IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 24  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:55
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Data Security Verification in Supply Chain
Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] ICTSSL2022-19
pp.12-17
ICSS 2020-11-26
14:00
Online Online Malware detection for IoT devices using whitelist and Isolation Forest
Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake (KDDI Research) ICSS2020-20
As the number of IoT (Internet of Things) devices increases, the countermeasures against cyberattacks related to IoT dev... [more] ICSS2020-20
pp.7-12
BioX, ITE-ME, ITE-IST [detail] 2014-06-16
14:00
Ishikawa Kanazawa University, Kakuma Campus Design of Biometric Authentication System with Template Protection Using SIM Card
Norihiro Okui, Haruki Ota, Ryu Watanabe, Yutaka Miyake (KDDI Labs) BioX2014-3
 [more] BioX2014-3
pp.13-18
ICSS, IPSJ-SPT 2014-03-28
09:25
Okinawa Meio Univiersity Comparison of Privacy Policies in Different Domains
Toru Nakamura (KDDI Lab.), Milena Tasic (Univ. of Belgrade), Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) ICSS2013-87
Improvement of description of privacy policy is required for effective
utilization of personal data. The goal of this ... [more]
ICSS2013-87
pp.173-178
ISEC, IT, WBS 2014-03-10
11:00
Aichi Nagoya Univ., Higashiyama Campus A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices
Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) IT2013-59 ISEC2013-88 WBS2013-48
This paper presents a correlation electromagnetic analysis against the stream cipher KCipher-2 software. Side-channel at... [more] IT2013-59 ISEC2013-88 WBS2013-48
pp.35-40
ISEC, LOIS 2012-11-22
15:35
Shizuoka Shizuoka City Industry-University Exchange Center Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices
Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) ISEC2012-71 LOIS2012-46
Security of lattice-based cryptosystems is based on the hardness of the Shortest Vector Problem (SVP) in lattices.
Micc... [more]
ISEC2012-71 LOIS2012-46
pp.93-99
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:00
Hokkaido   A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value
Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs) ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15
The goal of this study is to provide more accurate recommendation to
users with sharing user information among service ... [more]
ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15
pp.97-102
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] IT2010-96 ISEC2010-100 WBS2010-75
pp.177-184
IN, NS
(Joint)
2011-03-04
09:10
Okinawa Okinawa Convention Center An Adaptive Defense Against Large DDoS Attack
Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI Labs.) IN2010-195
Distributed Denial-of-Service attack is one of the serious problem on network security. The attack exhausts not only com... [more] IN2010-195
pp.307-312
ICSS 2010-03-26
13:30
Fukuoka The University of Kitakyushu Name Resolution Mechanism for Secure Overlay Networking
Ayumu Kubota, Yutaka Miyake (KDDI Labs.) ICSS2009-62
Recent development of P2P and overlay networking technologies make it fairly easy to establish end-to-end communication ... [more] ICSS2009-62
pp.1-6
ICSS 2010-03-26
14:45
Fukuoka The University of Kitakyushu DDoS Protection Using Autonomous Distributed Firewall System
Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI R&D Labs.) ICSS2009-65
(To be available after the conference date) [more] ICSS2009-65
pp.19-24
ICSS 2009-11-13
13:30
Miyazaki University of Miyazaki A Study of Detection Rate Improvement for Spam Mail Filter Functioning Before Receiving the Message Body
Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) ICSS2009-57
 [more] ICSS2009-57
pp.19-24
ICSS 2009-11-13
13:55
Miyazaki University of Miyazaki Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis
Akira Yamada (KDDI R&D Labs. Inc.,), Masanori Hara (KDDI Corp.), Yutaka Miyake (KDDI R&D Labs. Inc.,), Kazuo Hashimoto (Tohoku Univ.) ICSS2009-58
Web tracking sites or Web bugs are potential but serious threats to users' privacy during Web browsing. Web sites and th... [more] ICSS2009-58
pp.25-30
NS, OCS, PN
(Joint)
2009-06-26
13:25
Nagasaki Nagasaki Museum of History and Culture (Nagasaki) [Encouragement Talk] A Study of Spam Mail Detection before Receiving DATA Command at SMTP Server and its Evaluation using Large-scale Mail Log Data
Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) NS2009-41
As the number of spam mail has been increasing and it occupies 85% of all email traffic, SMTP servers are frustrated wit... [more] NS2009-41
pp.61-66
ICSS 2009-05-15
13:40
Hyogo Kobe University [Special Talk] Internatinal Standarization Activities in ITU-T Study Group 17 (Security) -- Standarizatoin on Network Security and ID Management --
Yutaka Miyake, Ryu Watanabe (KDDI Labs.) ICSS2009-2
This paper describes activities of international standard related security issues at the ITU-T which is international st... [more] ICSS2009-2
pp.3-8
ICSS 2009-05-15
17:05
Hyogo Kobe University A Mutual Authentication System for Web Access Using Web Browser Extension and Cellular Phone
Yukiko Sawaya, Yutaka Miyake (KDDI Labs.) ICSS2009-8
The two-factor client authentication methods such as one-time password scheme or using cellular phone network with ID/pa... [more] ICSS2009-8
pp.37-42
IN, NS
(Joint)
2009-03-03
10:00
Okinawa Okinawa-Zanpamisaki Royal Hotel Securing Communication between Personal Networking Devices using Auto-generated DNSSEC Zones
Ayumu Kubota, Yutaka Miyake (KDDI Labs.) NS2008-170
 [more] NS2008-170
pp.153-158
ICM, CQ, NS
(Joint)
2008-11-14
14:40
Fukushima Nihon University A Study of Spam Mail Detection before Receiving DATA Command at SMTP Server
Yukiko Sawaya, Yutaka Miyake (KDDI Laboratories) NS2008-107
As the number of spam mail has been increasing and it occupies 80% of all email traffic, SMTP servers are frustrated wit... [more] NS2008-107
pp.109-114
CS, IN, NS
(Joint)
2008-09-11
10:40
Miyagi Tohoku University Anomaly Client Detection Monitoring DNS Server Traffic
Akira Yamada, Yutaka Miyake (KDDI Labs.), Masahiro Terabe, Kazuo Hashimoto, Nei Kato (Tohoku Univ.) NS2008-44
Most protocols, such as HTTP or SMTP are based on the Domain Name System (DNS) as the name resolution. Because these cli... [more] NS2008-44
pp.11-16
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:25
Hokkaido Future University-Hakodate A Mutual Authentication System for Web Server Access by Using Cellar Phone
Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.)
Password authentication is widely used for web accesses currently. However this authentication scheme becomes insecure, ... [more] ISEC2007-30 SITE2007-24
pp.99-105
 Results 1 - 20 of 24  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan