IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2023-11-22
16:50
Aomori Aomori Prefecture Tourist Center ASPM (Aomori)
(Primary: On-site, Secondary: Online)
IA2023-42 When a spam scam email is reported, it is desirable to share the data so that many researchers aiming to improve informa... [more] IA2023-42
pp.41-47
IA, SITE, IPSJ-IOT [detail] 2022-03-07
14:45
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A Research of U.K Telecommunications (Security) Act 2021 -- Toward a Study of How to Change Information Security into Mandatory --
Yusuke Tachibana (FIT) SITE2021-53 IA2021-66
In December 2021, the UK passed the Telecommunications (Security) Act 2021. This act requires telecom operators to take ... [more] SITE2021-53 IA2021-66
pp.45-51
ET 2020-03-07
13:50
Kagawa National Institute of Technology, Kagawa Collage
(Cancelled but technical report was issued)
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System
Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] ET2019-92
pp.93-98
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
09:55
Kochi Kochi University of Technology Implementation of gathering system configuration and design vulnerability assessment for zero-day attack countermeasure using vulnerability information
Motoki Kusume, Koji Kida, Keizo Saisho (Kagawa Univ.) ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15
The damage caused by zero day attack performed between the time vulnerabilities are found in the software and the time t... [more] ISEC2019-12 SITE2019-6 BioX2019-4 HWS2019-7 ICSS2019-10 EMM2019-15
pp.1-6
DC 2018-12-14
16:50
Okinawa Miyako Seisyonen-No-Ie Consideration on the key points to ensure security for train control using communication
Tomonori Hasegawa (NTSEL), Takashi Mori (JR-West), Morimasa Hayashida (NTSEL), Takeshi Mizuma (U-Tokyo) DC2018-69
In view of the declining birthrate and the aging of the population, a growing importance has been given to maintenance-s... [more] DC2018-69
pp.55-58
CS 2018-07-12
17:00
Okinawa Eef Information Plaza (Kumejima Is.) [Special Invited Talk] Cyber Security: Lessons Learned from Actual Cases -- Recent Trends of Cyber Attacks and Effective Approaches --
Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] CS2018-34
p.109
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Text-dependent voice liveness detection based on pop-noise detector considering speaker-dependent phoneme information for speaker verification
Shihono Mochizuki, Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) EA2017-111 SIP2017-120 SP2017-94
This paper proposes a pop-noise (PN) detection method considering speaker-dependent phoneme information for text-depende... [more] EA2017-111 SIP2017-120 SP2017-94
pp.57-62
IA, SITE, IPSJ-IOT [detail] 2018-03-06
11:15
Tochigi Kinugawa Onsen Hotel Study on Effect Testing of Persuasive Message Stimulating Computer Virus Measures based on Collective Protection Motivation Theory
Kana Shimbo, Komagome Tasuku, Takahashi Momomi, Harada Akane, Shun-ichi Kurino, Noriaki Yoshikai (Nihon Univ.) SITE2017-74 IA2017-85
Numerous Internet users not recovering their infected PCs are reported. In order to have them recover their PCs, the pro... [more] SITE2017-74 IA2017-85
pp.205-208
ET 2018-03-03
16:05
Kochi Kochi University of Technology (Eikokuji Campus) Development and Evaluation of a System for Support Visualization and Transmission for Recognition of Risk Assessment Process for the Incident Response
Yuji Yamasaki, Naka Gotoda, Yusuke Kometani, Toshihiro Hayashi, Rihito Yaegashi, Keizo Saisho (Kagawa Univ.) ET2017-103
In recent years, the expansion of damage caused by information security incidents has become a problem, and appropriate ... [more] ET2017-103
pp.83-88
ISEC, LOIS, SITE 2016-11-08
11:30
Fukui Community Hall & AOSSA Mall, Fukui [Invited Talk] Threat of Electromagnetic Information Leakage and Countermeasures
Yu-ichi Hayashi (Tohoku Gakuin Univ.) ISEC2016-63 SITE2016-53 LOIS2016-41
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] ISEC2016-63 SITE2016-53 LOIS2016-41
p.75
ICM, LOIS 2016-01-21
16:45
Fukuoka Fukuoka Institute of Technology [Invited Talk] Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications
Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] ICM2015-33 LOIS2015-55
pp.41-46
ISEC 2013-12-11
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Education for Practical Hardware Security Based on Information Security Education Program
Yu-ichi Hayashi, Naofumi Homma (Tohoku Univ.), Toshihiro Katashita (AIST), Hideaki Sone (Tohoku Univ.) ISEC2013-78
This paper reports an education course for the development of human resources in hardware security in a practical educat... [more] ISEC2013-78
pp.33-37
ICSS, IA 2012-06-21
15:20
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University Considering secure information infrastructure for gathering victim information
Masahiro Hiji (Hitachi East Japan Solutions, Ltd./Tohoku Univ.), Kazuyoshi Matsumoto (Hitachi East Japan Solutions, Ltd.) IA2012-4 ICSS2012-4
The electric power and the communication network after the earthquake stopped for a long term.
This was a trouble wher... [more]
IA2012-4 ICSS2012-4
pp.19-23
SITE, IPSJ-EIP 2012-05-16
10:35
Tokyo NII The Questionnaire about an Information Security Measures for the Person in Charge of an Information Security in a Private University
Masaru Ogawa (Kobe Gakuin Univ.) SITE2012-3
This paper discusses the result of questionnaire about an information security measures for the person in charge of an i... [more] SITE2012-3
pp.13-18
AP, ITE-BCT 2012-02-09
10:20
Hiroshima NHK Hiroshima Evaluation of Fundamental Characteristics of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics
Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2011-187
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more] AP2011-187
pp.13-18
IN, IA
(Joint)
2011-12-16
12:50
Hiroshima Hiroshima City University Overlay Based, Distributed Defense-Framework against DDoS Attacks
Mohamad Eid, Hitoshi Aida (Univ. of Tokyo) IA2011-51
The World Wide Web plays vital roles in our daily lives. But cyber-attackers abuse this vitality by threatening web serv... [more] IA2011-51
pp.37-42
AP, WPT
(Joint)
2011-10-13
13:25
Kanagawa Kanagawa Womens Center Experimental Evaluation of Wireless Terminal Authentication Scheme Based on Radio Propagation Characteristics
Naoki Otani, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) AP2011-80
There is a problem of spoofing attack to legitimate users in wireless communication. As one of the countermeasures for t... [more] AP2011-80
pp.19-24
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2009-12-03
11:00
Kochi Kochi City Culture-Plaza A Quantitative Evaluation of Security for Scan-based Side Channel Attack and Countermeasures
Yuma Ito, Masayoshi Yoshimura, Hiroto Yasuura (Kyushu Univ) VLD2009-52 DC2009-39
There is a potential that the secret information on an encryption LSI is leaked from a scan chain. There are many counte... [more] VLD2009-52 DC2009-39
pp.73-78
SITE, IPSJ-EIP 2008-05-30
13:25
Tochigi Utsunomiya University On Active Relationships Concerning Security between the Real World and the Virtual World
Shigeki Koyama, Masahiro Matsuo (Hokkaido Univ.)
Though most consumers are exposed to heavy risks in the Internet, they are not ready for taking enough security measures... [more] SITE2008-2
pp.7-10
ISEC, SITE, IPSJ-CSEC 2006-07-21
11:10
Okayama Okayama Univ. A study on security technologies for paper documents
Ryu Ebisawa, Yasuhiro Fujii, Yoshiyasu Takahashi, Satoru Tezuka (Hitachi)
While the administration of the Privacy Law and the expected application of J-SOX (Japanese version of The Sarbanes-Oxle... [more] ISEC2006-50
pp.75-81
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan