Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CS |
2017-07-28 09:25 |
Nagasaki |
Fukue Bunka Kaikan |
Investigating HYIP-related Bitcoin Addresses Collected via Web Scraping Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P.Takis Mathiopoulos (UoA) CS2017-33 |
[more] |
CS2017-33 pp.105-109 |
NS, ASN, RCC, RCS, SR (Joint) |
2017-07-21 15:35 |
Hokkaido |
Hokkaido Univ. |
A Study on Blink Duration Estimation Using Doppler Sensor Kohei Yamamoto, Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.) ASN2017-59 |
[more] |
ASN2017-59 pp.235-240 |
ICSS, IPSJ-SPT |
2017-03-13 14:25 |
Nagasaki |
University of Nagasaki |
Feature Extraction for Identifying High Yielding Investment Programs Related Transactions in Bitcoin Kentaroh Toyoda, Tomoaki Ohtsuki (Keio Univ.), P. Takis Mathiopoulos (UoA) ICSS2016-49 |
As recent research has revealed, Bitcoin is used as fraudulent activities such as HYIP (High Yield Investment Programs).... [more] |
ICSS2016-49 pp.31-36 |
ICSS, IPSJ-SPT |
2017-03-14 12:20 |
Nagasaki |
University of Nagasaki |
Vibration-based Key Exchange among Multiple Smart Devices on the Desk Alisa Arno, Kentaroh Toyoda (Keio Univ.), Yuji Watanabe (IBM Japan), Iwao Sasase (Keio Univ.), P. Takis Mathiopoulos (Athens Univ.) ICSS2016-71 |
The man-in-the-middle attack is a real concern in mobile Near Filed Communication payment and data sharing applications.... [more] |
ICSS2016-71 pp.189-194 |
MoNA, ASN, IPSJ-MBL, IPSJ-UBI [detail] |
2017-03-09 10:30 |
Tokyo |
University of Tokyo (Hongo Campus) |
Human Activity Recognition by Infrared Array Sensors Considering Positional Relation between User and Sensors Kazuki Kobayashi, Tomoaki Ohtsuki, Kentaroh Toyoda (Keio Univ.) ASN2016-90 |
[more] |
ASN2016-90 pp.67-72 |
ASN, MoNA, MICT (Joint) |
2017-01-19 14:00 |
Oita |
|
Doppler Analysis Based Fall Detection Using Array Antenna Yugo Agata, Tomoaki Ohtsuki, Kentaroh Toyoda (Keio University) ASN2016-72 |
Nowadays, the number of elderly people who live alone is increasing in Japan. So, there are urgent needs for monitoring ... [more] |
ASN2016-72 pp.19-24 |
RCS, RCC, ASN, NS, SR (Joint) |
2016-07-22 09:25 |
Aichi |
|
Biometric Authentication using Hand Movement Information from Wrist-worn PPG sensors Hiroto Kamoi, Tomoaki Ohtsuki, Kentaroh Toyoda (Keio Univ.) ASN2016-40 |
In this paper, we propose a biometric authentication scheme that leverages the signal measured by the PPG (Photoplethysm... [more] |
ASN2016-40 pp.79-84 |
CS |
2015-11-12 10:45 |
Hokkaido |
Hotel Taisetsu (Sounkyo Spa, Hokkaido) |
Target Link Flooding Attack Prevention Scheme by Monitoring Traceroute Packets Flow Takayuki Hirayama, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-48 |
Recently, target link flooding attack has been reported as a threatful DDoS (Distributed Denial of Ser-
vice) attack. T... [more] |
CS2015-48 pp.19-24 |
CS |
2015-11-12 11:10 |
Hokkaido |
Hotel Taisetsu (Sounkyo Spa, Hokkaido) |
Closer Destination Selection Scheme for Mobile Sink and Charger Enabled WRSNs Yuya Tamura, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-49 |
In WRSNs (Wireless Rechargeable Sensor Networks), the wireless energy transfer technology enables charging sensor batter... [more] |
CS2015-49 pp.25-30 |
CS |
2015-11-13 09:00 |
Hokkaido |
Hotel Taisetsu (Sounkyo Spa, Hokkaido) |
Accelerometer Assisted Authentication Scheme for Smart Bicycle Lock Alisa Arno, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-51 |
We propose an accelerometer assisted authentication scheme for a smart bicycle lock with near field communication and ac... [more] |
CS2015-51 pp.35-39 |
CS |
2015-07-02 13:50 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
[Invited Talk]
Illegal Interrogation Detectable Products Distribution Scheme in RFID-enabled Supply Chains Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-17 |
An EPC contains sensitive information and protecting it is necessary in the RFID-enabled supply chains. However, no sche... [more] |
CS2015-17 pp.45-50 |
CS |
2015-07-03 11:40 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28 |
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] |
CS2015-28 pp.103-108 |
CS |
2014-11-06 08:45 |
Hokkaido |
Shiretoko (Hokkaido) |
Sleep Timing Adjusting Scheme for High Packet Delivery Rate in Bridge Monitoring by Energy Harvesting Yu Usami, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2014-57 |
Energy harvesting technology which converts environmental energy e.g. solar or vibration has received much attention. In... [more] |
CS2014-57 pp.19-24 |
CS |
2014-11-06 09:30 |
Hokkaido |
Shiretoko (Hokkaido) |
Secure and Fast UHF RFID Missing Tags Detection with Rateless Coding Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2014-59 |
RFID-based inventory systems are getting much attention thanks to its low cost and feasibility of deployment. Especially... [more] |
CS2014-59 pp.31-36 |
CS |
2014-11-06 09:45 |
Hokkaido |
Shiretoko (Hokkaido) |
Adaptive Relay Selection with Energy and Channel Information in Energy Harvesting WSNs Takuma Koga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2014-60 |
In Wireless Sensor Networks (WSNs), Energy Harvesting (EH) is emerging as a promising solution to realize the energy-eff... [more] |
CS2014-60 pp.37-42 |
CS |
2013-11-15 10:35 |
Hokkaido |
Noboribetsu-onsen Dai-ichi Takimotokan (Hokkaido) |
Preventing Voice-based SPAM by Hijacked Account Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2013-56 |
As the growing trend of integrating VoIP (Voice over IP) into SNS (Social Networking Service), we can easily guess the e... [more] |
CS2013-56 pp.93-98 |
CS |
2013-11-15 10:50 |
Hokkaido |
Noboribetsu-onsen Dai-ichi Takimotokan (Hokkaido) |
Adjacent Small Cell Pre-activation Scheme Based on UE's Mobility Prediction in Heterogeneous Cellular Network Shinichiro Hara, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2013-57 |
In recent years, heterogeneous cellular network has been considered, as a system model which has several types of cells ... [more] |
CS2013-57 pp.99-104 |
CS |
2013-11-15 11:05 |
Hokkaido |
Noboribetsu-onsen Dai-ichi Takimotokan (Hokkaido) |
Priority Based Routing for Forest Fire Monitoring in Wireless Sensor Network Takuma Koga, Shinichiro Hara, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2013-58 |
Recently, forest re monitoring system in wireless network has received much attention. Conventionally,
the scheme that... [more] |
CS2013-58 pp.105-110 |
CS |
2012-07-12 14:30 |
Kagoshima |
China-cho-Kominkan (Okinoerabu Island) |
[Invited Talk]
Evaluation of Calculation Amount and Trade-off in FFS Authentication with Divided Challenge Method to Mitigate the Effect of DoS Attack Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2012-33 |
[more] |
CS2012-33 pp.57-62 |
CQ, CS (Joint) |
2011-04-22 11:15 |
Kagoshima |
Yakushima Environmental Culture Village Center |
Efficient solution to decrease the effect of DoS attack against IP address ownership proof in Mobile IPv6 Kentaroh Toyoda, Yuta Kamiguchi, Shinichiro Inoue, Iwao Sasase (Keio Univ.) CS2011-7 |
In Mobile IPv6(MIPv6), Mobile Node(MN) communicating with Correspondent Node(CN) cannot prove ownership of the claimed I... [more] |
CS2011-7 pp.39-44 |