IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 48  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2023-11-22
16:00
Aomori Aomori Prefecture Tourist Center ASPM (Aomori)
(Primary: On-site, Secondary: Online)
A Study on BGP Routing Operations in the Deployment of ASPA as Path Validation
Yusho Yamaguchi (Osaka Univ.), Taiji Kimura (JPNIC), Naoto Yanai, Atsuo Inomata (Osaka Univ.) IA2023-40
Autonomous Systems Path Authorization (ASPA) is a technology for verifying routing information advertised in Border Gate... [more] IA2023-40
pp.25-32
IA, ICSS 2021-06-22
10:50
Online Online Simulation Evaluation of Incentives for RPKI Deployment
Tatsuya Oryu, Ishibashi Keisuke (ICU) IA2021-13 ICSS2021-13
The effectiveness of Resource Public Key Infrastructure (RPKI) has been proposed as a countermeasure against BGP route h... [more] IA2021-13 ICSS2021-13
pp.68-73
IA, SITE, IPSJ-IOT [detail] 2020-03-03
15:40
Online Online A PKI Extension of OSPFv3 to Ensure Source of Prefixes
Takahiro Oriishi, Kenji Matsuura (Tokushima Univ.), Kenji Ohira (Osaka Univ.) SITE2019-100 IA2019-78
In the investigation of incidents, investigators identify a source of IP packet to perform countermeasures.
Therefore, ... [more]
SITE2019-100 IA2019-78
pp.175-180
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
11:35
Kochi Kochi University of Technology A method of giving trust to users in Bitcoin
Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT) ISEC2019-16 SITE2019-10 BioX2019-8 HWS2019-11 ICSS2019-14 EMM2019-19
In the Bitcoin network, there is no construction to give trust to the participating nodes. On the other hand, there is P... [more] ISEC2019-16 SITE2019-10 BioX2019-8 HWS2019-11 ICSS2019-14 EMM2019-19
pp.29-34
IA, SITE, IPSJ-IOT [detail] 2019-03-07
10:00
Tokushima Grand XIV Naruto Reduction of TLS Certificate Validation Cost on Network Administrators
Kohki Mori, Takahiro Oriishi, Kenji Ohira (Tokushima Univ.) SITE2018-68 IA2018-60
(To be available after the conference date) [more] SITE2018-68 IA2018-60
pp.1-8
SITE, ISEC, LOIS 2018-11-04
10:00
Fukuoka   Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] ISEC2018-72 SITE2018-50 LOIS2018-32
pp.45-50
IN, ICTSSL, NWS
(Joint) [detail]
2018-10-19
11:35
Kagawa Takamatsu Shoko Kaigisyo Kaikan VANET (Vehicle Ad-hoc Network) Security and Blockchain
Hirofumi Onishi (Alpine America Research) ICTSSL2018-31 IN2018-48
Broader connectivity between modern vehicles and the external IT world enlarges the social concern about cyber-risks on ... [more] ICTSSL2018-31 IN2018-48
pp.31-36
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
15:55
Okinawa   [Short Paper] An implementation method of a system for management of personal health records with health examination data
Ayane Nakashima, Naoko Taira, Hiroyuki Suzuki, Takashi Obi, Nagaaki Ohyama (Tokyo Inst. of Tech.) MI2017-83
(To be available after the conference date) [more] MI2017-83
pp.63-64
LOIS 2018-03-02
10:50
Okinawa Naha-City IT Souzoukan(Okinawa) A new approach to PHR through the validation check of medical insurance
Saori Oji, Suzuki Hiroyuki, Takashi Obi, Ohyama Nagaaki (Tokyo Tech)
(To be available after the conference date) [more]
NS, IN
(Joint)
2018-03-02
15:40
Miyazaki Phoenix Seagaia Resort Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices
Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] NS2017-239
pp.403-408
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-05
10:00
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Information Disclosing Mechanism Based on the Healthcare PKI for Collaboration of Home Medical Care and Nursing Services
Yoichiro Inayoshi (NIT), Yoshiaki Shiraishi (Kobe Univ.), Jun Takeo, Shohei Kato, Takaaki Yaguchi, Akira Iwata (NIT) LOIS2017-19 IE2017-40 EMM2017-48
In home medical care and nursing, information sharing using ICT among medical care workers makes team care smooth and im... [more] LOIS2017-19 IE2017-40 EMM2017-48
pp.51-56
BioX 2016-08-19
11:20
Miyagi   A Study on Convenient Key Update for Public Biometrics Infrastructure
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi (Hitachi) BioX2016-15
Network society and e-government services are advanced, and the importance of personal authentication infrastructure inc... [more] BioX2016-15
pp.45-50
ICSS, IA 2016-06-07
11:00
Saga Saga University Measuring BGP Origin Validation Effect for Mis-Origination
Masahito Ando (Toho Univ.), Masayuki Okada (JPNIC), Akira Kanaoka (Toho Univ.) IA2016-10 ICSS2016-10
Current Border Gateway Protocol (BGP) operation in the Internet has serious problem about Mis-Origination which is hijac... [more] IA2016-10 ICSS2016-10
pp.51-56
ICSS 2015-03-04
10:25
Okinawa Meio Univiersity Improving certificate validation function in SSL/TLS implementations of web browser
Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) ICSS2014-84
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] ICSS2014-84
pp.127-132
IA, IN
(Joint)
2014-12-19
14:45
Hiroshima Hiroshima City University A new method for constructing Dynamic VPN using PKI certificate authentication and OpenFlow control
Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) IN2014-97
With increasing demand for the protection of personal information on the network, high level security measures is requir... [more] IN2014-97
pp.35-39
ISEC, LOIS, SITE 2014-11-22
13:20
Hyogo   Improving certificate validation in SSL/TLS implementations
Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST) ISEC2014-67 SITE2014-58 LOIS2014-37
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] ISEC2014-67 SITE2014-58 LOIS2014-37
pp.65-70
ICM, CQ, NS, NV
(Joint)
2014-11-13
09:25
Kochi Kochi-City-Culture-Plaza CUL-PORT A Suggestion of a secure network implementation based on the Healthcare PKI and OpenFlow control Technology.
Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) ICM2014-17
In dealing with medical information of patients through the network, high-level security is required. The Security Guide... [more] ICM2014-17
pp.7-11
IA 2014-09-12
17:15
Tokyo Tokyo Tech Front [Invited Talk] Issues and perspectives on RPKI and BGPSEC
Taiji Kimura (JPNIC) IA2014-21
– Resource Public-Key Infrastructure, is a mechanism to issue digital certificates that certify allocation/assignm... [more] IA2014-21
pp.41-45
ISEC, IT, WBS 2014-03-10
10:35
Aichi Nagoya Univ., Higashiyama Campus An XML Based Document Management Framework to Prevent Data Leakage
Kamran Morovati (Univ. of pune), Sanjay Kadam (C-DAC) IT2013-58 ISEC2013-87 WBS2013-47
This paper proposes a secure document management framework to reduce the risk of unauthorized data disclosure in an orga... [more] IT2013-58 ISEC2013-87 WBS2013-47
pp.27-34
LOIS 2012-03-09
12:50
Okinawa Meio Univ. A proposed method for authority transfer using mobile-phones
Kimihiro Yamakoshi, Hideaki Yamamoto, Tetsushi Morita, Takeshi Suganuma (NTT) LOIS2011-100
We propose an authentication method for personal identification using a smart-phone utilizing a personal identification ... [more] LOIS2011-100
pp.165-170
 Results 1 - 20 of 48  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan