IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information and Communication System Security (ICSS)  (Searched in: 2014)

Search Results: Keywords 'from:2014-07-03 to:2014-07-03'

[Go to Official ICSS Homepage] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 37  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:15
Hokkaido San-Refure Hakodate Consideration on Side-Channel Information Toward Authentication
Arisa Matsubara, Yang Li (UEC), Yu-ichi Hayashi (Tohoku Univ.), Kazuo Sakiyama (UEC) ISEC2014-10 SITE2014-5 ICSS2014-14 EMM2014-10
Recently, authentication using near field communication is widely spread for entrance and exit control and electronic mo... [more] ISEC2014-10 SITE2014-5 ICSS2014-14 EMM2014-10
pp.1-8
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:40
Hokkaido San-Refure Hakodate A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals
Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
Act on Electronic Signatures and Certification Business was revised and duties of Public Certification Service for Indiv... [more] ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
pp.9-16
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:05
Hokkaido San-Refure Hakodate A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack
Daisuke Moriyama (NICT) ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12
Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneous... [more] ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12
pp.17-24
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:30
Hokkaido San-Refure Hakodate Privacy Preserving Conditional Disclosure II
Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.) ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13
In SCIS2012, we proposed a privacy preserving and utilization scheme, called the privacy preserving conditional disclosu... [more] ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13
pp.25-30
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:15
Hokkaido San-Refure Hakodate Dynamic Security Control Architecture on Hybrid-cloud
Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo) ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14
Recently, it is increasing that the multiple cloud services are used because cloud computing has been spread. However, i... [more] ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14
pp.61-67
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:40
Hokkaido San-Refure Hakodate Deceptive defense architecture toward protection against APT
Takahiro Kakumaru, Shigeyoshi Shima, Masafumi Watanabe (NEC), Katsunari Yoshioka (YNU) ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15
It has been difficult to detect all of increasingly-sophisticated cyber-attacks, so that we must assume th... [more] ISEC2014-15 SITE2014-10 ICSS2014-19 EMM2014-15
pp.69-74
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:05
Hokkaido San-Refure Hakodate Implementation of FPGA Section for Anomaly Detection Acceleration by HW/SW Cooperation
Shun Yanase, Hajime Shimada, Yukiko Yamaguchi, Hiroki Takakura (Nagoya Univ.) ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
Anomaly-based Intrusion Detection System (anomaly IDS) is an approach of the IDS which creates a discrimination circuit ... [more] ISEC2014-16 SITE2014-11 ICSS2014-20 EMM2014-16
pp.75-80
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:30
Hokkaido San-Refure Hakodate Experimental Platform for CAN
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17
Embedded systems are used for various purposes and are widely prevalent.
It turned out that embedded systems for which ... [more]
ISEC2014-17 SITE2014-12 ICSS2014-21 EMM2014-17
pp.81-87
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
13:50
Hokkaido San-Refure Hakodate On a PRNG based on non-commutative algebra and its applications
Satoshi Iriyama, Yoshiharu Tanaka, Toshihide Hara, Masanori Ohya (TUS) ISEC2014-18 SITE2014-13 ICSS2014-22 EMM2014-18
 [more] ISEC2014-18 SITE2014-13 ICSS2014-22 EMM2014-18
pp.89-91
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:15
Hokkaido San-Refure Hakodate Security of RSA with Many Decryption Exponents
Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
When we use small secret exponents, RSA becomes efficient for its decryption cost and signature generation cost. However... [more] ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19
pp.93-96
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:40
Hokkaido San-Refure Hakodate A New Precomputation Method with Perfect Conjugate-Addition Sequence
Ryota Takahashi, Atsuko Miyaji (JAIST) ISEC2014-20 SITE2014-15 ICSS2014-24 EMM2014-20
In elliptic curve cryptosystems, a scalar multiplication is the dominant computation.
For speeding up elliptic curve c... [more]
ISEC2014-20 SITE2014-15 ICSS2014-24 EMM2014-20
pp.97-104
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
13:25
Hokkaido San-Refure Hakodate Authentication for mobile devices using behavioral biometrics with adaptive templates
Shigeki Karita, Kumi Nakamura (Osaka Univ.), Kazuhiro Kono (Kansai Univ), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21
This paper proposes a template renewal method for improving authentication accuracy in biometric authentication with beh... [more] ISEC2014-21 SITE2014-16 ICSS2014-25 EMM2014-21
pp.133-138
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
13:50
Hokkaido San-Refure Hakodate A proposal of authentication methods against shoulder surfing using a sub channel
Akira Aratani, Atsushi Kanai (Hosei Univ.) ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22
The compromise of personal information has become a social problem as the rapid spread of smart phones and tablet-type d... [more] ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22
pp.139-144
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:15
Hokkaido San-Refure Hakodate Evaluation of a Classification Table for Invasion of Privacy in SNSs Using Normalized Rank Method
Shimon Machida (SOKENDAI), Tomoko Kajiyama (Aoyama Gakuin Univ.), Shigeru Shimada (AIIT), Isao Echizen (NII) ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
By posting a message to Social Networking Service(SNS) unintentionally, the message, including personal information, is ... [more] ISEC2014-23 SITE2014-18 ICSS2014-27 EMM2014-23
pp.145-148
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:40
Hokkaido San-Refure Hakodate A quantification method of the degree of personal information disclosure using statistical data
Tomoyasu Shirayama, Atsushi Kanai (Hosei Univ) ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24
In recent years, we have come to be seen many cases where the user is in the disclosure of personal information unconsci... [more] ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24
pp.149-154
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
15:45
Hokkaido San-Refure Hakodate Data authentication scheme suitable for broadcast in the sensor networks
Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
pp.155-162
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:10
Hokkaido San-Refure Hakodate Forward-Secure Sequential Aggregate Message Authentication Revisited
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more]
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26
pp.163-170
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:35
Hokkaido San-Refure Hakodate On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT) ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27
pp.171-179
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
15:20
Hokkaido San-Refure Hakodate Privacy Invasion and the Concept of the "Digital Person" -- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory --
Takushi Otani (Kibi International Univ.) ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28
This article explores the harm caused by the misuses of the “digital person,” which is the aggregated personal data from... [more] ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28
pp.205-212
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
15:45
Hokkaido San-Refure Hakodate Comparison on personal information protection ordinates of prefectures and government-designated cities.
Arata Ito, Tetsutaro Uehara (Ritsumeikan Univ.) ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29
As the governmental works are computerized more and more, it is discussed how personal information possessed by the gove... [more] ISEC2014-29 SITE2014-24 ICSS2014-33 EMM2014-29
pp.213-220
 Results 1 - 20 of 37  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan