Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-03-01 11:35 |
Okinawa |
Okinawa Convention Center |
Dynamic Control Method for Establishing Secure Long-haul End-to-End Network Slicing Fatou S Secka, Kenji Kanai, Akihiro Nakao (Utokyo) NS2023-219 |
The emergence of 5G technology has not only revolutionized network services but also paralleled a shift in lifestyle pos... [more] |
NS2023-219 pp.276-281 |
NS, NWS (Joint) |
2024-01-25 14:15 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Access Control Method to Prevent Session Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162 |
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] |
NS2023-162 pp.19-24 |
NS |
2023-10-04 17:55 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Access Control Method to Prevent ID Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81 |
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] |
NS2023-81 pp.53-58 |
SWIM, SC |
2023-08-25 13:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
Acceptability investigation of information systems driven by faculty and staff members working at childcare facility Ryunosuke Iga, Toru Takahashi, Koji Yamada (Osaka Sangyo Univ.) SWIM2023-13 SC2023-12 |
As part of measures to address the declining birthrate, there is a growing need for daycare services in which kindergart... [more] |
SWIM2023-13 SC2023-12 pp.7-12 |
ICSS, IPSJ-SPT |
2023-03-13 12:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Developing a Hand Gesture Recognition System for VR Devices Mei Suzuki, Ryo Iijima, Kazuki Nomoto (Waseda Univ.), Tetsushi Ohki (Shizuoka Univ./AIP), Tatsuya Mori (Waseda Univ./NICT/AIP) ICSS2022-48 |
We develop a hand gesture recognition scheme using finger movements to recognize the VR user wearing a head-mounted disp... [more] |
ICSS2022-48 pp.1-6 |
ICSS, IPSJ-SPT |
2023-03-13 13:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
sEMG-based Gesture Authentication for Smartwatch Akihisa Watanabe, Ryo Iijima, Tatsuya Mori (Waseda Univ.,) ICSS2022-50 |
We propose a gesture-based user recognition system using sEMG signals for smartwatches.
We designed the system to reali... [more] |
ICSS2022-50 pp.13-18 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
NS, IN (Joint) |
2022-03-10 11:20 |
Online |
Online |
A Study on Telephone System with User Authentication Hiromu Aoshima (NTT) NS2021-132 |
I propose a telephone system with a function to authenticate individual users. In this system, if callees register calle... [more] |
NS2021-132 pp.59-63 |
SRW |
2018-08-20 12:45 |
Okayama |
Okayama Univ. |
Implementations of System Software Update and User Authentication Functions in Elastic Wireless Local-Area Network System Md. Manowarul Islam, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Kwenga Ismael Munene (Okayama Univ.) SRW2018-14 |
Nowadays, the wireless local-area network (WLAN) has become common for the Internet access due to a low-cost solution us... [more] |
SRW2018-14 pp.31-36 |
PRMU, BioX |
2018-03-18 14:45 |
Tokyo |
|
A Kinect-based Multimodal Person Authentication System with User Existence Confirmation Lin Zhou, Koji Iwano (Tokyo City Univ.) BioX2017-46 PRMU2017-182 |
Person identification systems used for receiving pension need to have countermeasures against fraud by "spoofing" as ann... [more] |
BioX2017-46 PRMU2017-182 pp.61-66 |
NS, IN (Joint) |
2018-03-01 10:30 |
Miyazaki |
Phoenix Seagaia Resort |
A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101 |
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] |
IN2017-101 pp.69-74 |
LOIS, ISEC, SITE |
2017-11-09 09:30 |
Kyoto |
|
Consciousness Investigation of Passwords Management in University Students
-- Questionnaire Design based on Friend Relationships -- Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27 |
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] |
ISEC2017-50 SITE2017-32 LOIS2017-27 pp.7-12 |
LOIS, ISEC, SITE |
2017-11-09 10:00 |
Kyoto |
|
User Authentication Keeping Method Using Watch Type Devices
-- Case of Acceleration Sensors -- Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) ISEC2017-51 SITE2017-33 LOIS2017-28 |
Wearable devices are going to be popular in near future. These devices also can be used in user authentications. In thes... [more] |
ISEC2017-51 SITE2017-33 LOIS2017-28 pp.13-18 |
IT, EMM |
2016-05-19 15:35 |
Hokkaido |
Otaru Economic Center |
Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) IT2016-9 EMM2016-9 |
This paper proposes a multimodal authentication system for smartphones
by using two sequences of different measurement ... [more] |
IT2016-9 EMM2016-9 pp.49-54 |
ICD, IE, VLD, IPSJ-SLDM [detail] |
2015-10-26 13:50 |
Miyagi |
|
[Invited Talk]
Human pattern recognition and humanics security Masakatsu Nishigaki (Shizuoka Univ.) VLD2015-28 ICD2015-41 IE2015-63 |
It is very important to achieve the security of ICT systems. As everybody knows, however, security and usability is trad... [more] |
VLD2015-28 ICD2015-41 IE2015-63 p.11 |
BioX |
2015-08-25 09:55 |
Hokkaido |
Otaru Port Marina |
User Interface Evaluation of Palm Vein Authentication for Mobile Devices Takahiro Aoki (Fujitsu labs.) BioX2015-19 |
In recent years, palm vein authentication is widely spreading in use. And also mobile devices such as notebook PCs or ta... [more] |
BioX2015-19 pp.33-38 |
CAS, CS |
2015-02-27 13:55 |
Tottori |
Tottori University |
Keystroke dynamics-based user identification via n-graph paths for shorter characteristic texts Yoshihiro Kaneko, Takuya Tsujimoto, Keisuke Ohshima, Atsushi Kato (Gifu Univ.) CAS2014-138 CS2014-110 |
Needless to say, computer systems should be more secure for our safe life and society nowadays. A keystroke dynamics-bas... [more] |
CAS2014-138 CS2014-110 pp.101-105 |
ISEC, LOIS, SITE |
2014-11-22 13:45 |
Hyogo |
|
How to Utilize Location Information for Distinguishing Users Takuya Funakoshi, Masahiro Mambo (Kanazawa Univ.) ISEC2014-68 SITE2014-59 LOIS2014-38 |
Lifelig, log of individual daily activity, is a valuable resource useful for decision making, recommendation or statisti... [more] |
ISEC2014-68 SITE2014-59 LOIS2014-38 pp.71-76 |
MoNA, IPSJ-MBL, IPSJ-UBI |
2014-03-14 13:25 |
Kanagawa |
Keio Univ. (Hiyoshi Campus) |
Convenience-oriented Hybrid Biometric Identification using Aerial Signature Kentaro Yamamoto, Eiji Kamioka (Shibaura Inst. of Tech.) MoNA2013-81 |
Personal authentication has been regarded as an important research domain from the viewpoint of security and privacy pro... [more] |
MoNA2013-81 pp.237-242 |
KBSE |
2013-11-01 13:35 |
Ehime |
Ehime University |
Design and Implementation of IC Card-based Attendance Management System Motohiro Mitani, Yukio Hori, Yoshiro Imai (Kagawa Univ.) KBSE2013-53 |
This paper describes an IC card-based attendance management system with Web camera for university lectures and other evi... [more] |
KBSE2013-53 pp.1-5 |