英皇娱乐_英皇娱乐平台¥国际官网

图片

Mori Takuo Laboratory
Mori Takuo Laboratory

Takuo Mori

Our research fields are information security and information theory.
Information security is a field related to a wide range of fields such as mathematics, information theory, cryptography, computer science, and network theory. As a general rule, 4th grade graduation research begins with finding a theme for yourself through meetings in the laboratory. In order to actually proceed with research, it is necessary to develop programming, networking, computer science, mathematics, and other skills.
Regarding education, I am in charge of 1st grade logic mathematics, 2nd grade programming language theory, information theory, automata and theory of computation, and information science programming 1st and 3rd grade network security.

Basic Information

Faculty name/Affiliation Takuo Mori / Department of Information and Electronic Engineering, Faculty of Science and Engineering
Specialized Fields Information theory, coding theory, information security
Research theme Software protection, digital content protection, personal authentication method, visual cryptography and its applications, application of virtualization technology
Research keywords Software protection, copyright protection, visual cryptography
Faculty introduction URL https://www3.med.teikyo-u.ac.jp/profile/ja.344f0c40d231b3e9.html

Our Research

Research on software protection

In current software development, the ratio of those that use intermediate languages such as Java and C #, or scripting languages such as Perl, Python, and Ruby is increasing. For intermediate languages, decompiling makes it easy to get the source code, and for scripting languages, the source code is formally executed as is. It is difficult to protect the intellectual property rights of software in such a situation. In our laboratory, we are researching a method of embedding a digital watermark in an intermediate language executable file or a method of obfuscating the source code of a script language.

Research on personal authentication methods that do not burden humans

Currently, the leakage of personal information due to unauthorized access is a social problem. Personal authentication technology represented by password authentication is one of the countermeasures against unauthorized access. It is recommended to use a random string of sufficient length for the password, and to use different passwords for different services, but due to the limited memory of human beings, it is not possible to satisfy all. It's a difficult situation. Sheng Lab proposes a method using QR code, a method using AR technology, etc. as a highly secure authentication that does not place an excessive burden on human memory.

Conference presentation

Title Society name Laboratory Contents
Introducing flipped classroom and rubric self-assessment in university programming education Education System Information Society
National convention
Mori Takuo Laboratory detail
Introducing group guidance by senior students to university programming education in flipped classroom Information Processing Society of Japan
Computer and Education Study Group CE136
Mori Takuo Laboratory detail

 

Introducing the FacultyThis section introduces details about the research and the passionate thoughts around the research.

Introduction of Associate Professor Takuo Mori

Discover the fascinating and untold stories behind the cutting-edge research being conducted by our esteemed professors. Get an in-depth look at the motivations and passions driving their work, and learn how their findings are making a real impact on society. Don't miss the opportunity to gain a deeper understanding of the amazing work being done right here at our laboratory!

Introduction of Mori Takuo