IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, VLD 2023-03-01
13:50
Okinawa
(Primary: On-site, Secondary: Online)
Circuit Optimization and Simulation Evaluation for Ultra-Low Voltage of LRPUF Using Manufacturing Variability of Leakage Current
Shunkichi Hata, Kimiyoshi Usami (SIT) VLD2022-77 HWS2022-48
Low power consumption and low-voltage operation become critical issues to be addressed when PUF (Physically Unclonable F... [more] VLD2022-77 HWS2022-48
pp.25-30
CS 2022-10-27
11:30
Hiroshima Hiroshima City University Satellite campus
(Primary: On-site, Secondary: Online)
Implementation of a large-scale evaluation platform in a BACnet/IP environment
Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] CS2022-45
pp.11-14
HWS, VLD [detail] 2021-03-04
13:25
Online Online A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design
Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] VLD2020-83 HWS2020-58
pp.85-90
IT 2020-12-03
16:40
Online Online Implementation and security evaluation of wiretap channel coding in noisy channels
Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] IT2020-62
pp.206-211
SITE, ISEC, LOIS 2018-11-04
15:40
Fukuoka   An improvement on Winternitz OTS with puncturing of signing keys
Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) ISEC2018-80 SITE2018-58 LOIS2018-40
A hash-based digital signature is a quantum-immune alternative of conventional digital signatures. This study improves a... [more] ISEC2018-80 SITE2018-58 LOIS2018-40
pp.95-102
SIP, IT, RCS 2018-01-23
10:00
Kagawa Sunport Hall Takamatsu Evaluation of Eavesdropping Resistance in Secret Information Transmission Scheme Using Signal Decomposition and Spatial Vector Composition
Kazuki Tsuji, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) IT2017-85 SIP2017-93 RCS2017-299
As a countermeasure against eavesdropping in mobile communications, secret information transmission scheme using signal ... [more] IT2017-85 SIP2017-93 RCS2017-299
pp.177-182
NS, IN
(Joint)
2017-03-03
09:30
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Implementation and Evaluation of the Dynamic Filtering Mechanism using a Machine Learning on the In-vehicle Security Gateway
Mizuki Teshiba, Hiroyuki Inoue, Kenji Ishida (Hiroshima City Univ.) IN2016-131
In-vehicle devices such as infotainment and telematics devices have been connected to external networks because of the d... [more] IN2016-131
pp.205-210
BioX, ITE-ME, ITE-IST 2015-06-29
14:00
Ishikawa Kanazawa University, Kakuma Campus Security Evaluation for Leakage of a Fingerprint Image from USB-Based Fingerprint Authentication Systems
Daigo Sato, Takeshi Okamoto, Naoto Umehara (KAIT) BioX2015-6
The growing availability of fingerprint authentication systems has resulted in a drop in their price, and their increase... [more] BioX2015-6
pp.39-44
ISEC 2012-05-18
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Incompleteness of the criterion for information theoretically key agreement
Osamu Hirota (Tamagawa Univ.) ISEC2012-2
Despite theoretical haughty claim on the security of quantum key distribution (QKD), even the security for the basic mod... [more] ISEC2012-2
pp.5-10
NS, IN
(Joint)
2012-03-09
15:20
Miyazaki Miyazaki Seagia Expanding Darknet Space with Virtual Sensors
Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] IN2011-189
pp.311-316
OCS, CS
(Joint)
2011-01-27
15:40
Tokushima The University of Tokushima Experimental evaluation as the random cipher of the Yuen-2000 (Y-00) protocol
Fumio Futami, Osamu Hirota (Tamagawa Univ.) OCS2010-105
The personal information and proprietary information in various network applications are transmitted in the current netw... [more] OCS2010-105
pp.37-42
CS, OCS
(Joint)
2010-01-29
11:20
Yamaguchi Kaikyo Messe Shimonoseki Effects introduced by Randomization for Intensity Modulated Y-00 Cryptosystem
Yuki Nagasako (IRI/Tamagawa Univ.) OCS2009-111
Yuen 2000 protocol (Y-00) designed by intensity modulation has advantages over phase modulated Y-00. However, it has bee... [more] OCS2009-111
pp.67-71
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] IT2008-56 ISEC2008-114 WBS2008-69
pp.79-84
NS, IN
(Joint)
2008-03-07
13:30
Okinawa Bankoku Shinryokan Evaluation model of anomaly traffic detection mechanism with distributed sensors and its performance analysis
Takefumi Kobayashi, Katsuyoshi Iida (Tokyo Tech), Yutaka Nakamura, Takeshi Ikenaga (Kyushu Tech) NS2007-194
There expands the damage caused by computer infections such as worms on
the Internet so that its countermeasure must be... [more]
NS2007-194
pp.347-352
ISEC 2007-12-19
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Quantitative Evaluation Method of System Security
Daisakuk Horie (Konica Minolta TC) ISEC2007-117
The frame of the evaluation to ensure the security above a certain level has been consolidated like ISO/IEC 27001. But i... [more] ISEC2007-117
pp.33-40
R 2007-05-18
14:50
Hiroshima Hiroshima University Evaluation of intrusion tolerant systems subject to DoS attack via semi-Markov cost models
Toshikazu Uemura, Tadashi Dohi (Hiroshima Univ.) R2007-10
In this paper we consider the security evaluation of intrusion tolerant systems with preventive maintenance subject to D... [more] R2007-10
pp.13-18
AN 2007-05-10
09:00
Tokyo Kikai-Shinko-Kaikan Bldg Resistivity Evaluation of q-composite Random Key Pre-distribution
Kaori Ise, Koki Abe (UEC) AN2007-8
The q-composite random key pre-distribution (qRKP) scheme, a countermeasure for attacks to ad-hoc networks, has been est... [more] AN2007-8
pp.41-45
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan