Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD |
2023-03-01 13:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Circuit Optimization and Simulation Evaluation for Ultra-Low Voltage of LRPUF Using Manufacturing Variability of Leakage Current Shunkichi Hata, Kimiyoshi Usami (SIT) VLD2022-77 HWS2022-48 |
Low power consumption and low-voltage operation become critical issues to be addressed when PUF (Physically Unclonable F... [more] |
VLD2022-77 HWS2022-48 pp.25-30 |
CS |
2022-10-27 11:30 |
Hiroshima |
Hiroshima City University Satellite campus (Primary: On-site, Secondary: Online) |
Implementation of a large-scale evaluation platform in a BACnet/IP environment Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45 |
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] |
CS2022-45 pp.11-14 |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |
SITE, ISEC, LOIS |
2018-11-04 15:40 |
Fukuoka |
|
An improvement on Winternitz OTS with puncturing of signing keys Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) ISEC2018-80 SITE2018-58 LOIS2018-40 |
A hash-based digital signature is a quantum-immune alternative of conventional digital signatures. This study improves a... [more] |
ISEC2018-80 SITE2018-58 LOIS2018-40 pp.95-102 |
SIP, IT, RCS |
2018-01-23 10:00 |
Kagawa |
Sunport Hall Takamatsu |
Evaluation of Eavesdropping Resistance in Secret Information Transmission Scheme Using Signal Decomposition and Spatial Vector Composition Kazuki Tsuji, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) IT2017-85 SIP2017-93 RCS2017-299 |
As a countermeasure against eavesdropping in mobile communications, secret information transmission scheme using signal ... [more] |
IT2017-85 SIP2017-93 RCS2017-299 pp.177-182 |
NS, IN (Joint) |
2017-03-03 09:30 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Implementation and Evaluation of the Dynamic Filtering Mechanism using a Machine Learning on the In-vehicle Security Gateway Mizuki Teshiba, Hiroyuki Inoue, Kenji Ishida (Hiroshima City Univ.) IN2016-131 |
In-vehicle devices such as infotainment and telematics devices have been connected to external networks because of the d... [more] |
IN2016-131 pp.205-210 |
BioX, ITE-ME, ITE-IST |
2015-06-29 14:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Security Evaluation for Leakage of a Fingerprint Image from USB-Based Fingerprint Authentication Systems Daigo Sato, Takeshi Okamoto, Naoto Umehara (KAIT) BioX2015-6 |
The growing availability of fingerprint authentication systems has resulted in a drop in their price, and their increase... [more] |
BioX2015-6 pp.39-44 |
ISEC |
2012-05-18 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Incompleteness of the criterion for information theoretically key agreement Osamu Hirota (Tamagawa Univ.) ISEC2012-2 |
Despite theoretical haughty claim on the security of quantum key distribution (QKD), even the security for the basic mod... [more] |
ISEC2012-2 pp.5-10 |
NS, IN (Joint) |
2012-03-09 15:20 |
Miyazaki |
Miyazaki Seagia |
Expanding Darknet Space with Virtual Sensors Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189 |
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] |
IN2011-189 pp.311-316 |
OCS, CS (Joint) |
2011-01-27 15:40 |
Tokushima |
The University of Tokushima |
Experimental evaluation as the random cipher of the Yuen-2000 (Y-00) protocol Fumio Futami, Osamu Hirota (Tamagawa Univ.) OCS2010-105 |
The personal information and proprietary information in various network applications are transmitted in the current netw... [more] |
OCS2010-105 pp.37-42 |
CS, OCS (Joint) |
2010-01-29 11:20 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
Effects introduced by Randomization for Intensity Modulated Y-00 Cryptosystem Yuki Nagasako (IRI/Tamagawa Univ.) OCS2009-111 |
Yuen 2000 protocol (Y-00) designed by intensity modulation has advantages over phase modulated Y-00. However, it has bee... [more] |
OCS2009-111 pp.67-71 |
WBS, IT, ISEC |
2009-03-09 17:35 |
Hokkaido |
Hakodate Mirai Univ. |
Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69 |
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] |
IT2008-56 ISEC2008-114 WBS2008-69 pp.79-84 |
NS, IN (Joint) |
2008-03-07 13:30 |
Okinawa |
Bankoku Shinryokan |
Evaluation model of anomaly traffic detection mechanism with distributed sensors and its performance analysis Takefumi Kobayashi, Katsuyoshi Iida (Tokyo Tech), Yutaka Nakamura, Takeshi Ikenaga (Kyushu Tech) NS2007-194 |
There expands the damage caused by computer infections such as worms on
the Internet so that its countermeasure must be... [more] |
NS2007-194 pp.347-352 |
ISEC |
2007-12-19 11:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Quantitative Evaluation Method of System Security Daisakuk Horie (Konica Minolta TC) ISEC2007-117 |
The frame of the evaluation to ensure the security above a certain level has been consolidated like ISO/IEC 27001. But i... [more] |
ISEC2007-117 pp.33-40 |
R |
2007-05-18 14:50 |
Hiroshima |
Hiroshima University |
Evaluation of intrusion tolerant systems subject to DoS attack via semi-Markov cost models Toshikazu Uemura, Tadashi Dohi (Hiroshima Univ.) R2007-10 |
In this paper we consider the security evaluation of intrusion tolerant systems with preventive maintenance subject to D... [more] |
R2007-10 pp.13-18 |
AN |
2007-05-10 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Resistivity Evaluation of q-composite Random Key Pre-distribution Kaori Ise, Koki Abe (UEC) AN2007-8 |
The q-composite random key pre-distribution (qRKP) scheme, a countermeasure for attacks to ad-hoc networks, has been est... [more] |
AN2007-8 pp.41-45 |