Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2016-03-04 11:00 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on personalized selection methods for authentication elements and algorithms Fumiaki Kudo, Kenichiro Muto, Hideki Kawabe, Takahiro Yamamoto (NTT) LOIS2015-86 |
Modern smartphones and wearable devices comprise a multitude of sensors which can be utilized to measure a variety of us... [more] |
LOIS2015-86 pp.133-138 |
LOIS |
2016-03-04 11:20 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on data protection requirements for an authentication system using personal data Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87 |
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] |
LOIS2015-87 pp.139-144 |
PRMU |
2015-12-22 11:40 |
Nagano |
|
Development and comparing of personal authentication systems by signature in the air Daiki Yamada, Takuya Kitamura (NIT) PRMU2015-110 |
In late years biological distinction has been used for security systems because it has high reliabiliby. Biometric featu... [more] |
PRMU2015-110 pp.105-110 |
MBE, BioX, NC |
2015-10-25 10:30 |
Osaka |
Osaka Electro-Communication University |
Study on Personal Authentication Using Omnidirectional Fist Image Taichi Watanabe, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) BioX2015-26 MBE2015-37 NC2015-21 |
[more] |
BioX2015-26 MBE2015-37 NC2015-21 pp.25-30 |
BioX |
2015-08-25 09:30 |
Hokkaido |
Otaru Port Marina |
Personal authentication by combination of keystroke dynamics and images for fingers (second report) Eiji Watanabe, Yu Tamiya, Masashi Marui (Konan Univ.) BioX2015-18 |
The keystroke dynamics is a behavioral characteristic. However, we have to consider the fluctuations in trials. The auth... [more] |
BioX2015-18 pp.27-32 |
BioX, ITE-ME, ITE-IST |
2015-06-30 09:45 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Personal authentication by combination of keystroke dynamics and images for fingers Eiji Watanabe (Konan Univ.) BioX2015-9 |
This report proposes a personal authentication method based on the combination of keystroke dynamics and fingers images,... [more] |
BioX2015-9 pp.67-72 |
PRMU, BioX |
2015-03-19 14:30 |
Kanagawa |
|
Personal authentication from Walking measured by Kinect in the night Takuya Toyama, Masanobu Yamamoto (Niigata Univ.) BioX2014-49 PRMU2014-169 |
For crimes that often occur at night, we identify a walking person from a skeletal movement of the body captured by Kine... [more] |
BioX2014-49 PRMU2014-169 pp.59-64 |
NC, MBE |
2015-03-16 13:30 |
Tokyo |
Tamagawa University |
Fundamental study for personal authentication with transillumination image of blood vessels at wrist Shoichi Hirakida, Kenta Matsumura, Yuji Kato, Koichi Shimizu (Hokkaido Univ.) MBE2014-121 NC2014-72 |
The personal authentication with blood vessel image of a finger or a palm has been commonly used in many areas. But the ... [more] |
MBE2014-121 NC2014-72 pp.29-33 |
BioX |
2014-10-17 09:30 |
Okinawa |
Nobumoto Ohama Memorial Hall (Ishigaki) |
A Study on Owner Authentication by Hand-written Sign on Smart Phone Yuki Tanaka, Takahiro Yoshida, Seiichiro Hangai (Tokyo Univ. of Science) BioX2014-34 |
With the spread of usersof portable smartphones and tablets, personal authentication based on handwritten characters/fig... [more] |
BioX2014-34 pp.31-36 |
BioX (2nd) |
2012-08-28 11:00 |
Tokyo |
Waseda Univ. Nishiwaseda Campus |
A Study on the Personal Authentication Using Sensor Data of Mobile Terminal Hiroki Kasahara (Waseda Univ.), Masatsugu Ichino (UEC), Hideki Yoshii (SBTM), Kazuhiro Tsurumaru, Jiro Katto, Naohisa Komatsu (Waseda Univ.) |
In this Paper, we propose a method of personal authentication, using sensor data of a mobile terminal. First, we check t... [more] |
|
HCGSYMPO (2nd) |
2011-12-07 - 2011-12-09 |
Kagawa |
Sun Port Hall Takamatsu |
Keystroke Authentication Method with Touch-Screen using Self-Organizing Maps
-- Comparison and Evaluation of Keystroke Rhythm by Number of Six Digits -- Atsuhiro Noguchi (Kanagawa Institute of Technology), Masataka Takahashi, Kazuhiro Notomi (Graduate School of Engineering, Kanagawa Institute of Technology), Keiichi Saito (International University of Health and Welfare) |
In recent years, foreign ATMs authenticate individuals by PIN(Personal Identification Number) of six digits, however, PI... [more] |
|
IN |
2011-10-21 11:00 |
Osaka |
Osaka University |
Keystroke Authentication Using the Neural Network Kosuke Kimata, Takashi Kobayashi (Kansai Univ.) IN2011-87 |
The keystroke dynamics use time to need it for key input such as time between pushing and releasingthe key as a characte... [more] |
IN2011-87 pp.49-52 |
SIS, IPSJ-AVM |
2011-09-22 10:10 |
Akita |
|
Inprovement of the Block Matching Algorithm for Face Recognition Accross Age Progression
-- Adjustment of the Block Position -- Taro Okakura, Kaoru Arakawa (Meiji Univ.) SIS2011-31 |
Personal authentication using face image is becoming popular nowadaysin various applications. However, if age progressio... [more] |
SIS2011-31 pp.69-74 |
HIP, HCS, MVE, WIT (2nd) |
2009-12-10 - 2009-12-12 |
Hokkaido |
Sappolo Convention Center |
Proposal of personal authentication method using acceleration sensors Ryosuke Nakayama, Hideharu Ishida, Kazuhiro Notomi (KAIT), Keiichi Saito (TDU) |
According to a spread of the Internet, we get used to authentication with ID and password. People will soon need suited ... [more] |
|
NS |
2009-12-11 14:15 |
Ehime |
Ehime University (Ehime) |
A Study on a Personal ID Communication Method using IC Card Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-139 |
We propose the new communication method that uses the personal ID and the contactless IC card in place of the communicat... [more] |
NS2009-139 pp.105-110 |
CQ, NS, ICM (Joint) |
2009-11-12 15:30 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
A Study on a Communication Method using Personal ID in Future Network Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-107 |
We propose a new communication method using the personal ID in place of the existing telephone number and IP address.
T... [more] |
NS2009-107 pp.23-26 |
LOIS, IPSJ-CN |
2009-05-21 15:25 |
Tokyo |
Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg |
Secure Password Authentication Protocol with Key Sharing Function (SPARK) Hirokazu Nogura, Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (T-SS), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-3 |
Various information are sent on public networks.Cryptosystems are necessary for protect these information.Existing key s... [more] |
LOIS2009-3 pp.67-72 |
IA, SITE |
2009-03-05 16:20 |
Kumamoto |
|
A Proposal of Distributed Authentication Platform and Public Identifiers
-- On Appropriateness of Web Traversal Anonymous Authentication using OpenID -- Aya Okashita (NEC) SITE2008-53 IA2008-76 |
In many virtual worlds on the Web, the account registration by anonymity is done without doing the personal identificati... [more] |
SITE2008-53 IA2008-76 pp.55-60 |
SIS |
2009-03-06 14:25 |
Tokyo |
|
A Method for Personal Authentication from Face Image with Age Difference Using Partial Matching Tomo Nakai, Kaoru Arakawa (Meiji Univ.) |
Recently, the research on the personal authentication using face image is popular, but that for the face images which ch... [more] |
SIS2008-87 pp.85-89 |
ICM, LOIS (Joint) |
2009-01-23 10:15 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
A One-Time Password Authentication Scheme Resistant to DoS Attacks Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (Trinity Security Systems, Inc.), Akihiro Shimizu (Kochi Univ. of Tech.) OIS2008-74 |
Various information are sent on the Internet. User authentication is necessary to protect these informa-
tion from atta... [more] |
OIS2008-74 pp.51-56 |