IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 226  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS 2024-04-26
13:25
Hiroshima
(Primary: On-site, Secondary: Online)
Performance Evaluation of Inter-Terminal Access Control Method in Millimeter Wave Terminal Cooperative Wireless Communication Systems
Yiche Li, Hiraku Okada, Chedlia Ben Naila, Masaaki Katayama (Nagiya Univ.) RCS2024-12
(To be available after the conference date) [more] RCS2024-12
pp.54-59
IA, SITE, IPSJ-IOT [detail] 2024-03-13
15:30
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Access control through topic analysis considering with intents
Yuta Kariya, Tetsuya Morizumi, Kaito Hosono, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2023-107 IA2023-113
(To be available after the conference date) [more] SITE2023-107 IA2023-113
pp.247-254
NS, IN
(Joint)
2024-02-29
09:45
Okinawa Okinawa Convention Center Performance Evaluation of Wireless Media Access Control V-SP-MAC Considering Mobility of Terminals
Akito Muramoto, Hiroyasu Obata, Chisa Takano (Hiroshima City Univ.) IN2023-78
In the multihop communication which has been considered as a method of information collection during disasters, the thro... [more] IN2023-78
pp.77-82
NS, NWS
(Joint)
2024-01-25
14:15
Hiroshima Higashisenda Campus, HiroshimaUniversity + Online
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Access Control Method to Prevent Session Token Abuse on OpenID Connect
Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] NS2023-162
pp.19-24
IN 2024-01-18
14:25
Aichi   Load Balancing Effect of Access Control Method in NDN Using Relay Nodes
Naoto Ohata, Masaya Nakayama (Tokyo Univ.) IN2023-52
In recent years, Information-Centric Networking (ICN), which has features such as in-network caching and routing by cont... [more] IN2023-52
pp.18-23
ICM, NS, CQ, NV
(Joint)
2023-11-22
09:50
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
A survey on suitable hook points for outbound packet monitoring using eBPF
Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] ICM2023-27
pp.26-31
LOIS, SITE, ISEC 2023-11-10
10:20
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Transaction Access Control Using ERC7303 and Its Applications
Ko Fujimura (Otsuma Women's Univ.) ISEC2023-63 SITE2023-57 LOIS2023-21
On the blockchain, applications such as cryptocurrencies, NFTs, and DeFi have become prevalent, and from around 2022, th... [more] ISEC2023-63 SITE2023-57 LOIS2023-21
pp.60-65
IN, ICTSSL, IEE-SMF 2023-10-19
09:00
Fukuoka Fukuoka University Effects and Investigate Attack Messages on the IoT-ZTN System
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] IN2023-32
pp.1-4
NS 2023-10-04
17:55
Hokkaido Hokkaidou University + Online
(Primary: On-site, Secondary: Online)
Access Control Method to Prevent ID Token Abuse on OpenID Connect
Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] NS2023-81
pp.53-58
IA 2023-09-21
16:30
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] IA2023-17
pp.38-42
SIP 2023-08-07
12:50
Osaka Osaka Univ. (Suita) Convention Center
(Primary: On-site, Secondary: Online)
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection
Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more]
SIP2023-46
pp.1-6
IA, ICSS 2023-06-21
09:55
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
A Proposal for Access Control Method based on File Relation Inference from Users Behavior
Yuki Kodaka (SOKENDAI), Hirokazu Hasegawa, Hiroki Takakura (NII) IA2023-8 ICSS2023-8
File access control is an effective method for protecting information from unauthorized access both within and outside a... [more] IA2023-8 ICSS2023-8
pp.40-47
IN, NS
(Joint)
2023-03-03
10:10
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Access Control Method with Privacy Preservation in NDN
Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] NS2022-221
pp.310-315
IN, NS
(Joint)
2023-03-03
12:00
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Proposal of Applying Blockchain Technology to IoT Data Distribution Method
Hayato Kumazaki, Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ.) IN2022-110
We have proposed Ticket-based Access Control, an access control system with a token called a ticket and Tag ID, which is... [more] IN2022-110
pp.265-270
NS, NWS
(Joint)
2023-01-26
13:00
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] NS2022-153
pp.19-24
SeMI, SeMI
(Joint)
2023-01-20
10:30
Tokushima Naruto grand hotel
(Primary: On-site, Secondary: Online)
Design of the basic architecture of a quasi-narrow band wireless communication system, DR-IoT
Susumu Ishihara, Shinka Asano, Ryosuke Umemoto (Shizuoka Univ.), Arata Kato, Shugo Kajita (スペースタイムエンジニアリング), Hiroshi Yamamoto (Ritsumeikan Univ.), Tetsushi Ikegami (Meiji Univ.), Mineo Takai (Osaka Univ.) SeMI2022-97
We have proposed DR-IoT (Diversified-Range/Disaster-Response IoT), a VHF-band wireless communication system using small ... [more] SeMI2022-97
pp.119-124
IN, IA
(Joint)
2022-12-13
15:50
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Verification of Environmental Differences in Latency caused by Dynamic Access Control Based on Users' Reliability
Atsushi Shinoda (Nagoya Univ.), Hirokazu Hasegawa (NII), Hajime Shimada, Yukiko Yamaguchi (Nagoya Univ.), Hiroki Takakura (NII) IA2022-66
Nowadays, environment has changed with increasing of telecommuting, and information security risks are rising in enterpr... [more] IA2022-66
pp.91-98
ISEC, SITE, LOIS 2022-11-18
15:55
Online Online Token-Controlled Token Circulation
Ko Fujimura (Otsuma Univ.) ISEC2022-42 SITE2022-46 LOIS2022-26
This paper presents a general-purpose token circulating system for circulating various types of rights such as tickets, ... [more] ISEC2022-42 SITE2022-46 LOIS2022-26
pp.73-78
RCS 2022-10-28
15:30
Ehime Ehime University, and online
(Primary: On-site, Secondary: Online)
[Invited Lecture] A Study on WLAN Media Access Control Based on the Model of Synchronization Phenomena of Coupled Oscillators
Hiroyasu Obata, Chisa Takano, Kenji Ishida (Hiroshima City Univ.) RCS2022-154
The wireless LAN (WLAN) has become one of major access networks for connecting the Internet.
However, the problem of th... [more]
RCS2022-154
pp.116-117
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
11:10
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
Construction of IoT System Based on Zero Trust Networks
Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] NS2022-41
pp.71-76
 Results 1 - 20 of 226  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan