IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 65  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, NWS
(Joint)
2024-01-25
14:15
Hiroshima Higashisenda Campus, HiroshimaUniversity + Online
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Access Control Method to Prevent Session Token Abuse on OpenID Connect
Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] NS2023-162
pp.19-24
ICSS 2023-11-17
14:20
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Proposal for a Test Tool Enabling Programmatic Description of Test Scenarios in OpenID Connect
Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) ICSS2023-66
Single sign-on (SSO) is a mechanism that allows users to log in to multiple web services with single-user authentication... [more] ICSS2023-66
pp.108-113
NS 2023-10-04
17:55
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
Access Control Method to Prevent ID Token Abuse on OpenID Connect
Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] NS2023-81
pp.53-58
NS 2023-10-04
18:45
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
Proposal of location data protection mechanism by TEE considering privacy zone setting
Tomoya Suzuki, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-83
In recent years, there has been an increasing trend in sharing and utilizing individuals’ mobility trajectories. Among t... [more] NS2023-83
pp.65-70
NS, NWS
(Joint)
2023-01-26
13:00
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] NS2022-153
pp.19-24
IA 2023-01-25
15:25
Osaka Osaka Umeda Campus, Kwansei Gakuin University (Osaka)
(Primary: On-site, Secondary: Online)
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan
Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] IA2022-72
pp.28-35
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
NS, IN, CS, NV
(Joint)
2022-09-02
13:20
Iwate MALIOS (Iwate Prefecture) + Online Meeting
(Primary: On-site, Secondary: Online)
Data protection mechanism for RDBMS using both trust and untrust regions in TEE
Masashi Yoshimura, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-71
With the spread of cloud computing, database services, which are basically under a heavy load are now on the cloud. As c... [more] NS2022-71
pp.60-65
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
13:35
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
Building a Federated Personalized Recommendation Model to Balance Similarity and Diversity
Masahiro Hamada, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-46
With the spread of on-demand movie distribution, personalized movie recommendations that match user preferences are requ... [more] NS2022-46
pp.100-105
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
14:00
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] NS2022-47
pp.106-111
CQ, ICM, NS, NV
(Joint)
2021-11-26
16:15
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity
Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] NS2021-95
pp.56-61
LOIS, ISEC, SITE 2020-11-06
14:40
Online Online Considering the variation of the noise-addition amount in local differential privacy with user trajectory adjacency
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) ISEC2020-39 SITE2020-36 LOIS2020-19
The detection of clusters in densely populated areas by contact tracing is urgent, because these locations are trajector... [more] ISEC2020-39 SITE2020-36 LOIS2020-19
pp.45-50
IA 2019-11-15
13:40
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring
Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] IA2019-42
pp.85-90
ICTSSL, IN 2019-10-17
15:15
Oita   A proposal for Hashing Recursive Query and Expansion Negative Cache against Non-Existent Domaion
Shoretsu Takasuka, Yuzo Taenaka, Youki Kadobayashi (NAIST)
 [more]
ET 2019-01-26
11:00
Osaka Umeda Campus, Kansai University WebSec: Development and Evaluation of game exercise tool for security training
Tan Omiya (NAIST), Balázs Barna (Corvinus University of Budapest), Youki Kadobayashi (NAIST) ET2018-79
Security standards clearly state that it is necessary to implement security education for employees. However, there are ... [more] ET2018-79
pp.13-18
IA, IN
(Joint)
2018-12-14
15:05
Hiroshima Hiroshima Univ. A Structured Overlay Network Based on a Proximity-aware Distributed Line Graph
Youki Shiraishi (NAIST), Akiko Manada (Shonan Inst. of Tech.), Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2018-51
A distributed line graph (DLG) is a technique for designing a structured overlay network based on an arbitrary regular g... [more] IA2018-51
pp.71-77
AP 2018-08-23
11:05
Saitama Nippon Inst. of Tech. Experimental Analysis: A possibility of estimating TV white space spectrum sensing using altitude information by low-cost SDR devices
Fatou Williams, Youki Kadobayashi (NAIST) AP2018-69
Accurate detection of TV White Space in the VHF and UHF frequency bands is important in realizing the potential of its t... [more] AP2018-69
pp.13-18
MoNA 2018-01-18
13:10
Kyoto Campus Plaza Kyoto MoNA2017-41 5G mobile communication networks (5G) are expected to provide a wide range of new emerging services through flexible com... [more] MoNA2017-41
pp.1-6
ICSS 2017-11-20
15:40
Oita Beppu International Convention Center Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks
Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi (NAIST) ICSS2017-40
Recently, the threats of cyber attacks have increased. There is the need to understand information security measures to ... [more] ICSS2017-40
pp.11-16
IA 2017-10-13
16:30
Tokyo Fukutake Hall, The University of Tokyo Testbed for Security Analysis of the DNS64 IPv6 Transition Technology in Virtual Environment
Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-22
In this paper, we demonstrate the feasibility of building a virtual network with several virtual Linux hosts for testing... [more] IA2017-22
pp.19-24
 Results 1 - 20 of 65  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan