IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2023-09-22
15:00
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Signing key management in cryptocurrency custodians learned from DNSSEC
Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] IA2023-30
pp.115-122
HWS, VLD 2019-02-28
17:10
Okinawa Okinawa Ken Seinen Kaikan Error correction method for PUF utilizing the Pixel Variation in the CMOS Image Sensor
Ryota Ishiki, Masayoshi Shirahata (Ritsumeikan Univ.), Shunsuke Okura (Brillnics), Mitsuru Shiozaki, Takaya Kubota (Ritsumeikan Univ.), Kenichiro Ishikawa, Isao Takayanagi (Brillnics), Takeshi Fujino (Ritsumeikan Univ.) VLD2018-121 HWS2018-84
(To be available after the conference date) [more] VLD2018-121 HWS2018-84
pp.169-174
HWS, VLD 2019-03-02
10:50
Okinawa Okinawa Ken Seinen Kaikan A Report on Adoption Rates of Android Devices Implemented Hardware-backed Key Management
Kohei Isobe, Takahito Sakamoto (SECOM) VLD2018-139 HWS2018-102
Recent smart device OSs provide a hardware-backed key management system which uses TEE or secure elements.
To enable ha... [more]
VLD2018-139 HWS2018-102
pp.271-276
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
13:45
Hokkaido Sapporo Convention Center Consideration on Crypto Key Management Devices on the Market.
Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM) ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39
Cryptographic key management devices have been widely used to hire crypt-technologies securely. Most of these cryptograp... [more] ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39
pp.327-332
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
15:00
Hokkaido Sapporo Convention Center Side-Channel Attacks on an Error-Correction Circuit of Fuzzy Extractor
Yuta Goto, Mitsuru Shiozaki, Takeshi Fujino (Ritsumeikan Univ) ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42
(To be available after the conference date) [more] ISEC2018-43 SITE2018-35 HWS2018-40 ICSS2018-46 EMM2018-42
pp.343-348
SIS, IPSJ-AVM 2014-09-11
10:45
Yamagata SHONAI INDUSTRIAL PROMOTION CENTER A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images
Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] SIS2014-53
pp.13-18
ISEC 2013-12-11
16:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2)
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-80
A storage encryption scheme is studied. In a storage encryption scheme, data encryption and key encryption are executed.... [more] ISEC2013-80
pp.47-51
ICM 2013-03-14
09:40
Kagoshima Yakushima Environmental Culture Village Center Updating Group Encryption Key for Removing Multiple Members
Satoshi Horiike (Hyogo Univ.) ICM2012-59
The contents of group communication must be encrypted to prevent access by nodes outside the group. The keys used for th... [more] ICM2012-59
pp.1-6
NS 2011-05-19
15:00
Tokyo Sophia University AMSO : Unified Key Management Mechanism for Smart Meters
Yasuyuki Tanaka, Yoshihiro Ohba, Mitsuru Kanda (Toshiba) NS2011-28
Security functions are indispensable to smart meters. However, it is hard to apply the conventional security mechanisms ... [more] NS2011-28
pp.65-68
CS, SIP, CAS 2011-03-03
14:30
Okinawa Ohhamanobumoto memorial hall (Ishigaki)( An efficient access control method for hierarchical multimedia content
Shoko Imaizumi (IRI Niigata), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2010-136 SIP2010-152 CS2010-106
This paper proposes an efficient method of access control for multimedia content. The proposed method controls access to... [more] CAS2010-136 SIP2010-152 CS2010-106
pp.203-208
ICSS 2010-11-05
11:20
Hiroshima Hiroshima City University Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] ICSS2010-46
pp.11-15
SR, AN, USN
(Joint)
2009-10-22
13:40
Miyagi Tohoku Univ. Proposal and Evaluation of a Group Key Management Scheme for Ad-hoc Sensor Networks
Jun Noda (NEC), Yuichi Kaji (Nara Inst. of Science and Tech.), Toshiyasu Nakao (NEC) USN2009-28
We propose a new group key management scheme for ad-hoc sensor networks. In ad-hoc sensor networks, we need an appropria... [more] USN2009-28
pp.1-6
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:00
Akita Akita University Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks
Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) ISEC2009-31 SITE2009-23 ICSS2009-45
In MANETs (Mobile Ad-hoc Networks), distributed key managements are effective because of the infrastructureless feature.... [more] ISEC2009-31 SITE2009-23 ICSS2009-45
pp.169-174
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System
Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] IT2008-55 ISEC2008-113 WBS2008-68
pp.71-78
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement
Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] IT2008-91 ISEC2008-149 WBS2008-104
pp.307-314
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:10
Hokkaido Future University-Hakodate Group Key Based Revocation Schemes with Shorter Message Header
Tasuku Ohkubo, Takashi Satoh (Univ. of Kitakyushu) ISEC2007-36 SITE2007-30
 [more] ISEC2007-36 SITE2007-30
pp.139-143
CW
(2nd)
2007-06-08 Kanagawa   Secure Key Management for Home Sensor Networks
Taketsugu Yao, Ryohei Konuma (OKI)
Wireless LANs have become widely deployed in recent years, and in the next step, we expect that home information applian... [more]
IT, ISEC, WBS 2007-03-16
09:45
Gunma Gunma Univ. (Kiryu Campus) Key Update by Broadcast Encryption for Wireless Sensor Networks
Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI)
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] IT2006-96 ISEC2006-151 WBS2006-93
pp.65-70
ISEC 2006-09-13
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry
Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST)
This study investigates new schemes for distributing cryptographic keys in sensor networks. Sharing a key is the very fi... [more] ISEC2006-85
pp.97-104
IA 2006-05-24
11:15
Kyoto Campus Plaza Kyoto Development of Single Sign-On System with hardware token and key management server
Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT) IA2006-2
With the growth of the Internet, various types of services,such as World Wide Web (WWW), File Transfer Protocol (FTP), r... [more] IA2006-2
pp.7-12
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan