Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-11-22 16:00 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
A Study on BGP Routing Operations in the Deployment of ASPA as Path Validation Yusho Yamaguchi (Osaka Univ.), Taiji Kimura (JPNIC), Naoto Yanai, Atsuo Inomata (Osaka Univ.) IA2023-40 |
Autonomous Systems Path Authorization (ASPA) is a technology for verifying routing information advertised in Border Gate... [more] |
IA2023-40 pp.25-32 |
IA, ICSS |
2021-06-22 10:50 |
Online |
Online |
Simulation Evaluation of Incentives for RPKI Deployment Tatsuya Oryu, Ishibashi Keisuke (ICU) IA2021-13 ICSS2021-13 |
The effectiveness of Resource Public Key Infrastructure (RPKI) has been proposed as a countermeasure against BGP route h... [more] |
IA2021-13 ICSS2021-13 pp.68-73 |
IA, SITE, IPSJ-IOT [detail] |
2020-03-03 15:40 |
Online |
Online |
A PKI Extension of OSPFv3 to Ensure Source of Prefixes Takahiro Oriishi, Kenji Matsuura (Tokushima Univ.), Kenji Ohira (Osaka Univ.) SITE2019-100 IA2019-78 |
In the investigation of incidents, investigators identify a source of IP packet to perform countermeasures.
Therefore, ... [more] |
SITE2019-100 IA2019-78 pp.175-180 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 11:35 |
Kochi |
Kochi University of Technology |
A method of giving trust to users in Bitcoin Asuka Suzuki, Teppei Sato (Tsukuba Univ.), Omote Kazumasa (Tsukuba Univ./NICT) ISEC2019-16 SITE2019-10 BioX2019-8 HWS2019-11 ICSS2019-14 EMM2019-19 |
In the Bitcoin network, there is no construction to give trust to the participating nodes. On the other hand, there is P... [more] |
ISEC2019-16 SITE2019-10 BioX2019-8 HWS2019-11 ICSS2019-14 EMM2019-19 pp.29-34 |
IA, SITE, IPSJ-IOT [detail] |
2019-03-07 10:00 |
Tokushima |
Grand XIV Naruto |
Reduction of TLS Certificate Validation Cost on Network Administrators Kohki Mori, Takahiro Oriishi, Kenji Ohira (Tokushima Univ.) SITE2018-68 IA2018-60 |
(To be available after the conference date) [more] |
SITE2018-68 IA2018-60 pp.1-8 |
SITE, ISEC, LOIS |
2018-11-04 10:00 |
Fukuoka |
|
Introduction of PKI Electronic Authentication for Important IoT Devices
-- For Establishment of Secure IoT Platform -- Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32 |
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] |
ISEC2018-72 SITE2018-50 LOIS2018-32 pp.45-50 |
IN, ICTSSL, NWS (Joint) [detail] |
2018-10-19 11:35 |
Kagawa |
Takamatsu Shoko Kaigisyo Kaikan |
VANET (Vehicle Ad-hoc Network) Security and Blockchain Hirofumi Onishi (Alpine America Research) ICTSSL2018-31 IN2018-48 |
Broader connectivity between modern vehicles and the external IT world enlarges the social concern about cyber-risks on ... [more] |
ICTSSL2018-31 IN2018-48 pp.31-36 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-19 15:55 |
Okinawa |
|
[Short Paper]
An implementation method of a system for management of personal health records with health examination data Ayane Nakashima, Naoko Taira, Hiroyuki Suzuki, Takashi Obi, Nagaaki Ohyama (Tokyo Inst. of Tech.) MI2017-83 |
(To be available after the conference date) [more] |
MI2017-83 pp.63-64 |
LOIS |
2018-03-02 10:50 |
Okinawa |
Naha-City IT Souzoukan(Okinawa) |
A new approach to PHR through the validation check of medical insurance Saori Oji, Suzuki Hiroyuki, Takashi Obi, Ohyama Nagaaki (Tokyo Tech) |
(To be available after the conference date) [more] |
|
NS, IN (Joint) |
2018-03-02 15:40 |
Miyazaki |
Phoenix Seagaia Resort |
Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239 |
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] |
NS2017-239 pp.403-408 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-05 10:00 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Information Disclosing Mechanism Based on the Healthcare PKI for Collaboration of Home Medical Care and Nursing Services Yoichiro Inayoshi (NIT), Yoshiaki Shiraishi (Kobe Univ.), Jun Takeo, Shohei Kato, Takaaki Yaguchi, Akira Iwata (NIT) LOIS2017-19 IE2017-40 EMM2017-48 |
In home medical care and nursing, information sharing using ICT among medical care workers makes team care smooth and im... [more] |
LOIS2017-19 IE2017-40 EMM2017-48 pp.51-56 |
BioX |
2016-08-19 11:20 |
Miyagi |
|
A Study on Convenient Key Update for Public Biometrics Infrastructure Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi (Hitachi) BioX2016-15 |
Network society and e-government services are advanced, and the importance of personal authentication infrastructure inc... [more] |
BioX2016-15 pp.45-50 |
ICSS, IA |
2016-06-07 11:00 |
Saga |
Saga University |
Measuring BGP Origin Validation Effect for Mis-Origination Masahito Ando (Toho Univ.), Masayuki Okada (JPNIC), Akira Kanaoka (Toho Univ.) IA2016-10 ICSS2016-10 |
Current Border Gateway Protocol (BGP) operation in the Internet has serious problem about Mis-Origination which is hijac... [more] |
IA2016-10 ICSS2016-10 pp.51-56 |
ICSS |
2015-03-04 10:25 |
Okinawa |
Meio Univiersity |
Improving certificate validation function in SSL/TLS implementations of web browser Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) ICSS2014-84 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ICSS2014-84 pp.127-132 |
IA, IN (Joint) |
2014-12-19 14:45 |
Hiroshima |
Hiroshima City University |
A new method for constructing Dynamic VPN using PKI certificate authentication and OpenFlow control Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) IN2014-97 |
With increasing demand for the protection of personal information on the network, high level security measures is requir... [more] |
IN2014-97 pp.35-39 |
ISEC, LOIS, SITE |
2014-11-22 13:20 |
Hyogo |
|
Improving certificate validation in SSL/TLS implementations Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST) ISEC2014-67 SITE2014-58 LOIS2014-37 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ISEC2014-67 SITE2014-58 LOIS2014-37 pp.65-70 |
ICM, CQ, NS, NV (Joint) |
2014-11-13 09:25 |
Kochi |
Kochi-City-Culture-Plaza CUL-PORT |
A Suggestion of a secure network implementation based on the Healthcare PKI and OpenFlow control Technology. Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) ICM2014-17 |
In dealing with medical information of patients through the network, high-level security is required. The Security Guide... [more] |
ICM2014-17 pp.7-11 |
IA |
2014-09-12 17:15 |
Tokyo |
Tokyo Tech Front |
[Invited Talk]
Issues and perspectives on RPKI and BGPSEC Taiji Kimura (JPNIC) IA2014-21 |
– Resource Public-Key Infrastructure, is a mechanism to issue digital certificates that certify allocation/assignm... [more] |
IA2014-21 pp.41-45 |
ISEC, IT, WBS |
2014-03-10 10:35 |
Aichi |
Nagoya Univ., Higashiyama Campus |
An XML Based Document Management Framework to Prevent Data Leakage Kamran Morovati (Univ. of pune), Sanjay Kadam (C-DAC) IT2013-58 ISEC2013-87 WBS2013-47 |
This paper proposes a secure document management framework to reduce the risk of unauthorized data disclosure in an orga... [more] |
IT2013-58 ISEC2013-87 WBS2013-47 pp.27-34 |
LOIS |
2012-03-09 12:50 |
Okinawa |
Meio Univ. |
A proposed method for authority transfer using mobile-phones Kimihiro Yamakoshi, Hideaki Yamamoto, Tetsushi Morita, Takeshi Suganuma (NTT) LOIS2011-100 |
We propose an authentication method for personal identification using a smart-phone utilizing a personal identification ... [more] |
LOIS2011-100 pp.165-170 |