IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2018-03-01
10:30
Miyazaki Phoenix Seagaia Resort A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication
Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] IN2017-101
pp.69-74
NS, IN
(Joint)
2018-03-02
15:40
Miyazaki Phoenix Seagaia Resort Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices
Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] NS2017-239
pp.403-408
LOIS, ISEC, SITE 2017-11-09
09:30
Kyoto   Consciousness Investigation of Passwords Management in University Students -- Questionnaire Design based on Friend Relationships --
Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] ISEC2017-50 SITE2017-32 LOIS2017-27
pp.7-12
LOIS, ISEC, SITE 2017-11-09
10:00
Kyoto   User Authentication Keeping Method Using Watch Type Devices -- Case of Acceleration Sensors --
Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) ISEC2017-51 SITE2017-33 LOIS2017-28
Wearable devices are going to be popular in near future. These devices also can be used in user authentications. In thes... [more] ISEC2017-51 SITE2017-33 LOIS2017-28
pp.13-18
ICD, IE, VLD, IPSJ-SLDM [detail] 2015-10-26
13:50
Miyagi   [Invited Talk] Human pattern recognition and humanics security
Masakatsu Nishigaki (Shizuoka Univ.) VLD2015-28 ICD2015-41 IE2015-63
It is very important to achieve the security of ICT systems. As everybody knows, however, security and usability is trad... [more] VLD2015-28 ICD2015-41 IE2015-63
p.11
IA, SITE, IPSJ-IOT [detail] 2013-03-15
10:00
Nara Todaiji Total Cultural Center Identifying User Authentication Methods on SSH Sessions
Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] SITE2012-61 IA2012-99
pp.151-156
ISEC, IT, WBS 2011-03-04
14:55
Osaka Osaka University User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) IT2010-101 ISEC2010-105 WBS2010-80
Recently, several user authentication methods using keystroke characteristics for free-style text have been presented.
... [more]
IT2010-101 ISEC2010-105 WBS2010-80
pp.213-220
IE 2010-04-26
16:05
Tochigi   A Study on a Graphical Password Using Wavelet Transform
Takao Miyachi, Yuichi Tanaka, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) IE2010-12
Although entering user name and textual password are a major method for user authentication at the present time, it is n... [more] IE2010-12
pp.67-72
NS 2009-12-11
14:15
Ehime Ehime University (Ehime) A Study on a Personal ID Communication Method using IC Card
Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-139
We propose the new communication method that uses the personal ID and the contactless IC card in place of the communicat... [more] NS2009-139
pp.105-110
IA 2009-11-25
16:50
Saga Saga-Ken Delegate Authentication System Achieving Secure Access and Low System Management Cost for Campus WLAN Roaming
Ichiro Yamaguchi, Takaaki Suzuki, Junichi Yamato, Hisaya Wakayama, Hideaki Goto, Hideaki Sone (Tohoku Univ.) IA2009-64
Recent proliferation of Wireless LAN devices has created a high demand for roaming systems that enable network connectio... [more] IA2009-64
pp.37-40
CQ, NS, ICM
(Joint)
2009-11-12
15:30
Ishikawa Kanazawa Institute of Technology (Ishikawa) A Study on a Communication Method using Personal ID in Future Network
Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-107
We propose a new communication method using the personal ID in place of the existing telephone number and IP address.
T... [more]
NS2009-107
pp.23-26
IA 2009-01-29
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. Investigation of Lifelong Information Services Using Lifelong User ID in Higher Educational Institutions
Shoji Kajita, Yoshihiro Ohta, Yoshinori Tajima, Hisanori Tajima, Yasushi Hirano, Hisashi Naito, Kenji Mase (Nagoya Univ.) IA2008-62
Nagoya University ID is a lifelong User ID issued by Information
Communication Technology Services, instead of Univer... [more]
IA2008-62
pp.83-88
ICM 2008-05-08
16:00
Kagoshima Kagoshima Public Access Center Construction and Management of Unified-Server in Nagoya University
Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more]
ICM2008-9
pp.47-52
USN, CQ, MoNA
(Joint)
2008-01-24
17:20
Shizuoka Kenshu Kouryu Center, Actcity Hamamatsu (Shizuoka) [Invited Talk] Biometric Person Authentication -- Issue on Biometric System Security --
Naohisa Komatsu (Waseda Univ.) CQ2007-91 MoMuC2007-72 USN2007-63
Researches and Developments of biometric authentication systems have been carrying on along with standardization activit... [more] CQ2007-91 MoMuC2007-72 USN2007-63
pp.61-66(CQ), pp.43-48(MoMuC), pp.49-54(USN)
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:35
Hokkaido Future University-Hakodate A Proposal of User Authentication using Convergence Reflex and Eyeball Shape
Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.)
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] ISEC2007-42 SITE2007-36
pp.185-191
NS, IN
(Joint)
2007-03-09
16:20
Okinawa Okinawa Convention Center A Study on Application Hosting Platform over NGN -- Authentication Mechanisms for Application Collaboration --
Daisuke Hara, Masashi Kaneko, Minoru Sakuma, Hikaru Takenaka (NTT) NS2006-204
This paper presents authentication mechanisms for application collaboration on the Application Hosting Platform (AH-PF) ... [more] NS2006-204
pp.237-240
ISEC, SITE, IPSJ-CSEC 2006-07-21
13:25
Okayama Okayama Univ. A User Authentication using Blind Spot and Papillary Light Reflex (part2)
Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ)
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] ISEC2006-63
pp.173-180
NS 2005-06-23
16:25
Fukuoka Production and Systems, Waseda Univ.(Kitakyusyu) A Secure Campus Public Network using User and MAC Address Binding Authentication to Reduce Operational Costs
Takafumi Okuyama, Noriyuki Takahashi, Kenta Yasukawa, Yukio Shigenari, Takamichi Miyata, Katsuyoshi Iida (TokyoTech)
Many high educational institutes including universities are now deploying campus public LAN to enable accessing educatio... [more] NS2005-45
pp.29-32
NS 2005-06-23
17:15
Fukuoka Production and Systems, Waseda Univ.(Kitakyusyu) A Method of Secure Multicast Access Control for Universal Data Steaming
Tsunemasa Hayashi, Hiroaki Satou, Hiroshi Ohta, Jun Nishikido, Hitoshi Uematsu (NTT)
We propose MSAP (Multicast Secure Access Protocol), a secure group management protocol which manages requests from both ... [more] NS2005-47
pp.37-40
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan