Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2013-09-13 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A new array disorder in user authentication by keystroke dynamics Yoshihiro Kaneko (Gifu Univ.) ISEC2013-52 |
Keystroke dynamics-based user authentication research has been recognized as one of potentially valid biometrics. This ... [more] |
ISEC2013-52 pp.9-12 |
IA, SITE, IPSJ-IOT [detail] |
2013-03-15 10:00 |
Nara |
Todaiji Total Cultural Center |
Identifying User Authentication Methods on SSH Sessions Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99 |
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] |
SITE2012-61 IA2012-99 pp.151-156 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 09:00 |
Hokkaido |
|
Keystroke Authentication Using the Technique of Quality engineering Hitoshi Osaka, Koya Yano (Nihon Univ.) ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19 |
The personal authentication by a keystroke is the biometrics using the Characteristics of the action that imitation by a... [more] |
ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19 pp.121-126 |
CAS, NLP |
2011-10-20 13:55 |
Shizuoka |
Shizuoka Univ. |
Password Enhancement in Keystroke Dynamics with a Hamming Distance-like Filtering Yoshihiro Kaneko (Gifu Univ.) CAS2011-40 NLP2011-67 |
Keystroke dynamics-based user authentication research has been done for decades and been positioned as one of inexpensiv... [more] |
CAS2011-40 NLP2011-67 pp.43-48 |
ISEC, IT, WBS |
2011-03-04 14:55 |
Osaka |
Osaka University |
User Authentication Using Neural Network Based on Keystroke Characteristics Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) IT2010-101 ISEC2010-105 WBS2010-80 |
Recently, several user authentication methods using keystroke characteristics for free-style text have been presented.
... [more] |
IT2010-101 ISEC2010-105 WBS2010-80 pp.213-220 |
ICM, LOIS |
2011-01-20 17:05 |
Nagasaki |
|
A User Attestation System Using a Cellular Phone Equipped with Digital Camera and 2D Color Code Noriyasu Yamamoto, Toshihiko Wakahara (FIT) ICM2010-42 LOIS2010-53 |
For accessing Internet, a reusable password method is frequently used because of its simplicity. This reusable password ... [more] |
ICM2010-42 LOIS2010-53 pp.51-56 |
IN |
2010-12-16 12:35 |
Hiroshima |
Hiroshima City Univ. |
A Collaborative Scheme for Dynamic User Management in P2P Applications Kazuma Kadowaki, Satoshi Fujita (Hiroshima Univ.) IN2010-98 |
To ensure the security and privacy in Peer-to-Peer (P2P) applications, a user management scheme is needed. Typical conve... [more] |
IN2010-98 pp.7-11 |
MSS, CAS |
2010-11-19 10:00 |
Osaka |
Kansai Univ. |
A switching method of distances for keystroke dynamics Yoshihiro Kaneko, Yuji Kinpara, Yuta Shiomi (Gifu Univ.) CAS2010-77 CST2010-50 |
Keystroke dynamics-based user authentication research has been done for decades and been positioned as one of inexpensiv... [more] |
CAS2010-77 CST2010-50 pp.65-70 |
IE |
2010-04-26 16:05 |
Tochigi |
|
A Study on a Graphical Password Using Wavelet Transform Takao Miyachi, Yuichi Tanaka, Madoka Hasegawa, Shigeo Kato (Utsunomiya Univ.) IE2010-12 |
Although entering user name and textual password are a major method for user authentication at the present time, it is n... [more] |
IE2010-12 pp.67-72 |
CAS |
2010-01-28 15:00 |
Kyoto |
Kyoudai-Kaikan Bldg. |
User keystroke identification among small reference data by large personal data Yoshihiro Kaneko (Gifu Univ.) CAS2009-68 |
User keystroke authentication research has been done for decades and some methods have been proposed and validated. For ... [more] |
CAS2009-68 pp.25-30 |
NS |
2009-12-11 14:15 |
Ehime |
Ehime University (Ehime) |
A Study on a Personal ID Communication Method using IC Card Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-139 |
We propose the new communication method that uses the personal ID and the contactless IC card in place of the communicat... [more] |
NS2009-139 pp.105-110 |
HIP, HCS, MVE, WIT (2nd) |
2009-12-10 - 2009-12-12 |
Hokkaido |
Sappolo Convention Center |
Fundamental examination of authentication by pointing-device operation
-- Analysis and evaluation by self-organizing maps -- Hiroki Kawamura, Ryosuke Nakayama, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.) |
Recently, an opportunity of biometrics authentication, such as vein authentication at automated teller machine, is incre... [more] |
|
IA |
2009-11-25 16:50 |
Saga |
Saga-Ken |
Delegate Authentication System Achieving Secure Access and Low System Management Cost for Campus WLAN Roaming Ichiro Yamaguchi, Takaaki Suzuki, Junichi Yamato, Hisaya Wakayama, Hideaki Goto, Hideaki Sone (Tohoku Univ.) IA2009-64 |
Recent proliferation of Wireless LAN devices has created a high demand for roaming systems that enable network connectio... [more] |
IA2009-64 pp.37-40 |
CQ, NS, ICM (Joint) |
2009-11-12 15:30 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
A Study on a Communication Method using Personal ID in Future Network Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-107 |
We propose a new communication method using the personal ID in place of the existing telephone number and IP address.
T... [more] |
NS2009-107 pp.23-26 |
CQ, NS, ICM (Joint) |
2009-11-12 15:50 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
An implementation of a personal communicator with privacy management control Yuki Tomita (UEC), Osamu Mizuno (Kogakuin Univ./NTT), Kimihiko Fukami (NTT), Yoshikatsu Tada (UEC) NS2009-108 |
To exchange personal information among users, displayed information should be controlled from the point of view of human... [more] |
NS2009-108 pp.27-32 |
IA, SITE |
2009-03-05 17:20 |
Kumamoto |
|
Development of "Opengate-PKI" Network User Authentication System with PKI Suguru Fujisawa, Makoto Otani, Kenzi Watanabe (Saga University) SITE2008-69 IA2008-92 |
PKI(Public Key Infrastructure) provides security service on network, for example encryption of data, guarantee of data i... [more] |
SITE2008-69 IA2008-92 pp.149-154 |
IA, SITE |
2009-03-06 09:30 |
Kumamoto |
|
Single Sign-On with Opengate Hirofumi Eto, Makoto Otani, Kenzi Watanabe, Shin-ichi Tadaki (Saga Univ.) SITE2008-88 IA2008-111 |
Information systems in a university need inter-cooperation mechanisms and their portal sites.
This requires single-sign... [more] |
SITE2008-88 IA2008-111 pp.259-264 |
IA |
2009-01-29 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Investigation of Lifelong Information Services Using Lifelong User ID in Higher Educational Institutions Shoji Kajita, Yoshihiro Ohta, Yoshinori Tajima, Hisanori Tajima, Yasushi Hirano, Hisashi Naito, Kenji Mase (Nagoya Univ.) IA2008-62 |
Nagoya University ID is a lifelong User ID issued by Information
Communication Technology Services, instead of Univer... [more] |
IA2008-62 pp.83-88 |
MoNA, IPSJ-MBL |
2008-05-22 08:35 |
Okinawa |
Okinawa-seinen-kaikan |
Basic Design of A User-driven Service Creation Platform Assisted by Cellular Systems Kiyohide Nakauchi, Ved P. Kafle, Masugi Inoue (NICT), Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs) MoMuC2008-1 |
In spite of recent advances of personal communication devices and access network technology, users are still facing the ... [more] |
MoMuC2008-1 pp.1-6 |
ICM |
2008-05-08 16:00 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Management of Unified-Server in Nagoya University Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9 |
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more] |
ICM2008-9 pp.47-52 |