IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev HWS Conf / Next HWS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Hardware Security (HWS) [schedule] [select]
Chair Tsutomu Matsumoto (Yokohama National Univ.)
Vice Chair Shinichi Kawamura (Toshiba), Makoto Ikeda (Univ. of Tokyo)
Secretary Noriyuki Miura (Kobe Univ.), Hiroki Kunii (SECOM)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Atsushi Fujioka (Kanagawa Univ.)
Vice Chair Shiho Moriai (NICT), Shoichi Hirose (Univ. of Fukui)
Secretary Toshihiro Ohigashi (Tokai Univ.), Keita Emura (NICT)
Assistant Kazunari Omote (Tsukuba Univ.), Yuuji Suga (IIJ)

Technical Committee on Social Implications of Technology and Information Ethics (SITE) [schedule] [select]
Chair Tetsuya Morizumi (Kanagawa Univ.)
Vice Chair Masaru Ogawa (Kobe Gakuin Univ.), Takushi Otani (Kibi International Univ.)
Secretary Kanako Kawaguchi (Tokyo Univ. of the Arts), Akiyoshi Kabeya (Toyo Eiwa Univ.)
Assistant Hisanori Kato (KDDI Research), Nobuyuki Yoshinaga (Yamaguchi Pref Univ.), Daisuke Suzuki (Hokuriku Univ.)

Technical Committee on Information and Communication System Security (ICSS) [schedule] [select]
Chair Yoshiaki Shiraishi (Kobe Univ.)
Vice Chair Hiroki Takakura (NII), Katsunari Yoshioka (Yokohama National Univ.)
Secretary Kazunori Kamiya (NTT), Takahiro Kasama (NICT)
Assistant Akira Yamada (KDDI labs.), Keisuke Kito (Mitsubishi Electric)

Technical Committee on Enriched MultiMedia (EMM) [schedule] [select]
Chair Keiichi Iwamura (TUC)
Vice Chair Minoru Kuribayashi (Okayama Univ.), Tetsuya Kojima (NIT,Tokyo College)
Secretary Kan Hyonho (NIT, Tokyo), Harumi Murata (Tyukyo Univ.)
Assistant Hiroko Akiyama (National Institute of Technology, Nagano College), キタヒロ カネダ (CANON)

Special Interest Group on Computer Security (IPSJ-CSEC) [schedule] [select]

Special Interest Group on Security Psychology and Trust (IPSJ-SPT) [schedule] [select]

Conference Date Wed, Jul 25, 2018 09:55 - 18:00
Thu, Jul 26, 2018 09:30 - 15:50
Topics Security, etc. 
Conference Place Sapporo Convention Center 
Address 1-1-1 Higashi-Sapporo 6-jo, Shiroishi-ku, Sapporo, 003-0006, Japan
Transportation Guide Sapporo Convention Center is located approximately 10 min. by taxi from Sapporo city center. Also, Sapporo's highly developed public transportation system provides easy assess to all the visitors.
https://www.sora-scc.jp/eng/
Copyright
and
reproduction
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
Registration Fee This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on HWS, ISEC, ICSS, EMM.

Wed, Jul 25 AM  B-1:ISEC(1):204
09:55 - 11:35
(1)
ISEC
09:55-10:20 Truly Efficient Robust Secret Sharing for the Real World ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12 Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC)
(2)
ISEC
10:20-10:45 Construction of Revocable HIBE with Adaptive Security ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 Atsushi Takayasu (Univ. Tokyo)
(3)
ISEC
10:45-11:10 Code-Based Signature Scheme without Trapdoors ISEC2018-15 SITE2018-7 HWS2018-12 ICSS2018-18 EMM2018-14 Partha Sarathi Roy (KDDI Research), Kirill Morozov (Univ. of North Texas), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Tsuyoshi Takagi (Univ. of Tokyo)
(4)
ISEC
11:10-11:35 On the integration of SCF-PEKS and PKE ISEC2018-16 SITE2018-8 HWS2018-13 ICSS2018-19 EMM2018-15 Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Ohigashi Toshihiro (Tokai Univ.)
Wed, Jul 25 AM  C-1:CSEC(1):207
09:55 - 11:35
(5) 09:55-10:20 Infrastructure as codeによるシステム試験環境の自動生成および自動試験による情報セキュリティリスクの検出手法の提案
○沼田晋作・中井悠人・橋本昭二・柏大(NTTコミュニケーションズ)
(6) 10:20-10:45 Man In The Browser攻撃対策を実現する人間・銀行サーバ間のセキュア通信プロトコル(その3)
○向平浩貴・神農泰圭(静岡大学)・土屋貴史(静岡大学)・大木哲史(静岡大学), 高橋健太((株)日立製作所), 尾形わかは(東京工業大学), 西垣正勝(静岡大学)
(7) 10:45-11:10 情報ハイディング可能なワンタイムパスワード認証方式
○須賀祐治(株式会社インターネットイニシアティブ)
(8) 11:10-11:35 ブロックチェーンと中央集権型サーバの連携による実用的スマートコントラクトの実現手法
○福光正幸(北海道情報大学)・長谷川真吾・磯辺秀司(東北大学), 岩田直樹(株式会社デンソー), 岩﨑淳也・小泉英介(東北大学), 中田恒夫(株式会社デンソー), 酒井正夫(東北大学)
Wed, Jul 25 PM  A-2:HWS(1):201,202
13:10 - 15:15
(9)
HWS
13:10-13:35 A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16 Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)
(10)
HWS
13:35-14:00 A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17 Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU)
(11)
HWS
14:00-14:25 How to Evaluate Instrumentation Security of Stereo Vision Cameras against DoS and Illusion Attacks ISEC2018-19 SITE2018-11 HWS2018-16 ICSS2018-22 EMM2018-18 Naoki Yoshida, Hiroki Nohira, Yasushi Iwata, Tsutomu Matsumoto (YNU)
(12)
HWS
14:25-14:50 Immunity Evaluation of Cryptographic Devices using Gaussian Noise against IEMI Fault Injection ISEC2018-20 SITE2018-12 HWS2018-17 ICSS2018-23 EMM2018-19 Takumi Okamoto, Daisuke Fujimoto, Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.), Arthur Beckers, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede (KU Leuven)
(13)
HWS
14:50-15:15 Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20 Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST)
Wed, Jul 25 PM  B-2:ISEC(2):204
13:10 - 14:40
(14)
ISEC
13:10-13:40 [Invited Talk]
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model (from EUROCRYPT 2018) ISEC2018-22 SITE2018-14 HWS2018-19 ICSS2018-25 EMM2018-21
Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa (NTT)
(15)
ISEC
13:40-14:10 [Invited Talk]
Obfustopia Built on Secret-Key Functional Encryption (from EUROCRYPT 2018) ISEC2018-23 SITE2018-15 HWS2018-20 ICSS2018-26 EMM2018-22
Fuyuki Kitagawa (Tokyo Tech), Ryo Nishimaki (NTT), Keisuke Tanaka (Tokyo Tech)
(16)
ISEC
14:10-14:40 [Invited Talk]
Memory Lower Bounds of Reductions Revisited (from EUROCRYPT 2018) ISEC2018-24 SITE2018-16 HWS2018-21 ICSS2018-27 EMM2018-23
Yuyu Wang (Tokyo Tech/AIST/IOHK), Takahiro Matsuda, Goichiro Hanaoka (AIST), Keisuke Tanaka (Tokyo Tech)
Wed, Jul 25 PM  C-2:CSEC(2):207
13:10 - 15:15
(17) 13:10-13:35 インターネット依存社会における情報発信者・情報送信機器の匿名性と特定・追跡性
○才所敏明・辻井重男(中央大学研究開発機構)
(18) 13:35-14:00 複数回にわたる匿名加工情報の提供に対する再識別リスク評価方法:PWSCUP2017における安全性指標の考察と分析から
○チャン クワン カイ・坂本一仁・松永昌浩(セコム株式会社)
(19) 14:00-14:25 経営マネジメント状況による情報漏洩インシデント削減効果の評価
○山田道洋(明治大学大学院先端数理科学研究科)・池上和輝・菊池浩明・乾孝治(明治大学総合数理学部)
(20) 14:25-14:50 セーフティ機能のセキュリ ティ脅威に対する効果の分析
○大久保隆夫(情報セキュリティ大学院大学)
(21) 14:50-15:15 金融サービスのセキュリティに対する量子コンピュータの影響と今後の暗号の移行について
○宇根正志(日本銀行)
Wed, Jul 25 PM  A-3:SITE(1):201,202
15:25 - 16:40
(22)
SITE
15:25-15:50 Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24 Daisuke Suzuki (Hokuriku Univ.)
(23)
SITE
15:50-16:15 A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25 Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.)
(24)
SITE
16:15-16:40 A design of interest-rate recordable cryptocurrency management program ISEC2018-27 SITE2018-19 HWS2018-24 ICSS2018-30 EMM2018-26 Yusuke Kaneko (SMBC/JRI), Shigeyuki Osada (JRI), Shigeyuki Azuchi (HAW), Hitoshi Okada (NII), Shigeichiro Yamasaki (KINDAI Univ.)
Wed, Jul 25 PM  B-3:ISEC(3):204
15:25 - 17:05
(25)
ISEC
15:25-15:50 Application of the Singular Curve Point Decompression Attack to the Bitcoin Curve ISEC2018-28 SITE2018-20 HWS2018-25 ICSS2018-31 EMM2018-27 Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe (NTT)
(26)
ISEC
15:50-16:15 Extended Partial Key Exposure Attacks on RSA ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28 Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo)
(27)
ISEC
16:15-16:40 Secure Multiparty Computation of Ranking Using a Deck of Cards ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29 Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
(28)
ISEC
16:40-17:05 Chi-Squared Test for Independence Between Single Nucleotide Polymorphisms and Diseases Using Mis-operation Resistant Searchable Homomorphic Encryption ISEC2018-31 SITE2018-23 HWS2018-28 ICSS2018-34 EMM2018-30 Keita Emura, Takuya Hayashi (NICT/JST), Wenjie Lu (University of Tsukuba/JST CREST), Shiho Moriai (NICT/JST), Jun Sakuma (University of Tsukuba/JST CREST/RIKEN), Yoshiji Yamada (Mie University/JST CREST)
Wed, Jul 25 PM  C-3:CSEC(3):207
15:25 - 16:40
(29) 15:25-15:50 権限の変更に着目した権限昇格攻撃防止手法のARMへの拡張
○吉谷亮汰・山内利宏(岡山大学大学院自然科学研究科)
(30) 15:50-16:15 SELinux CILを利用した不要なポリシ削減手法の提案
○齋藤凌也・山内利宏(岡山大学大学院自然科学研究科)
(31) 16:15-16:40 KLEEとLibfuzzerを組み合わせたハイブリッド型KleeFuzzerに関する提案
○三嶋秀宗・中沢実・西川幸延(金沢工業大学)
Wed, Jul 25 PM 
17:15 - 18:00
(32) 17:15-18:00 これからの夏のセキュリティワークショップ開催に向けて
Thu, Jul 26 AM  A-4:SPT:201,202
09:30 - 11:10
(33) 09:30-09:55 プライバシ保護設定推測における推測値の平行シフトが受容度に与える影響
〇中村 徹(国際電気通信基礎技術研究所(ATR))・アダムス アンドリュー A.(明治大学)・清本晋作(KDDI総合研究所)・村田潔(明治大学)・鈴木信夫(国際電気通信基礎技術研究所(ATR))
(34) 09:55-10:20 プライバシー保護技術の事業活用に関する一考察
〇杉尾信行・青野博・関野公彦(株式会社NTTドコモ)
(35) 10:20-10:45 日本人が付けるパスワードの特性調査と他国データとの比較
愛野乃子・〇金岡晃(東邦大学)
(36) 10:45-11:10 [招待講演]サイバーセキュリティで重要度を増すCSIRTと組織・人のトラスト
〇斯波万恵(東芝デジタルソリューションズ)
Thu, Jul 26 AM  B-4:EMM:204
09:30 - 10:20
(37)
EMM
09:30-09:55 Some tips for information hiding from the viewpoint of magic trick ISEC2018-32 SITE2018-24 HWS2018-29 ICSS2018-35 EMM2018-31 Naofumi Aoki (Hokkaido Univ.)
(38)
EMM
09:55-10:20 Effects of high frequency components on steganalysis of data hiding in low-order bits of an audio waveform ISEC2018-33 SITE2018-25 HWS2018-30 ICSS2018-36 EMM2018-32 Akira Nishimura (Tokyo Univ. Info. Sci.)
Thu, Jul 26 AM  C-4:CSEC(4):207
09:30 - 11:10
(39) 09:30-09:55 マルウェア対策のための研究用データセット ~MWS Datasets 2018~
○高田雄太(日本電信電話株式会社)・寺田真敏(株式会社日立製作所)・松木隆宏(株式会社FFRI)・笠間貴弘(国立研究開発法人 情報通信研究機構)・荒木粧子(株式会社ソリトンシステムズ)・畑田充弘(NTTコミュニケーションズ株式会社)
(40) 09:55-10:20 シンボリック実行を活用したマルウェア解析作業の効率化の研究
○窪優司・大久保隆夫(情報セキュリティ大学院大学)
(41) 10:20-10:45 インターネットに接続されたサイバー攻撃観測用センサーの環境に関する考察
○芦野佑樹・鮫島礼佳・須尭一志・矢野由紀子(NEC ナショナルセキュリティソリューション事業部 サイバーセキュリティ・ファクトリー), 中村康弘(防衛大学校電気情報学群情報工学科)
(42) 10:45-11:10 サイバー攻撃の有無が不明な通信データからサイバー攻撃目的と推定される通信を抽出する手法の提案
○鮫島礼佳・芦野佑樹・須尭一志・矢野由紀子(日本電気株式会社ナショナルセキュリティ・ソリューション事業部サイバーセキュリティ・ファクトリ), 中村康弘(防衛大学校電気情報学群情報工学科)
Thu, Jul 26 AM  A-5:SITE(2):201,202
11:20 - 12:35
(43)
SITE
11:20-11:45 Regulatory Policies Regarding Mobile Spectrum Holdings in the United States and EU Countries ISEC2018-34 SITE2018-26 HWS2018-31 ICSS2018-37 EMM2018-33 Tomoko Yamajo (KDDI Research)
(44)
SITE
11:45-12:10 A Study on Limitation on Copyright in Machine Learning
-- Review of the reform bill in Japan --
ISEC2018-35 SITE2018-27 HWS2018-32 ICSS2018-38 EMM2018-34
Naonori Kato (KDDI Research), Masatomo Suzuki (Niigata Univ./RIKEN), Yosuke Murakami (KDDI Research)
(45)
SITE
12:10-12:35 About Access Control with the Deconstruction Device in Probability Measures on Metric Spaces ISEC2018-36 SITE2018-28 HWS2018-33 ICSS2018-39 EMM2018-35 Tetsuya Morizumi, Hirotsugu Kinoshita (KU)
Thu, Jul 26 AM  B-5:ICSS:204
11:20 - 12:35
(46)
ICSS
11:20-11:45 ISEC2018-37 SITE2018-29 HWS2018-34 ICSS2018-40 EMM2018-36 Kenta Watanabe, Miwako Mishima (Gifu Univ.)
(47)
ICSS
11:45-12:10 Real-time Botnet Detection Using Nonnegative Tucker Decomposition ISEC2018-38 SITE2018-30 HWS2018-35 ICSS2018-41 EMM2018-37 Hideaki Kanehara, Yuma Murakami (Waseda Univ.), Jumpei Shimamura (Clwit), Takeshi Takahashi (NICT), Noboru Murata (Waseda Univ.), Daisuke Inoue (NICT)
(48)
ICSS
12:10-12:35 ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38
Thu, Jul 26 AM  C-5:CSEC(5):207
11:20 - 12:10
(49) 11:20-11:45 FPGAインスタンスを用いたクラウドログ異常検知の実装と評価
○千田拓矢・杉尾信行・青野博・関野公彦(NTTドコモ)
(50) 11:45-12:10 ファイルサーバーにおけるHIDSの適用研究
○宮脇一晃・辰己丈夫(放送大学大学院)
Thu, Jul 26 PM  A-6:HWS(2):201,202
13:45 - 15:50
(51)
HWS
13:45-14:10 Consideration on Crypto Key Management Devices on the Market. ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39 Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM)
(52)
HWS
14:10-14:35 Compensation of Temperature Induced Flipping-Bits in CMOS SRAM PUF by NMOS Body-Bias ISEC2018-41 SITE2018-33 HWS2018-38 ICSS2018-44 EMM2018-40 Xuanhao Zhang, Xiang Chen, Hanfeng Sun, Hirofumi Shinohara (Waseda Univ.)
(53)
HWS
14:35-15:00 Side-Channel Countermeasure for XOR based PUF and Its Evaluation ISEC2018-42 SITE2018-34 HWS2018-39 ICSS2018-45 EMM2018-41 Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.)
(54)
HWS
15:00-15:25 Side-Channel Attacks on an Error-Correction Circuit of Fuzzy Extractor ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42 Yuta Goto, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ)
(55)
HWS
15:25-15:50 A Study on Systematic Insertion of Hardware Trojan Based on Path Delay ISEC2018-44 SITE2018-36 HWS2018-41 ICSS2018-47 EMM2018-43 Akira Ito, Rei Ueno, Naofumi Homma, Takafumi Aoki (Tohoku Univ.)
Thu, Jul 26 PM  B-6:ISEC(4):204
13:45 - 15:50
(56)
ISEC
13:45-14:10 Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT ISEC2018-45 SITE2018-37 HWS2018-42 ICSS2018-48 EMM2018-44 Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi (Chuo Univ.)
(57)
ISEC
14:10-14:35 A New Embedding Method for Generalized LWE ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo)
(58)
ISEC
14:35-15:00 The Precise Security Analysis of Block Ciphers Enhanced by FX-Construction against a Quantum Algorithm ISEC2018-47 SITE2018-39 HWS2018-44 ICSS2018-50 EMM2018-46 Syo Yasui, Noboru Kunihiro (UTokyo)
(59)
ISEC
15:00-15:25 Plaintext Recovery Attacks against WPA-TKIP Using Iterated RC4 Key Correlations ISEC2018-48 SITE2018-40 HWS2018-45 ICSS2018-51 EMM2018-47 Ryoma Ito, Atsuko Miyaji (Osaka Univ.)
(60)
ISEC
15:25-15:50 A construction of generic Multiparty Private Set Intersection ISEC2018-49 SITE2018-41 HWS2018-46 ICSS2018-52 EMM2018-48 Katsunari Shishido, Motoi Hayashi, Atsuko Miyaji (Osaka Univ.)
Thu, Jul 26 PM  C-6:CSEC(6):207
13:45 - 14:35
(61) 13:45-14:10 1台のサーバで実行可能な秘密分散法を用いた秘匿計算法
○山根将司・岩村惠市(東京理科大学)・安田裕之(東京大学)
(62) 14:10-14:35 2ビット毎に大小比較を行う暗号文出力型の秘匿比較方式の提案
○小林拓美(島根大学大学院総合理工学研究科)・伯田恵輔(島根大学学術研究院理工学系)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
HWS Technical Committee on Hardware Security (HWS)   [Latest Schedule]
Contact Address Noriyuki Miura(Kobe University), Hiroki Kunii(SECOM)
E--mail:hws-adn 
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Kazumasa Omote (University of Tsukuba)
E--mail: ic-c (to ISEC secretaries) 
SITE Technical Committee on Social Implications of Technology and Information Ethics (SITE)   [Latest Schedule]
Contact Address  
ICSS Technical Committee on Information and Communication System Security (ICSS)   [Latest Schedule]
Contact Address Yoshiaki Shiraishi (Kobe University)
E--mail: is-adm-q 
Announcement Latest information will be presented on the homepage:
http://www.ieice.org/~icss/index.html
EMM Technical Committee on Enriched MultiMedia (EMM)   [Latest Schedule]
Contact Address  
IPSJ-CSEC Special Interest Group on Computer Security (IPSJ-CSEC)   [Latest Schedule]
Contact Address  
IPSJ-SPT Special Interest Group on Security Psychology and Trust (IPSJ-SPT)   [Latest Schedule]
Contact Address  


Last modified: 2018-07-13 10:07:48


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to ISEC Schedule Page]   /   [Return to SITE Schedule Page]   /   [Return to HWS Schedule Page]   /   [Return to ICSS Schedule Page]   /   [Return to EMM Schedule Page]   /   [Return to IPSJ-CSEC Schedule Page]   /   [Return to IPSJ-SPT Schedule Page]   /  
 
 Go Top  Go Back   Prev HWS Conf / Next HWS Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan