Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
DC |
2024-02-28 16:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
DC2023-103 |
This study focuses on interdependent networks.
The objective of this study is to solve the problem of selecting nodes... [more] |
DC2023-103 pp.53-58 |
VLD, HWS, ICD |
2024-03-02 11:40 |
Okinawa |
(Primary: On-site, Secondary: Online) |
eFPGA-based IP Protection of Embedded Processor Design Tomosuke Ichioka, Tanvir Ahmed, Yuko Hara (Tokyo Tech) VLD2023-139 HWS2023-99 ICD2023-128 |
As manufacturing costs continue to grow, IC manufacturers are increasingly outsourcing IC manufacturing to third-party f... [more] |
VLD2023-139 HWS2023-99 ICD2023-128 pp.209-214 |
NS, NWS (Joint) |
2024-01-25 15:55 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
Performance of Backup Resources Allocation based on Unavailability Analysis Against Failures of Virtual and Physical Machines Nozomi Kita, Eiji Oki (Kyoto Univ.) NS2023-164 |
This paper presents the performance of our introduced backup allocation model for virtual machines that minimizes the un... [more] |
NS2023-164 pp.26-31 |
NS, NWS (Joint) |
2024-01-25 16:20 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
Performance of Backup Resource Allocation Model for Virtual Machines with Probabilistic Protection in Cloud Kento Yokouchi, Ryuta Shiraki, Eiji Oki (Kyoto Univ.) NS2023-165 |
The paper investigates the performance of the backup resource
allocation model to minimize backup capacity while
limit... [more] |
NS2023-165 pp.32-37 |
IA |
2023-11-22 16:50 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
IA2023-42 |
When a spam scam email is reported, it is desirable to share the data so that many researchers aiming to improve informa... [more] |
IA2023-42 pp.41-47 |
KBSE, SC |
2023-11-17 13:25 |
Miyagi |
Sento Kaikan |
Consideration of Authentication System in API Marketplace for Collaborative Development Yohei Toriyama, Shinya Kitajima (Fujitsu) KBSE2023-33 SC2023-16 |
We have launched an API marketplace that aims to create new value with numerous users by publicly releasing various tech... [more] |
KBSE2023-33 SC2023-16 pp.7-12 |
ICSS |
2023-11-16 14:55 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
A Study on Self Destructive Tamper Resistant Software utilizing Return-Oriented Programming (Part 3) Kazuomi Oishi (SIST) ICSS2023-55 |
Self destructive tamper resistant software (SDTRS) is a tamper resistance technology that can protect a program by itsel... [more] |
ICSS2023-55 pp.30-34 |
LOIS, SITE, ISEC |
2023-11-10 15:25 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Improvements for Enhancing the Reliability of NFTs
-- NFT Challenges and Solutions -- Yasushi Nakayama (SBI FERI) ISEC2023-72 SITE2023-66 LOIS2023-30 |
Non-Fungible Token (NFT) is a technology that enables the "one and only" nature of the target digital data, as well as p... [more] |
ISEC2023-72 SITE2023-66 LOIS2023-30 pp.114-118 |
RISING (3rd) |
2023-10-31 10:45 |
Hokkaido |
Kaderu 2・7 (Sapporo) |
[Poster Presentation]
Performance Analysis of Cognitive Radio Networks With Location Privacy Preservation Ryutaro Kobuchi (Osaka Univ.), Tatsuaki Kimura (Doshisha Univ.), Tetsuya Takine (Osaka Univ.) |
With the rapid increase in demand for wireless communication services, dynamic spectrum sharing in cognitive radio netwo... [more] |
|
MW, EMCJ, EST, IEE-EMC [detail] |
2023-10-20 09:20 |
Yamagata |
Yamagata University (Primary: On-site, Secondary: Online) |
Improvement of Functional Printed Patterns for Electric Over Stress Protection and its Performance Evaluation Fuga Horie, Takahiro Yoshida (TUS) EMCJ2023-49 MW2023-103 EST2023-76 |
Electrical overstress protection is necessary for electric equipment to prevent malfunctions and failures caused by high... [more] |
EMCJ2023-49 MW2023-103 EST2023-76 pp.72-76 |
IN, ICTSSL, IEE-SMF |
2023-10-19 09:00 |
Fukuoka |
Fukuoka University |
Effects and Investigate Attack Messages on the IoT-ZTN System Yudai Sakurai, Osamu Mizuno (Kogakuin Univ.) IN2023-32 |
There are many cyber-attacks targeting the IoT system. Cyber-attacks can occur not only from external networks in conven... [more] |
IN2023-32 pp.1-4 |
R |
2023-09-28 15:45 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
Functional safety assessment of multiple protection-layers with self-diagnosis and common-cause failures Yoshinobu Sato (IHQI) R2023-42 |
In the present paper, firstly necessary and sufficient conditions for safety functions (SFs) to form multi-protection la... [more] |
R2023-42 pp.28-33 |
IA |
2023-09-21 13:50 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
A consideration about a discovering method of privacy-enhanced authoritative DNS servers Satoru Sunahara (CIST), Yong Jin (Tokyo Tech), Katsuyoshi Iida (HU) IA2023-11 |
Plain-text communication of DNS queries poses a risk of privacy leakage. Therefore, it is imperative to achieve protecti... [more] |
IA2023-11 pp.1-5 |
PN |
2023-08-29 16:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Capacity Enhancement of Resilient Optical Networks with Multi-band Virtual Bypass Links Daisuke Saito, Yojiro Mori (Nagoya Univ), Kohei Hosokawa, Shigeyuki Yanagimachi (NEC), Hiroshi Hasegawa (Nagoya Univ) PN2023-26 |
We propose a cost-effective capacity enhancement for resilient networks that adopt dedicated path protection. This enhan... [more] |
PN2023-26 pp.55-58 |
CPSY, DC, IPSJ-ARC [detail] |
2023-08-03 09:00 |
Hokkaido |
Hakodate Arena (Primary: On-site, Secondary: Online) |
Proposal of Data Protection Features using Peak Shift Method of Drive Failure Risk Takaki Nakamura (Tohoku Univ.), Hitoshi Kamei (Kagawa Univ.) CPSY2023-8 DC2023-8 |
We propose a peak shift method for data protection that considers time-series changes in drive failure risk and the risk... [more] |
CPSY2023-8 DC2023-8 pp.1-6 |
MSS, CAS, SIP, VLD |
2023-07-06 15:20 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A Study on Golomb Coding for Scrambled Domain Layered Coding Compatible with JPEG XS Takayuki Nakachi (Univ. of the Ryukyus), Hiroyuki Kimiyama (Daido), Mitsuru Murayama (KAIST) CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10 |
In this report, we propose a Golomb coding method for scrambled domain layered coding compatible with JPEG XS. The propo... [more] |
CAS2023-10 VLD2023-10 SIP2023-26 MSS2023-10 pp.47-52 |
SITE, IPSJ-EIP |
2023-06-13 10:50 |
Tokyo |
Rissho Univ. Shinagawa Campus |
Case-based Learning on Data Utilization and Personal Information Protection with Jigsaw Method Daisuke Suzuki (Hokuriku Univ.) SITE2023-1 |
(To be available after the conference date) [more] |
SITE2023-1 pp.1-4 |
ICTSSL |
2023-05-18 13:25 |
Niigata |
(Primary: On-site, Secondary: Online) |
Study of the sustainability of natural rubber plantation and production by protecting the natural environment
-- Focusing on Myanmar's Natural Rubber Industry -- Myo Thiri Thu, Otsuka Akira (Jigyo) ICTSSL2023-2 |
Today, rubber products are widely used for a variety of needs, including tires. In 2020, the global rubber market expand... [more] |
ICTSSL2023-2 pp.6-11 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation of Copy Protection Technology Using Web Font Kazuki Nomoto (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT/RIKEN AIP) ICSS2022-61 |
This study proposes and evaluates Fonty, a copy protection technology for text content. First, Fonty encrypts text conte... [more] |
ICSS2022-61 pp.79-84 |
EMM |
2023-03-02 13:00 |
Nagasaki |
Fukue culture hall (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Influence of Data Hiding for Transformer Encoder of ViT Using DM-QIM Shuntaro Fukuoka, Shoko Imaizumi (Chiba Univ.) EMM2022-68 |
In this paper, we evaluate the influence of data hiding for vision transformer (ViT) models. Specifically, we embed a pa... [more] |
EMM2022-68 pp.7-12 |