Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:55 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Data Security Verification in Supply Chain Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19 |
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] |
ICTSSL2022-19 pp.12-17 |
ICSS |
2020-11-26 14:00 |
Online |
Online |
Malware detection for IoT devices using whitelist and Isolation Forest Masataka Nakahara, Norihiro Okui, Yasuaki Kobayashi, Yutaka Miyake (KDDI Research) ICSS2020-20 |
As the number of IoT (Internet of Things) devices increases, the countermeasures against cyberattacks related to IoT dev... [more] |
ICSS2020-20 pp.7-12 |
BioX, ITE-ME, ITE-IST [detail] |
2014-06-16 14:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Design of Biometric Authentication System with Template Protection Using SIM Card Norihiro Okui, Haruki Ota, Ryu Watanabe, Yutaka Miyake (KDDI Labs) BioX2014-3 |
[more] |
BioX2014-3 pp.13-18 |
ICSS, IPSJ-SPT |
2014-03-28 09:25 |
Okinawa |
Meio Univiersity |
Comparison of Privacy Policies in Different Domains Toru Nakamura (KDDI Lab.), Milena Tasic (Univ. of Belgrade), Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) ICSS2013-87 |
Improvement of description of privacy policy is required for effective
utilization of personal data. The goal of this ... [more] |
ICSS2013-87 pp.173-178 |
ISEC, IT, WBS |
2014-03-10 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) IT2013-59 ISEC2013-88 WBS2013-48 |
This paper presents a correlation electromagnetic analysis against the stream cipher KCipher-2 software. Side-channel at... [more] |
IT2013-59 ISEC2013-88 WBS2013-48 pp.35-40 |
ISEC, LOIS |
2012-11-22 15:35 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
Parallelized Gauss sieve algorithm for solving the shortest vector problem in lattices Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake (KDDI R&D Labs), Tsuyoshi Takagi (Kyushu Univ) ISEC2012-71 LOIS2012-46 |
Security of lattice-based cryptosystems is based on the hardness of the Shortest Vector Problem (SVP) in lattices.
Micc... [more] |
ISEC2012-71 LOIS2012-46 pp.93-99 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-19 15:00 |
Hokkaido |
|
A Fast Privacy-Preserving Collaborative Filtering Scheme with Transferring Statistical Value Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake (KDDI R&D Labs) ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15 |
The goal of this study is to provide more accurate recommendation to
users with sharing user information among service ... [more] |
ISEC2012-23 SITE2012-19 ICSS2012-25 EMM2012-15 pp.97-102 |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
Verification Points of Security Against a Passive Attack for Key Exchange Protocols Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75 |
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] |
IT2010-96 ISEC2010-100 WBS2010-75 pp.177-184 |
IN, NS (Joint) |
2011-03-04 09:10 |
Okinawa |
Okinawa Convention Center |
An Adaptive Defense Against Large DDoS Attack Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI Labs.) IN2010-195 |
Distributed Denial-of-Service attack is one of the serious problem on network security. The attack exhausts not only com... [more] |
IN2010-195 pp.307-312 |
ICSS |
2010-03-26 13:30 |
Fukuoka |
The University of Kitakyushu |
Name Resolution Mechanism for Secure Overlay Networking Ayumu Kubota, Yutaka Miyake (KDDI Labs.) ICSS2009-62 |
Recent development of P2P and overlay networking technologies make it fairly easy to establish end-to-end communication ... [more] |
ICSS2009-62 pp.1-6 |
ICSS |
2010-03-26 14:45 |
Fukuoka |
The University of Kitakyushu |
DDoS Protection Using Autonomous Distributed Firewall System Takamasa Isohara, Ayumu Kubota, Yutaka Miyake (KDDI R&D Labs.) ICSS2009-65 |
(To be available after the conference date) [more] |
ICSS2009-65 pp.19-24 |
ICSS |
2009-11-13 13:30 |
Miyazaki |
University of Miyazaki |
A Study of Detection Rate Improvement for Spam Mail Filter Functioning Before Receiving the Message Body Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) ICSS2009-57 |
[more] |
ICSS2009-57 pp.19-24 |
ICSS |
2009-11-13 13:55 |
Miyazaki |
University of Miyazaki |
Web Tracking Site Detection and Blacklist Generation Based on Temporal Link Analysis Akira Yamada (KDDI R&D Labs. Inc.,), Masanori Hara (KDDI Corp.), Yutaka Miyake (KDDI R&D Labs. Inc.,), Kazuo Hashimoto (Tohoku Univ.) ICSS2009-58 |
Web tracking sites or Web bugs are potential but serious threats to users' privacy during Web browsing. Web sites and th... [more] |
ICSS2009-58 pp.25-30 |
NS, OCS, PN (Joint) |
2009-06-26 13:25 |
Nagasaki |
Nagasaki Museum of History and Culture (Nagasaki) |
[Encouragement Talk]
A Study of Spam Mail Detection before Receiving DATA Command at SMTP Server and its Evaluation using Large-scale Mail Log Data Yukiko Sawaya, Yutaka Miyake (KDDI R&D Labs, Inc.) NS2009-41 |
As the number of spam mail has been increasing and it occupies 85% of all email traffic, SMTP servers are frustrated wit... [more] |
NS2009-41 pp.61-66 |
ICSS |
2009-05-15 13:40 |
Hyogo |
Kobe University |
[Special Talk]
Internatinal Standarization Activities in ITU-T Study Group 17 (Security)
-- Standarizatoin on Network Security and ID Management -- Yutaka Miyake, Ryu Watanabe (KDDI Labs.) ICSS2009-2 |
This paper describes activities of international standard related security issues at the ITU-T which is international st... [more] |
ICSS2009-2 pp.3-8 |
ICSS |
2009-05-15 17:05 |
Hyogo |
Kobe University |
A Mutual Authentication System for Web Access Using Web Browser Extension and Cellular Phone Yukiko Sawaya, Yutaka Miyake (KDDI Labs.) ICSS2009-8 |
The two-factor client authentication methods such as one-time password scheme or using cellular phone network with ID/pa... [more] |
ICSS2009-8 pp.37-42 |
IN, NS (Joint) |
2009-03-03 10:00 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Securing Communication between Personal Networking Devices using Auto-generated DNSSEC Zones Ayumu Kubota, Yutaka Miyake (KDDI Labs.) NS2008-170 |
[more] |
NS2008-170 pp.153-158 |
ICM, CQ, NS (Joint) |
2008-11-14 14:40 |
Fukushima |
Nihon University |
A Study of Spam Mail Detection before Receiving DATA Command at SMTP Server Yukiko Sawaya, Yutaka Miyake (KDDI Laboratories) NS2008-107 |
As the number of spam mail has been increasing and it occupies 80% of all email traffic, SMTP servers are frustrated wit... [more] |
NS2008-107 pp.109-114 |
CS, IN, NS (Joint) |
2008-09-11 10:40 |
Miyagi |
Tohoku University |
Anomaly Client Detection Monitoring DNS Server Traffic Akira Yamada, Yutaka Miyake (KDDI Labs.), Masahiro Terabe, Kazuo Hashimoto, Nei Kato (Tohoku Univ.) NS2008-44 |
Most protocols, such as HTTP or SMTP are based on the Domain Name System (DNS) as the name resolution. Because these cli... [more] |
NS2008-44 pp.11-16 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 13:25 |
Hokkaido |
Future University-Hakodate |
A Mutual Authentication System for Web Server Access by Using Cellar Phone Yukiko Sawaya, Akira Yamada, Yutaka Miyake (KDDI Labs.) |
Password authentication is widely used for web accesses currently. However this authentication scheme becomes insecure, ... [more] |
ISEC2007-30 SITE2007-24 pp.99-105 |