英皇娱乐_英皇娱乐平台¥国际官网

图片

Mori Takuo Laboratory
Mori Takuo Laboratory

盛拓生

The research fields of this laboratory are information security and information theory.
Information security is a field related to a wide range of fields, including mathematics, information theory, cryptography, computer science, and network theory. In principle, fourth-year students begin their graduation research by finding their own theme through meetings within the laboratory. In order to actually proceed with their research, they need to acquire skills in programming, networks, computer science, mathematics, etc. In terms of education, I am in charge of logic mathematics for first-year students, programming language theory, information theory, automata and computation theory, information science programming 1 for second-year students, and network security for third-year students.

Basic Information

Faculty name/Affiliation Takuo Mori / Department of Integrated Science and Engineering Computer Science Course
Specialized Fields Information theory, coding theory, information security
Research theme Software protection, digital content protection, personal authentication method, visual cryptography and its applications, application of virtualization technology
Research keywords Software protection, copyright protection, visual cryptography
Faculty introduction URL https://www3.med.teikyo-u.ac.jp/profile/ja.344f0c40d231b3e9.html

Our Research

Research on software protection

In current software development, the ratio of those that use intermediate languages such as Java and C #, or scripting languages such as Perl, Python, and Ruby is increasing. For intermediate languages, decompiling makes it easy to get the source code, and for scripting languages, the source code is formally executed as is. It is difficult to protect the intellectual property rights of software in such a situation. In our laboratory, we are researching a method of embedding a digital watermark in an intermediate language executable file or a method of obfuscating the source code of a script language.

Research on personal authentication methods that do not burden humans

Currently, the leakage of personal information due to unauthorized access is a social problem. Personal authentication technology represented by password authentication is one of the countermeasures against unauthorized access. It is recommended to use a random string of sufficient length for the password, and to use different passwords for different services, but due to the limited memory of human beings, it is not possible to satisfy all. It's a difficult situation. Sheng Lab proposes a method using QR code, a method using AR technology, etc. as a highly secure authentication that does not place an excessive burden on human memory.

Conference presentation

Title Society name Laboratory Contents
Introducing flipped classroom and rubric self-assessment in university programming education Education System Information Society
National convention
Mori Takuo Laboratory detail
Introducing group guidance by senior students to university programming education in flipped classroom Information Processing Society of Japan
Computer and Education Study Group CE136
Mori Takuo Laboratory detail