInterviewを受けました

BBC Radio 5Live, Eye-Tech, August 27, 2013
BBC Radio 5Live  
http://www.bbc.co.uk/podcasts/series/pods'  
Eye-Tech   http://downloads.bbc.co.uk/podcasts/fivelive/pods/pods_20130827-0330b.mp3'

2013.7.12

講演会のご案内(Dr. Volkmar Lotz, SAP Product Security Research)

この度,SAP Product Security ResearchからVolkmar Lotz博士をお招きして, 下記の講演会を8月9日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能ですので,ふるってご参加 頂けますと幸いです.

* 日時: 8月9日(金) 16:30-17:30
* 場所: 国立情報学研究所 20階 2005室
* アクセス: 
http://www.nii.ac.jp/about/access/
* Title: Securing Applications over the Cloud ? A Research Perspective
* Speaker: Dr. Volkmar Lotz, SAP Product Security Research   
*Abstract:
Trust issues still constitute a major barrier for businesses to enter the cloud. The risk of losing control over sensitive data and applications is frequently considered as more significant than the economic advantages offered by the cloud. SLAs only provide a partial remedy, since they increase transparency of the requirements and obligations, but do not by themselves enforce the rules and restrictions ? in case of violations a cloud customer needs to resort to contractual law, if such violations can be detected at all. Technology research has therefore been focusing on providing enforcement mechanisms that overcome the trust barrier: trust assumptions ? in particular those on benign behavior of cloud providers, cloud-based applications and their users ? are replaced by IT architectures and mechanisms that technically enforce the desired security properties in an explicitly defined application scenario and trust context.
In this talk, we present three research directions and recent results, each of which addresses a different scenario and security context. While all of them are suited to reduce the level of trust that needs to be put on entities in the cloud, they differ with respect to the threat model covered, the cloud players addressed, the degree of enforcement that can be achieved and the strength of the remaining trust assumptions.
Ideally, enforcement mechanisms can provide security guarantees and, hence, fully replace trust assumptions in the respective scenario, given that they are correctly implemented. Two of the presented research directions provide such ideal solutions while still being efficient:

  1. Queries on encrypted databases allow outsourcing databases to the cloud while protecting them against disclosure to the cloud provider and its administrators without the need to retrieve the data for processing. Data are encrypted and queries are transformed in a way that they can be directly executed on the encrypted data, the results then being decrypted at the client. To support different types of queries at maximum possible level of security, different encryption schemes with specific properties (random, deterministic, order-preserving, homomorphic etc.) are deployed. Layering of the schemes ensures that a weaker algorithm is only used if it is needed to execute the query. We present a prototype implementation of this concept for SAP HANA, including optimizations balancing security and performance.
  2. Multi-party secure computing addresses scenarios, where joint computations involving several entities are to be performed over a cloud platform, where neither the cloud provider nor the participating entities can be trusted, and no trusted third party can be relied on. Examples of such computations include benchmarking and collaborative Supply Chain Management, where computation results are to be shared among the entities but the input parameters need to be kept secret. The challenge is to find cryptographic schemes that are both secure and efficient and scale to a large problem class. We present concepts and research prototypes that implement such schemes for the abovementioned application scenarios.

The third research direction presented is Usage Control. Usage Control is an extension of access control where access to data is granted only with respect to certain obligations which restrict the behavior of the data processor. Such obligations include notification upon specific events, deletion after a specified period, data retention, or context restrictions. Obligations can be expressed through declarative policies attached to the data (“sticky policies”) which are enforced through specific policy decision and enforcement points which intercept the data access and monitor events. This solution does not replace trust, but focuses the possible degree of enforcement dependent on the applicable trust model. For instance, if the cloud provider can be trusted and data access occurs through the cloud platform’s persistency layer, obligations can be enforced through a policy aware database connector. If in addition the application can be trusted (but not its users), the scope of enforcement can be extended to the application’s local store. We present application prototypes for both scenarios and show the additional effort for policy evaluation can be minimized using in-memory databases for the policy store.
All of the presented research areas contribute to overcome trust issues in the cloud, focusing on specific trust assumptions and application scenarios. With mature solutions emerging, the cloud can unfold its full potential while respecting the protection needs of sensitive businesses.

*Bio of Dr. Volkmar Lotz:
Volkmar Lotz has more than 20 years experience in industrial research on Security and Software Engineering. He is heading SAP’s Product Security Research, a group of 35+ researchers investigating into applied research and innovative security solutions for modern software platforms, networked enterprises and Future Internet applications, covering the whole development and product life cycle. The group defines and executes SAP's security research agenda in alignment with SAP's business strategy and global research trends.
Volkmar’s current research interests include Service Security, Data-centric Security, Security Engineering, Formal Methods and Compliance. Volkmar has published numerous scientific papers in his area of interest and is regularly serving on Programme Committees of internationally renowned conferences. He has been supervising various European projects, including large-scale integrated projects. Volkmar holds a diploma in Computer Science from the University of Kaiserslautern.

2013.7.02

プライバシーバイザーが英BBC Newsに掲載されました

BBC News, How to get away from everyday technology July 1, 2013

2013.6.21

プライバシーバイザーが米TIMEと米NBC newsに掲載されました

TIME, Leery of Facial Recognition? These Glasses Might Help June 20, 2013

NBC News, LED-powered 'privacy visor' thwarts facial recognition June 20, 2013

2013.5.31

NIIオープンハウスにてワークショップ開催のご案内

◆ワークショップ【対象:高校生・学生・一般】
個人情報を守る!プライバシーバイザー
越前 功(コンテンツ科学研究系)
6月15日(土)11:00-12:00 2F小会議室(定員50名)

 カメラ付き携帯端末の普及や、SNSや画像検索技術の進展により、無断で撮影・開示された写真を通じて、被撮影者がいつ・どこにいたかという情報が容易に公開されることになり、被撮影者のプライバシー保護が求められています。今回開発した新技術は、人の視覚に影響を与えず、カメラへのみ影響を与える近赤外線光源を配置したプライバシーバイザーを被撮影者が装着することで、撮影時のみ被撮影者の顔認識を不能にすることが可能です。
  本ワークショップでは、プライバシーバイザー体験シミュレーターを用いて参加者の皆様にプライバシーバイザーを実際に制作して頂きます。プライバシーを守る技術を体験してみましょう。

[詳細・お申込み]
NIIオープンハウス2013 : 
http://www.nii.ac.jp/event/openhouse/
Facebook : http://www.facebook.com/photo.php?fbid=473676199381677&set=a.369412983141333.84318.361926843889947&type=1

2013.3.18

講演会のご案内(Professor Alexander Pretschner, Technische Universitaet Muenchen)

この度,ミュンヘン工科大学からAlexander Pretschner先生をお招きして, 下記の講演会を4月8日に開催致します. 参加費無料,事前登録不要,どなたでも参加可能ですので,ふるってご参加 頂けますと幸いです.

* 日時: 4月8日(月) 10:30-12:00
* 場所: 国立情報学研究所 20階 2009/2010号室
* アクセス: 
http://www.nii.ac.jp/about/access/
* Title: Distributed Data Usage Control
* Speaker: Prof. Dr. Alexander Pretschner, Technische Universitaet Muenchen   
   http://www22.in.tum.de/en/alexander-pretschner/

Abstract:
Distributed data usage control is about what happens to data once it? is given away ("delete after 30 days;" "notify me if data is? forwarded;" "copy at most twice"). In the past, we have considered the? problem in terms of policies, enforcement and guarantees from two
perspectives: (a) In order to protect data, it is necessary to? distinguish between content (a song by Elvis called "Love me
Tender") and representations of that content (song.mp3; song.wav, etc.).
This requires data flow-tracking concepts and capabilities in data usage control frameworks. (b) These representations exist at different? layers of
abstraction:
a picture downloaded from the internet exists as pixmap (window? manager), as element in the browser-created DOM tree (application),? and as cache file (operating system). This requires the data flow? tracking capabilities to transcend the single layers to which they are? deployed. In distributed systems, it has turned out that another? system can be seen as another set of abstraction layers, thus? generalizing the basic model. Demo videos of this work available at http://www22.in.tum.de/forschung/distributed-usage-control/.

?In this talk, we present recent work on extending our approach to not? only protecting entire data items but possibly also fractions of data? items.
This allows us to specify and enforce policies such as "not? more than 20% of the data may leave the system", evidently leading to? interesting questions concerning the interpretation of "20%", and if? the structure of data items cannot be exploited. We present a? respective model, an implementation, and first experimental results.

Bio of Prof. Dr. Alexander Pretschner:
Alexander Pretschner is a full professor of computer science at Technische Universitaet Muenchen. Prior appointments include a full professorship at Karlsruhe Institute of Technology; an adjunct associate professorship at TU Kaiserslautern; a group management position at the Fraunhofer Institute for Experimental Software Engineering in Kaiserslautern; guest professorships at the universities of Rennes, Trento, and Innsbruck; and a senior researcher's position at ETH Zurich. PhD degree from Technische Universitaet Muenchen; Master's degrees from Kansas University, on a Fulbright scholarship, and from RWTH Aachen.? Research interests include software engineering, specifically testing; and information security, specifically distributed data usage control. Recent awards include an IBM faculty award, a Google research award, and a Google focused research award. Member of the editorial board of the IEEE Transactions on Secure and Dependable Computing, the Journal of Software Testing, Verification, and Reliability, and the Journal of Software Systems Modeling; membership in ca. 90 program committees; organization of ca. 25 symposia; frequent invited speaker; frequent reviewer for national and international funding agencies.

 

2013.2.15

連続講義のご案内(Prof. Edgar Weippl, Vienna University of Technology)

この度,ウィーン工科大学からEdgar Weippl先生をお招きして, “Recent Trends in Cyber Security”に関する連続講義を2月25日,26日,27日 の3日間で開催致します.(無料,事前登録不要です)
Weippl先生は,ウィーン工科大が出資した産学連携センター(SBA Research)の Research directorを兼務されており,ARES ConferenceのOrganizerでもあります. 皆さま,奮ってご参加ください.

*Edgar Weippl先生のご略歴
  
http://www.sba-research.org/team/management/edgar-weippl/
*講義スケジュール
(2/25 10:30-12:00, 2/26 14:00-15:30, 2/27 10:30-12:00, 14:00-15:30)
Lecture 1: Cloud Security and Mobile Application Security (Monday, Feb.25, 10:30-12:00)
Lecture 2: Digital Forensics 2.0(Tuesday, Feb.26, 14:00-15:30)
Lecture 3: Privacy (Wednesday, Feb.27, 10:30-12:00)
Lecture 4: Malware Analysis, Software Obfuscation and the Ethics of Large Scale Malware Evaluation (Wednesday, Feb.27, 14:00-15:30)

* 詳しい講義情報につきましては,下記のページをご参照ください.
  http://www.nii.ac.jp/en/event/list/0225
*場所 国立情報学研究所 20階 2001号室
*アクセス  http://www.nii.ac.jp/about/access/

2013.1.23

プライバシーバイザーが英BBC Newsに掲載されました

BBC News(UK), Privacy visor blocks facial recognition software January 22, 2013

2012.12.12

報道発表 「人間とデバイスの感度の違いを利用したプライバシー保護技術 -カメラの写りこみによるプライバシー侵害を被撮影者側から防止- 」

 
2012.11.13

越前功 准教授らが、公益社団法人発明協会主催による平成24年度関東地方発明表彰にて発明奨励賞を受賞しました。

本表彰は、明治37年設立の発明協会が、大正10年より実施しているものであり、実施されている優れた技術やデザインを生み出した技術者・研究開発者を顕彰するものです。
発明名称:二値画像用電子透かし(特許第4193665号)
発明者:藤井 康広、中野 和典、越前 功、吉浦 裕

 
2012.11.09

越前功 准教授らが、International Workshop on Security (IWSEC) 2012にて Best Poster Award を受賞しました。

論文タイトル:「Privacy Visor: wearable device for privacy protection based on differences in sensory perception between humans and devices」 Takayuki YAMADA、Seiichi GOHSHI、Isao ECHIZEN

IWSEC

 
2012.11.07

総研大の山田隆行さんが、情報処理学会コンピュータセキュリティシンポジウム2012 (CSS2012)にてCSS2012優秀論文賞を受賞しました。

論文タイトル:「カメラによる写りこみを防止するプライバシーバイザーの提案」 山田 隆行、合志 清一、越前 功

CSS2012

 
2012.9.26

総研大の山田隆行さんが平成24年度国立情報学研究所優秀学生賞を受賞しました。

yamada

 
2012.06.15

山形県立酒田光陵高等学校 高校1年生に研究紹介を行いました。

山形県立酒田光陵高等学校 情報科の高校1年生が研修活動でNIIに来所しました。当研究室の研究紹介およびデモ展示を行いました。

      

            
 
2012.05.08

Dr. Michael Salmonyによる講演会を開催しました。 
Title: Banking and Payments in Europe
Speaker: Dr. Michael Salmony
Instigator and Chairman at EISB - Equens Innovation Sounding Board,Adviser Expert Group eInvoicing at European Commission,and Executive Adviser, BoD Strategy at Equens SE
Abstract: I would explore what is unique about the payments business of banking and show that this is undergoing radical change in Europe. Based upon this structural change we have set up a company that processes payments and which has now become the market leader in Europe - and will aim to show why this has been such a success. However basic payments are shown to be only the first step in modern banking business. Innovations around payments are now developing with great speed - more from non-banks like Google, Paypal, Amazon - and it is shown how the banking industry can react to this. Indeed an active counter-strategy of developing innovations using a structured systematic approach is shown. This is a step to what may be considered a contradiction in terms: industrial production of innovations. Some examples of the process to develop this are shown and some examples of concrete innovations which will address the challenges of the future.

                               
           
English
〒101-8430
東京都千代田区一ツ橋2-1-2
国立情報学研究所
越前研究室
TEL:03-4212-2516
FAX:03-4212-2120