IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 78 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center ICSS2017-75  [more] ICSS2017-75
pp.145-150
ICSS, IPSJ-SPT 2018-03-08
11:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center ICSS2017-76  [more] ICSS2017-76
pp.151-156
ICSS, IPSJ-SPT 2018-03-08
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center On the Ring Signature Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] ICSS2017-85
pp.215-220
ICSS 2017-11-21
09:30
Oita Beppu International Convention Center ICSS2017-42  [more] ICSS2017-42
pp.23-27
ICSS 2017-11-21
14:00
Oita Beppu International Convention Center ICSS2017-50  [more] ICSS2017-50
pp.71-76
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
14:15
Tokyo   ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23  [more] ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23
pp.93-98
IA, ICSS 2017-06-08
15:40
Kochi Kochi University of Technolo, Eikokuji Campus On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7
 [more] IA2017-7 ICSS2017-7
pp.37-42
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
ICSS, IPSJ-SPT 2017-03-14
11:45
Nagasaki University of Nagasaki Representation for Attack Activity to Associate Threat Information
Daiki Ito, Kenta Nomura (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-64
As sophisticated and complicated cyber attacks become a social problem, Threat Intelligence, in which new knowledge obta... [more] ICSS2016-64
pp.147-152
ICSS, IPSJ-SPT 2017-03-14
10:55
Nagasaki University of Nagasaki A Vulnerability Analysis of Android Applications from the View of Framework
Ryoya Furukawa, Tatsuya Nagai (Kobe Univ.), Hiroshi Kumagai, Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.)
 [more]
ICSS 2016-11-25
16:10
Kanagawa Institute of Information Security Performance of link-mining techniques to detect malicious websites
Yasuhiro Takano, Daiki Ito, Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-44
Conventional techniques to avoid malicious websites techniques by referring URL's keywords reported in black lists have ... [more] ICSS2016-44
pp.31-35
ICSS, IA 2016-06-06
15:00
Saga Saga University Development of Network Forensic System Using Filter Drivers
Kouki Oda, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kinki Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.)
 [more]
ICSS, IA 2016-06-06
16:05
Saga Saga University
Kenta Nomura (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-5 ICSS2016-5
(To be available after the conference date) [more] IA2016-5 ICSS2016-5
pp.25-30
ICSS, IA 2016-06-07
09:30
Saga Saga University
Daiki Ito (Kobe Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) IA2016-7 ICSS2016-7
 [more] IA2016-7 ICSS2016-7
pp.33-38
ICSS, IA 2016-06-07
13:00
Saga Saga University On the Effect Assessment of Malicious Web Sites Using Multi-Environment Analysis
Yuya Nishio, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2016-11 ICSS2016-11
The malicious websites used by Drive-by Download Attacks change their behavior for web client environments. To analyze t... [more] IA2016-11 ICSS2016-11
pp.57-62
ICSS, IA 2016-06-07
13:25
Saga Saga University
Tatsuya Nagai (Kobe Univ.), Masaki Kamizono (PwC Cyber Services LLCPwC Cyber Services), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services LLCPwC Cyber Services), Masakatu Morii (Kobe Univ.) IA2016-12 ICSS2016-12
(To be available after the conference date) [more] IA2016-12 ICSS2016-12
pp.63-68
ICSS, IPSJ-SPT 2016-03-03
13:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Storage-Efficient and Low-Power Packet Classification for Internet of Things
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2015-49
This paper addresses packet classification for Internet of Things (IoT) security. Packet Classification is a function to... [more] ICSS2015-49
pp.13-18
ICSS, IPSJ-SPT 2016-03-04
14:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Instantly Self-Verifiable Pre-Shared Key Exchange for Cyber-Physical Systems
Kohei Isobe (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2015-69
There exists a model operator and machines work cooperatively via dynamic connections in the context of Internet of Thin... [more] ICSS2015-69
pp.135-140
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-03
11:30
Aichi NAGOYA TRADE & INDUSTRY CENTER On Anxiety Factors in Indirect Use for Cloud Type Medical Systems
Youji Fukuta (Aichi Univ. of Educ.), Yoshiaki Shiraishi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.) ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32
We have conducted questionnaire survey for our university students in order to clarify anxiety factors in indirect use f... [more] ISEC2015-24 SITE2015-22 ICSS2015-34 EMM2015-32
pp.143-149
LOIS 2015-03-05
09:00
Okinawa   Wireless Multi-hop Cache Network for Regional Content Distribution
Yusuke Otsuka (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) LOIS2014-61
In order to distribute the regional commercial contents such as coupon etc., a wireless network consisted of mobile node... [more] LOIS2014-61
pp.1-6
 Results 21 - 40 of 78 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan