IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 48 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2013-09-13
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. A new array disorder in user authentication by keystroke dynamics
Yoshihiro Kaneko (Gifu Univ.) ISEC2013-52
Keystroke dynamics-based user authentication research has been recognized as one of potentially valid biometrics. This ... [more] ISEC2013-52
pp.9-12
IA, SITE, IPSJ-IOT [detail] 2013-03-15
10:00
Nara Todaiji Total Cultural Center Identifying User Authentication Methods on SSH Sessions
Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] SITE2012-61 IA2012-99
pp.151-156
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:00
Hokkaido   Keystroke Authentication Using the Technique of Quality engineering
Hitoshi Osaka, Koya Yano (Nihon Univ.) ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19
The personal authentication by a keystroke is the biometrics using the Characteristics of the action that imitation by a... [more] ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19
pp.121-126
CAS, NLP 2011-10-20
13:55
Shizuoka Shizuoka Univ. Password Enhancement in Keystroke Dynamics with a Hamming Distance-like Filtering
Yoshihiro Kaneko (Gifu Univ.) CAS2011-40 NLP2011-67
Keystroke dynamics-based user authentication research has been done for decades and been positioned as one of inexpensiv... [more] CAS2011-40 NLP2011-67
pp.43-48
ISEC, IT, WBS 2011-03-04
14:55
Osaka Osaka University User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) IT2010-101 ISEC2010-105 WBS2010-80
Recently, several user authentication methods using keystroke characteristics for free-style text have been presented.
... [more]
IT2010-101 ISEC2010-105 WBS2010-80
pp.213-220
ICM, LOIS 2011-01-20
17:05
Nagasaki   A User Attestation System Using a Cellular Phone Equipped with Digital Camera and 2D Color Code
Noriyasu Yamamoto, Toshihiko Wakahara (FIT) ICM2010-42 LOIS2010-53
For accessing Internet, a reusable password method is frequently used because of its simplicity. This reusable password ... [more] ICM2010-42 LOIS2010-53
pp.51-56
IN 2010-12-16
12:35
Hiroshima Hiroshima City Univ. A Collaborative Scheme for Dynamic User Management in P2P Applications
Kazuma Kadowaki, Satoshi Fujita (Hiroshima Univ.) IN2010-98
To ensure the security and privacy in Peer-to-Peer (P2P) applications, a user management scheme is needed. Typical conve... [more] IN2010-98
pp.7-11
MSS, CAS 2010-11-19
10:00
Osaka Kansai Univ. A switching method of distances for keystroke dynamics
Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi (Gifu Univ.) CAS2010-77 CST2010-50
Keystroke dynamics-based user authentication research has been done for decades and been positioned as one of inexpensiv... [more] CAS2010-77 CST2010-50
pp.65-70
IE 2010-04-26
16:05
Tochigi   A Study on a Graphical Password Using Wavelet Transform
Takao Miyachi, Yuichi Tanaka, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) IE2010-12
Although entering user name and textual password are a major method for user authentication at the present time, it is n... [more] IE2010-12
pp.67-72
CAS 2010-01-28
15:00
Kyoto Kyoudai-Kaikan Bldg. User keystroke identification among small reference data by large personal data
Yoshihiro Kaneko (Gifu Univ.) CAS2009-68
User keystroke authentication research has been done for decades and some methods have been proposed and validated. For ... [more] CAS2009-68
pp.25-30
NS 2009-12-11
14:15
Ehime Ehime University (Ehime) A Study on a Personal ID Communication Method using IC Card
Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-139
We propose the new communication method that uses the personal ID and the contactless IC card in place of the communicat... [more] NS2009-139
pp.105-110
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Fundamental examination of authentication by pointing-device operation -- Analysis and evaluation by self-organizing maps --
Hiroki Kawamura, Ryosuke Nakayama, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.)
Recently, an opportunity of biometrics authentication, such as vein authentication at automated teller machine, is incre... [more]
IA 2009-11-25
16:50
Saga Saga-Ken Delegate Authentication System Achieving Secure Access and Low System Management Cost for Campus WLAN Roaming
Ichiro Yamaguchi, Takaaki Suzuki, Junichi Yamato, Hisaya Wakayama, Hideaki Goto, Hideaki Sone (Tohoku Univ.) IA2009-64
Recent proliferation of Wireless LAN devices has created a high demand for roaming systems that enable network connectio... [more] IA2009-64
pp.37-40
CQ, NS, ICM
(Joint)
2009-11-12
15:30
Ishikawa Kanazawa Institute of Technology (Ishikawa) A Study on a Communication Method using Personal ID in Future Network
Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-107
We propose a new communication method using the personal ID in place of the existing telephone number and IP address.
T... [more]
NS2009-107
pp.23-26
CQ, NS, ICM
(Joint)
2009-11-12
15:50
Ishikawa Kanazawa Institute of Technology (Ishikawa) An implementation of a personal communicator with privacy management control
Yuki Tomita (UEC), Osamu Mizuno (Kogakuin Univ./NTT), Kimihiko Fukami (NTT), Yoshikatsu Tada (UEC) NS2009-108
To exchange personal information among users, displayed information should be controlled from the point of view of human... [more] NS2009-108
pp.27-32
IA, SITE 2009-03-05
17:20
Kumamoto   Development of "Opengate-PKI" Network User Authentication System with PKI
Suguru Fujisawa, Makoto Otani, Kenzi Watanabe (Saga University) SITE2008-69 IA2008-92
PKI(Public Key Infrastructure) provides security service on network, for example encryption of data, guarantee of data i... [more] SITE2008-69 IA2008-92
pp.149-154
IA, SITE 2009-03-06
09:30
Kumamoto   Single Sign-On with Opengate
Hirofumi Eto, Makoto Otani, Kenzi Watanabe, Shin-ichi Tadaki (Saga Univ.) SITE2008-88 IA2008-111
Information systems in a university need inter-cooperation mechanisms and their portal sites.
This requires single-sign... [more]
SITE2008-88 IA2008-111
pp.259-264
IA 2009-01-29
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. Investigation of Lifelong Information Services Using Lifelong User ID in Higher Educational Institutions
Shoji Kajita, Yoshihiro Ohta, Yoshinori Tajima, Hisanori Tajima, Yasushi Hirano, Hisashi Naito, Kenji Mase (Nagoya Univ.) IA2008-62
Nagoya University ID is a lifelong User ID issued by Information
Communication Technology Services, instead of Univer... [more]
IA2008-62
pp.83-88
MoNA, IPSJ-MBL 2008-05-22
08:35
Okinawa Okinawa-seinen-kaikan Basic Design of A User-driven Service Creation Platform Assisted by Cellular Systems
Kiyohide Nakauchi, Ved P. Kafle, Masugi Inoue (NICT), Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs) MoMuC2008-1
In spite of recent advances of personal communication devices and access network technology, users are still facing the ... [more] MoMuC2008-1
pp.1-6
ICM 2008-05-08
16:00
Kagoshima Kagoshima Public Access Center Construction and Management of Unified-Server in Nagoya University
Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more]
ICM2008-9
pp.47-52
 Results 21 - 40 of 48 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan