IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EA, ASJ-H, ASJ-AA 2018-07-25
14:30
Hokkaido Hokkaido Univ. The possibility of cross-platform library “JUCE” -- The reason why programmers for music production software choose JUCE --
Shigeru Tanabu, Yohta Watanabe (CFM) EA2018-25
“JUCE” is a very useful C++ cross platform application framework that is designed especially to develop audio applicatio... [more] EA2018-25
pp.147-151
EA, ASJ-H 2017-07-21
13:40
Hokkaido Hokkaido Univ. EA2017-13 Crypton Future Media Co, Inc. started business as an import agent and has been distributing audio products over 20 years... [more] EA2017-13
pp.75-77
EA 2013-07-19
09:00
Hokkaido Health Sci. Univ. of Hokkaido Possibility of Sound Programming for Acoustic Education
Naofumi Aoki (Hokkaido Univ.), Keisuke Ai (Crypton Future Media) EA2013-43
Sound programming has a short history so that the sharing of its know-how is still capable of improvement. This paper in... [more] EA2013-43
pp.57-61
ICSS 2011-03-25
10:45
Tokyo Suspended Proposal of an Order Preserving Encryption for Anonymity
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] ICSS2010-57
pp.5-10
ICSS 2010-11-05
11:20
Hiroshima Hiroshima City University Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] ICSS2010-46
pp.11-15
IA, ICSS 2010-06-17
15:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] IA2010-6 ICSS2010-6
pp.31-36
IA, ICSS 2010-06-17
15:45
Kyoto Academic Center for Computing and Media Studies, Kyoto University Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack
Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] IA2010-7 ICSS2010-7
pp.37-42
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
16:50
Hiroshima Hiroshima Univ. Evaluation of Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Masanori Hirotomo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) LOIS2009-39 IE2009-80
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the ... [more] LOIS2009-39 IE2009-80
pp.119-124
IA, ICSS 2009-06-18
13:30
Tokyo Kikai-Shinko-Kaikan Bldg *
Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] IA2009-5 ICSS2009-13
pp.25-30
IA, ICSS 2009-06-18
13:55
Tokyo Kikai-Shinko-Kaikan Bldg *
Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] IA2009-6 ICSS2009-14
pp.31-36
IA, ICSS 2009-06-18
14:20
Tokyo Kikai-Shinko-Kaikan Bldg *
Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] IA2009-7 ICSS2009-15
pp.37-42
IA, ICSS 2009-06-18
14:45
Tokyo Kikai-Shinko-Kaikan Bldg Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] IA2009-8 ICSS2009-16
pp.43-48
IA, ICSS 2009-06-19
13:50
Tokyo Kikai-Shinko-Kaikan Bldg Study on Classification of Malware and it Applications
Soma Katsute (Kobe Univ.), Kouki Yasumoto (NEC), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-19 ICSS2009-27
Recently, the increasing and spreading of the malwares become a big problem. Most of the malwares are subspieces and pa... [more] IA2009-19 ICSS2009-27
pp.103-108
IA, ICSS 2009-06-19
14:15
Tokyo Kikai-Shinko-Kaikan Bldg *
Akira Morikawa, Motomu Murakami, Yuko Ozasa, Soma Katsute (Kobe Univ.), Ryoichi Isawa (Kobe Univ./CRYPTO), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-20 ICSS2009-28
Recently, the malwares are widely spreaded and cause the serious problems.
For the countermeasure, the malware analysi... [more]
IA2009-20 ICSS2009-28
pp.109-114
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan