Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, NWS (Joint) |
2024-01-25 14:15 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Access Control Method to Prevent Session Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162 |
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] |
NS2023-162 pp.19-24 |
ICSS |
2023-11-17 14:20 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Proposal for a Test Tool Enabling Programmatic Description of Test Scenarios in OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) ICSS2023-66 |
Single sign-on (SSO) is a mechanism that allows users to log in to multiple web services with single-user authentication... [more] |
ICSS2023-66 pp.108-113 |
NS |
2023-10-04 17:55 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Access Control Method to Prevent ID Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81 |
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] |
NS2023-81 pp.53-58 |
NS |
2023-10-04 18:45 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Proposal of location data protection mechanism by TEE considering privacy zone setting Tomoya Suzuki, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-83 |
In recent years, there has been an increasing trend in sharing and utilizing individuals’ mobility trajectories. Among t... [more] |
NS2023-83 pp.65-70 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
IA |
2023-01-25 15:25 |
Osaka |
Osaka Umeda Campus, Kwansei Gakuin University (Osaka) (Primary: On-site, Secondary: Online) |
Cybersecurity Analysis of Internet Banking in Developing and Developed countries, a case study of Tanzania and Japan Ndalama Festus Edward, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2022-72 |
Over the last few years, internet banking has become the primary way of accessing banking services for many bank custome... [more] |
IA2022-72 pp.28-35 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
NS, IN, CS, NV (Joint) |
2022-09-02 13:20 |
Iwate |
MALIOS (Iwate Prefecture) + Online Meeting (Primary: On-site, Secondary: Online) |
Data protection mechanism for RDBMS using both trust and untrust regions in TEE Masashi Yoshimura, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-71 |
With the spread of cloud computing, database services, which are basically under a heavy load are now on the cloud. As c... [more] |
NS2022-71 pp.60-65 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 13:35 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
Building a Federated Personalized Recommendation Model to Balance Similarity and Diversity Masahiro Hamada, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-46 |
With the spread of on-demand movie distribution, personalized movie recommendations that match user preferences are requ... [more] |
NS2022-46 pp.100-105 |
NS, SR, RCS, SeMI, RCC (Joint) |
2022-07-14 14:00 |
Ishikawa |
The Kanazawa Theatre + Online (Primary: On-site, Secondary: Online) |
A Study of Dynamic Privacy Control Method in LDP for Preserving Temporal/Spatial Intrinsic Information Value of Trajectory Data Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-47 |
Spatiotemporal data, including people's movement trajectories and transit points, is highly valuable for various applica... [more] |
NS2022-47 pp.106-111 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 16:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95 |
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] |
NS2021-95 pp.56-61 |
LOIS, ISEC, SITE |
2020-11-06 14:40 |
Online |
Online |
Considering the variation of the noise-addition amount in local differential privacy with user trajectory adjacency Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) ISEC2020-39 SITE2020-36 LOIS2020-19 |
The detection of clusters in densely populated areas by contact tracing is urgent, because these locations are trajector... [more] |
ISEC2020-39 SITE2020-36 LOIS2020-19 pp.45-50 |
IA |
2019-11-15 13:40 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42 |
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] |
IA2019-42 pp.85-90 |
ICTSSL, IN |
2019-10-17 15:15 |
Oita |
|
A proposal for Hashing Recursive Query and Expansion Negative Cache against Non-Existent Domaion Shoretsu Takasuka, Yuzo Taenaka, Youki Kadobayashi (NAIST) |
[more] |
|
ET |
2019-01-26 11:00 |
Osaka |
Umeda Campus, Kansai University |
WebSec: Development and Evaluation of game exercise tool for security training Tan Omiya (NAIST), Balázs Barna (Corvinus University of Budapest), Youki Kadobayashi (NAIST) ET2018-79 |
Security standards clearly state that it is necessary to implement security education for employees. However, there are ... [more] |
ET2018-79 pp.13-18 |
IA, IN (Joint) |
2018-12-14 15:05 |
Hiroshima |
Hiroshima Univ. |
A Structured Overlay Network Based on a Proximity-aware Distributed Line Graph Youki Shiraishi (NAIST), Akiko Manada (Shonan Inst. of Tech.), Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2018-51 |
A distributed line graph (DLG) is a technique for designing a structured overlay network based on an arbitrary regular g... [more] |
IA2018-51 pp.71-77 |
AP |
2018-08-23 11:05 |
Saitama |
Nippon Inst. of Tech. |
Experimental Analysis: A possibility of estimating TV white space spectrum sensing using altitude information by low-cost SDR devices Fatou Williams, Youki Kadobayashi (NAIST) AP2018-69 |
Accurate detection of TV White Space in the VHF and UHF frequency bands is important in realizing the potential of its t... [more] |
AP2018-69 pp.13-18 |
MoNA |
2018-01-18 13:10 |
Kyoto |
Campus Plaza Kyoto |
MoNA2017-41 |
5G mobile communication networks (5G) are expected to provide a wide range of new emerging services through flexible com... [more] |
MoNA2017-41 pp.1-6 |
ICSS |
2017-11-20 15:40 |
Oita |
Beppu International Convention Center |
Educational Tools to Learn Concrete Control Measures Corresponding to Threats of Cyber Attacks Tan Omiya, Daisuke Miyamoto, Youki Kadobayashi (NAIST) ICSS2017-40 |
Recently, the threats of cyber attacks have increased. There is the need to understand information security measures to ... [more] |
ICSS2017-40 pp.11-16 |
IA |
2017-10-13 16:30 |
Tokyo |
Fukutake Hall, The University of Tokyo |
Testbed for Security Analysis of the DNS64 IPv6 Transition Technology in Virtual Environment Gabor Lencse, Youki Kadobayashi (NAIST) IA2017-22 |
In this paper, we demonstrate the feasibility of building a virtual network with several virtual Linux hosts for testing... [more] |
IA2017-22 pp.19-24 |