IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, NS, CQ, NV
(Joint)
2023-11-22
09:50
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
A survey on suitable hook points for outbound packet monitoring using eBPF
Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] ICM2023-27
pp.26-31
IN, ICTSSL, IEE-SMF 2023-10-19
09:00
Fukuoka Fukuoka University Effects and Investigate Attack Messages on the IoT-ZTN System
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] IN2023-32
pp.1-4
IA 2023-09-21
16:30
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Performance Evaluation of Access Control Functions in IoT-ZTN System Gateway
Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IA2023-17
With the increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks ... [more] IA2023-17
pp.38-42
SeMI, RCS, RCC, NS, SR
(Joint)
2023-07-14
15:00
Osaka Osaka University Nakanoshima Center + Online
(Primary: On-site, Secondary: Online)
Initial implementation of CYPHONIC end-device functions on WindowsOS
Guilherme Seidy Ujiie, Ren Goto, Kazushige Matama, Yoshiya Suzuki, Katsuhiro Naitou (AIT), Hidekazu Suzuki (Meijo Univ.) SeMI2023-38
The authors have been researching and developing CYber PHysical Overlay Network over Internet Communication (CYPHONIC), ... [more] SeMI2023-38
pp.76-81
NS, NWS
(Joint)
2023-01-26
13:00
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] NS2022-153
pp.19-24
SWIM, SC 2022-08-26
15:45
Online Held online Proposal for Introduction of Resource control policies apply to Decentralized ID
Ryo Tateishi, Hosono Shigeru (TUT) SWIM2022-19 SC2022-25
Realization of Web 3.0 architecture requires a shift from Centralized ID to Decentralized ID with Self-Sovereign, and a ... [more] SWIM2022-19 SC2022-25
pp.52-57
NS, SR, RCS, SeMI, RCC
(Joint)
2022-07-14
11:10
Ishikawa The Kanazawa Theatre + Online
(Primary: On-site, Secondary: Online)
Construction of IoT System Based on Zero Trust Networks
Yudai Sakurai, Eishin Nagaoka, Osamu Mizuno (Kogakuin Univ) NS2022-41
With increasing of IoT devices, the number of cyber-attacks targeting IoT systems is also increasing. Cyber-attacks can ... [more] NS2022-41
pp.71-76
ICM 2022-07-07
14:50
Hokkaido Tokachi Plaza
(Primary: On-site, Secondary: Online)
[Invited Talk] Zero Trust Architecture and Risk Management
Yuki Unno (Fujitsu Research) ICM2022-14
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] ICM2022-14
pp.21-23
CQ, ICM, NS, NV
(Joint)
2021-11-26
16:15
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity
Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] NS2021-95
pp.56-61
NS, NWS
(Joint)
2021-01-21
13:55
Online Online Prototyping Zero Trust Network for Enterprise Network with Considering the Security Policy
Masataka Kawai, Yuzo Taenaka, Yuki Kadobayashi (NAIST) NS2020-111
The Zero Trust Network (ZTN) is a security model designed to deal with threats such as information theft by spies and cr... [more] NS2020-111
pp.9-15
NS, ICM, CQ, NV
(Joint)
2019-11-21
16:00
Hyogo Rokkodai 2nd Campus, Kobe Univ. [Invited Talk] Trends and Countermeasures of Cyber Attacks -- Introduction to Cyber Security for Network Engineers --
Yukiko Yano (NEC) CQ2019-93
In recent years, cyber attacks have spreading, information leaks such as confidential information of public institutions... [more] CQ2019-93
p.27
IA 2016-11-04
15:05
Overseas Taipei (Taiwan) An anonymous distributed electronic voting system using Zerocoin
Yu Takabatake, Daisuke Kotani, Yasuo Okabe (Kyoto Univ.) IA2016-54
Existing e-voting systems rely on a database managed by an administrator, and hence the administrator may possibly count... [more] IA2016-54
pp.127-131
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan