|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2021-03-26 12:00 |
Online |
Online |
A Logic Locking Method Based on Anti-SAT at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-64 DC2020-94 |
In recent years, increasing circuit density, it has become difficult for only one semiconductor design company to design... [more] |
CPSY2020-64 DC2020-94 pp.85-90 |
CPSY, DC, IPSJ-ARC [detail] |
2020-07-31 17:30 |
Online |
Online |
An Area Reduction Oriented Controller Augmentation Method Based on Functionally Equivalent Finite State Machine Generation Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-15 DC2020-15 |
In recent year, controller augmentation has been used for design-for-testability and design-for-security at register tra... [more] |
CPSY2020-15 DC2020-15 pp.93-98 |
KBSE |
2019-03-02 09:00 |
Kyoto |
Doshisha University Kambaikan |
Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62 |
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] |
KBSE2018-62 pp.51-56 |
KBSE |
2018-03-01 15:50 |
Okinawa |
|
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
IA |
2006-07-20 10:30 |
Kanagawa |
Kanagawa University (Minatomirai, KU Port-Square) |
[Invited Talk]
Measuring Biometric System's Power to Reject Fake Objects Tsutomu Matsumoto (Yokohama National Univ.) IA2006-11 |
(To be available after the conference date) [more] |
IA2006-11 pp.1-6 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|