Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2018-03-01 10:30 |
Miyazaki |
Phoenix Seagaia Resort |
A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101 |
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] |
IN2017-101 pp.69-74 |
NS, IN (Joint) |
2018-03-02 15:40 |
Miyazaki |
Phoenix Seagaia Resort |
Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239 |
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] |
NS2017-239 pp.403-408 |
LOIS, ISEC, SITE |
2017-11-09 09:30 |
Kyoto |
|
Consciousness Investigation of Passwords Management in University Students
-- Questionnaire Design based on Friend Relationships -- Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27 |
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] |
ISEC2017-50 SITE2017-32 LOIS2017-27 pp.7-12 |
LOIS, ISEC, SITE |
2017-11-09 10:00 |
Kyoto |
|
User Authentication Keeping Method Using Watch Type Devices
-- Case of Acceleration Sensors -- Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) ISEC2017-51 SITE2017-33 LOIS2017-28 |
Wearable devices are going to be popular in near future. These devices also can be used in user authentications. In thes... [more] |
ISEC2017-51 SITE2017-33 LOIS2017-28 pp.13-18 |
ICD, IE, VLD, IPSJ-SLDM [detail] |
2015-10-26 13:50 |
Miyagi |
|
[Invited Talk]
Human pattern recognition and humanics security Masakatsu Nishigaki (Shizuoka Univ.) VLD2015-28 ICD2015-41 IE2015-63 |
It is very important to achieve the security of ICT systems. As everybody knows, however, security and usability is trad... [more] |
VLD2015-28 ICD2015-41 IE2015-63 p.11 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:00 |
Nara |
Todaiji Total Cultural Center |
Identifying User Authentication Methods on SSH Sessions Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99 |
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] |
SITE2012-61 IA2012-99 pp.151-156 |
ISEC, IT, WBS |
2011-03-04 14:55 |
Osaka |
Osaka University |
User Authentication Using Neural Network Based on Keystroke Characteristics Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) IT2010-101 ISEC2010-105 WBS2010-80 |
Recently, several user authentication methods using keystroke characteristics for free-style text have been presented.
... [more] |
IT2010-101 ISEC2010-105 WBS2010-80 pp.213-220 |
IE |
2010-04-26 16:05 |
Tochigi |
|
A Study on a Graphical Password Using Wavelet Transform Takao Miyachi, Yuichi Tanaka, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) IE2010-12 |
Although entering user name and textual password are a major method for user authentication at the present time, it is n... [more] |
IE2010-12 pp.67-72 |
NS |
2009-12-11 14:15 |
Ehime |
Ehime University (Ehime) |
A Study on a Personal ID Communication Method using IC Card Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-139 |
We propose the new communication method that uses the personal ID and the contactless IC card in place of the communicat... [more] |
NS2009-139 pp.105-110 |
IA |
2009-11-25 16:50 |
Saga |
Saga-Ken |
Delegate Authentication System Achieving Secure Access and Low System Management Cost for Campus WLAN Roaming Ichiro Yamaguchi, Takaaki Suzuki, Junichi Yamato, Hisaya Wakayama, Hideaki Goto, Hideaki Sone (Tohoku Univ.) IA2009-64 |
Recent proliferation of Wireless LAN devices has created a high demand for roaming systems that enable network connectio... [more] |
IA2009-64 pp.37-40 |
CQ, NS, ICM (Joint) |
2009-11-12 15:30 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
A Study on a Communication Method using Personal ID in Future Network Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-107 |
We propose a new communication method using the personal ID in place of the existing telephone number and IP address.
T... [more] |
NS2009-107 pp.23-26 |
IA |
2009-01-29 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Investigation of Lifelong Information Services Using Lifelong User ID in Higher Educational Institutions Shoji Kajita, Yoshihiro Ohta, Yoshinori Tajima, Hisanori Tajima, Yasushi Hirano, Hisashi Naito, Kenji Mase (Nagoya Univ.) IA2008-62 |
Nagoya University ID is a lifelong User ID issued by Information
Communication Technology Services, instead of Univer... [more] |
IA2008-62 pp.83-88 |
ICM |
2008-05-08 16:00 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Management of Unified-Server in Nagoya University Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9 |
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more] |
ICM2008-9 pp.47-52 |
USN, CQ, MoNA (Joint) |
2008-01-24 17:20 |
Shizuoka |
Kenshu Kouryu Center, Actcity Hamamatsu (Shizuoka) |
[Invited Talk]
Biometric Person Authentication
-- Issue on Biometric System Security -- Naohisa Komatsu (Waseda Univ.) CQ2007-91 MoMuC2007-72 USN2007-63 |
Researches and Developments of biometric authentication systems have been carrying on along with standardization activit... [more] |
CQ2007-91 MoMuC2007-72 USN2007-63 pp.61-66(CQ), pp.43-48(MoMuC), pp.49-54(USN) |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:35 |
Hokkaido |
Future University-Hakodate |
A Proposal of User Authentication using Convergence Reflex and Eyeball Shape Naoyuki Aoyama, Masakatsu Nishigaki (Shizuoka Univ.) |
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] |
ISEC2007-42 SITE2007-36 pp.185-191 |
NS, IN (Joint) |
2007-03-09 16:20 |
Okinawa |
Okinawa Convention Center |
A Study on Application Hosting Platform over NGN
-- Authentication Mechanisms for Application Collaboration -- Daisuke Hara, Masashi Kaneko, Minoru Sakuma, Hikaru Takenaka (NTT) NS2006-204 |
This paper presents authentication mechanisms for application collaboration on the Application Hosting Platform (AH-PF) ... [more] |
NS2006-204 pp.237-240 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:25 |
Okayama |
Okayama Univ. |
A User Authentication using Blind Spot and Papillary Light Reflex (part2) Yuji Ozawa, Daisuke Arai, Masakatsu Nishigaki (Shizuoka Univ) |
Biometrics information could be easily leaked and/or copied. Therefore, biometrics authentication in which biometric inf... [more] |
ISEC2006-63 pp.173-180 |
NS |
2005-06-23 16:25 |
Fukuoka |
Production and Systems, Waseda Univ.(Kitakyusyu) |
A Secure Campus Public Network using User and MAC Address Binding Authentication to Reduce Operational Costs Takafumi Okuyama, Noriyuki Takahashi, Kenta Yasukawa, Yukio Shigenari, Takamichi Miyata, Katsuyoshi Iida (TokyoTech) |
Many high educational institutes including universities are now deploying campus public LAN to enable accessing educatio... [more] |
NS2005-45 pp.29-32 |
NS |
2005-06-23 17:15 |
Fukuoka |
Production and Systems, Waseda Univ.(Kitakyusyu) |
A Method of Secure Multicast Access Control for Universal Data Steaming Tsunemasa Hayashi, Hiroaki Satou, Hiroshi Ohta, Jun Nishikido, Hitoshi Uematsu (NTT) |
We propose MSAP (Multicast Secure Access Protocol), a secure group management protocol which manages requests from both ... [more] |
NS2005-47 pp.37-40 |