|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OCS, NS, PN (Joint) |
2016-06-23 14:35 |
Hokkaido |
Hokkaido University |
Performance Analysis of Passive Tag Identification Time in RFID Systems Koya Mizuno, Yutaka Takahashi (Kyoto Univ.) NS2016-36 |
RFID systems are getting popular for management of things. In this paper, we consider BFSA (Basic Framed Slotted ALOHA) ... [more] |
NS2016-36 pp.47-52 |
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Towards Non-Encryption-Based RFID Private Tag Authentication Kazuya Sakai (TMU) ICSS2015-64 |
In this paper, we present the summary of our research project on RFID security and privacy. To be specific, we will pres... [more] |
ICSS2015-64 pp.101-104 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:05 |
Hokkaido |
San-Refure Hakodate |
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack Daisuke Moriyama (NICT) ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 |
Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneous... [more] |
ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12 pp.17-24 |
IA, ICSS |
2013-06-20 14:35 |
Niigata |
Ao-re Nagaoka |
Three Party Secure Anonymous Authentication Scheme with Hard Learning Problems Kotaro Kishibe (Kobe Univ.), Ryoichi Isawa (NICT), Masakatu Morii (Kobe Univ.) IA2013-3 ICSS2013-3 |
In late years, with the spread of RFID, the lightweight certification protocol between RFID tag and readers attracts att... [more] |
IA2013-3 ICSS2013-3 pp.13-18 |
ISEC, IT, WBS |
2011-03-03 16:35 |
Osaka |
Osaka University |
RFID Identification Protocol with Reduced Reader Computational Cost Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.) IT2010-76 ISEC2010-80 WBS2010-55 |
In the general setting of the RFID system, as each tag has its unique secret key, the reader needs to exhaustively searc... [more] |
IT2010-76 ISEC2010-80 WBS2010-55 pp.49-55 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|