Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
HWS, VLD |
2019-02-28 17:10 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Error correction method for PUF utilizing the Pixel Variation in the CMOS Image Sensor Ryota Ishiki, Masayoshi Shirahata (Ritsumeikan Univ.), Shunsuke Okura (Brillnics), Mitsuru Shiozaki, Takaya Kubota (Ritsumeikan Univ.), Kenichiro Ishikawa, Isao Takayanagi (Brillnics), Takeshi Fujino (Ritsumeikan Univ.) VLD2018-121 HWS2018-84 |
(To be available after the conference date) [more] |
VLD2018-121 HWS2018-84 pp.169-174 |
HWS, VLD |
2019-03-02 10:50 |
Okinawa |
Okinawa Ken Seinen Kaikan |
A Report on Adoption Rates of Android Devices Implemented Hardware-backed Key Management Kohei Isobe, Takahito Sakamoto (SECOM) VLD2018-139 HWS2018-102 |
Recent smart device OSs provide a hardware-backed key management system which uses TEE or secure elements.
To enable ha... [more] |
VLD2018-139 HWS2018-102 pp.271-276 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 13:45 |
Hokkaido |
Sapporo Convention Center |
Consideration on Crypto Key Management Devices on the Market. Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM) ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39 |
Cryptographic key management devices have been widely used to hire crypt-technologies securely. Most of these cryptograp... [more] |
ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39 pp.327-332 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 15:00 |
Hokkaido |
Sapporo Convention Center |
Side-Channel Attacks on an Error-Correction Circuit of Fuzzy Extractor Yuta Goto, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ) ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42 |
(To be available after the conference date) [more] |
ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42 pp.343-348 |
SIS, IPSJ-AVM |
2014-09-11 10:45 |
Yamagata |
SHONAI INDUSTRIAL PROMOTION CENTER |
A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53 |
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] |
SIS2014-53 pp.13-18 |
ISEC |
2013-12-11 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2) Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-80 |
A storage encryption scheme is studied. In a storage encryption scheme, data encryption and key encryption are executed.... [more] |
ISEC2013-80 pp.47-51 |
ICM |
2013-03-14 09:40 |
Kagoshima |
Yakushima Environmental Culture Village Center |
Updating Group Encryption Key for Removing Multiple Members Satoshi Horiike (Hyogo Univ.) ICM2012-59 |
The contents of group communication must be encrypted to prevent access by nodes outside the group. The keys used for th... [more] |
ICM2012-59 pp.1-6 |
NS |
2011-05-19 15:00 |
Tokyo |
Sophia University |
AMSO : Unified Key Management Mechanism for Smart Meters Yasuyuki Tanaka, Yoshihiro Ohba, Mitsuru Kanda (Toshiba) NS2011-28 |
Security functions are indispensable to smart meters. However, it is hard to apply the conventional security mechanisms ... [more] |
NS2011-28 pp.65-68 |
CS, SIP, CAS |
2011-03-03 14:30 |
Okinawa |
Ohhamanobumoto memorial hall (Ishigaki)( |
An efficient access control method for hierarchical multimedia content Shoko Imaizumi (IRI Niigata), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2010-136 SIP2010-152 CS2010-106 |
This paper proposes an efficient method of access control for multimedia content. The proposed method controls access to... [more] |
CAS2010-136 SIP2010-152 CS2010-106 pp.203-208 |
ICSS |
2010-11-05 11:20 |
Hiroshima |
Hiroshima City University |
Proposal of Time-limited Key Management Scheme Using One-way Functions Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46 |
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] |
ICSS2010-46 pp.11-15 |
SR, AN, USN (Joint) |
2009-10-22 13:40 |
Miyagi |
Tohoku Univ. |
Proposal and Evaluation of a Group Key Management Scheme for Ad-hoc Sensor Networks Jun Noda (NEC), Yuichi Kaji (Nara Inst. of Science and Tech.), Toshiyasu Nakao (NEC) USN2009-28 |
We propose a new group key management scheme for ad-hoc sensor networks. In ad-hoc sensor networks, we need an appropria... [more] |
USN2009-28 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:00 |
Akita |
Akita University |
Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) ISEC2009-31 SITE2009-23 ICSS2009-45 |
In MANETs (Mobile Ad-hoc Networks), distributed key managements are effective because of the infrastructureless feature.... [more] |
ISEC2009-31 SITE2009-23 ICSS2009-45 pp.169-174 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68 |
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] |
IT2008-55 ISEC2008-113 WBS2008-68 pp.71-78 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104 |
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] |
IT2008-91 ISEC2008-149 WBS2008-104 pp.307-314 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 16:10 |
Hokkaido |
Future University-Hakodate |
Group Key Based Revocation Schemes with Shorter Message Header Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu) ISEC2007-36 SITE2007-30 |
[more] |
ISEC2007-36 SITE2007-30 pp.139-143 |
CW (2nd) |
2007-06-08 |
Kanagawa |
|
Secure Key Management for Home Sensor Networks Taketsugu Yao, Ryohei Konuma (OKI) |
Wireless LANs have become widely deployed in recent years, and in the next step, we expect that home information applian... [more] |
|
IT, ISEC, WBS |
2007-03-16 09:45 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Key Update by Broadcast Encryption for Wireless Sensor Networks Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI) |
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] |
IT2006-96 ISEC2006-151 WBS2006-93 pp.65-70 |
ISEC |
2006-09-13 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST) |
This study investigates new schemes for distributing cryptographic keys in sensor networks. Sharing a key is the very fi... [more] |
ISEC2006-85 pp.97-104 |
IA |
2006-05-24 11:15 |
Kyoto |
Campus Plaza Kyoto |
Development of Single Sign-On System with hardware token and key management server Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT) IA2006-2 |
With the growth of the Internet, various types of services,such as World Wide Web (WWW), File Transfer Protocol (FTP), r... [more] |
IA2006-2 pp.7-12 |