IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 45  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, ISEC, LOIS 2021-11-12
Online Online Security notions of decryption-controllable identity-based encryption
Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] ISEC2021-43 SITE2021-37 LOIS2021-26
Online Online [Invited Talk] Classical Verification of Quantum Computations with Efficient Verifier
Takashi Yamakawa (NTT)
ICSS, IPSJ-SPT 2021-03-01
Online Online On the Privacy Risk of Exposure Notification Framework: Assessment and Countermeasures
Kazuki Nomoto (Waseda Univ.), Mitsuaki Akiyama (NTT), Masashi Eto (NICT), Atsuo Inomata (Osaka Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-34
The Exposure Notification Framework uses the Bluetooth Low Energy (BLE) signal generated by a smartphone to determine cl... [more] ICSS2020-34
ICSS, IPSJ-SPT 2021-03-01
Online Online Dynamic Analysis of Persistent IoT Malware UsingAdaptive Sandbox
Takahiro Inoue (YNU), Satoshi Hara (YNU/FUJISOFT), Hironobu Sakaki, Kouichirou Okada (YNU/RainForest), Eitaro Shioji, Mitsuaki Akiyama (NTT), Takayuki Sasaki, Rui Tanabe, Katsunari Yoshioka, Koji Nakao, Tsutomu Matsumoto (YNU) ICSS2020-41
Malware that infects vulnerable IoT devices is becoming more sophisticated. Unlike legacy IoT malware, cases of persiste... [more] ICSS2020-41
ICSS, IPSJ-SPT 2021-03-02
Online Online Developing an Interactive Analysis System for Voice Assistant Apps
Atsuko Natatsuka (Waseda Univ.), Ryo Iijima (Waseda Univ./NICT), Takuya Watanabe, Mitsuaki Akiyama (NTT), Tetsuya Sakai (Waseda Univ.), Tatsuya Mori (Waseda Univ./NICT) ICSS2020-48
In Voice Assistant Services, official or third-party Voice Assistant Apps (VA apps) are provided. Since a VA app works a... [more] ICSS2020-48
ICSS, IPSJ-SPT 2021-03-02
Online Online A Study on the Adoption of Link Preview by the Phishing Sites
Norihito Omori (Waseda Univ.), Satoshi Furutani, Takuya Watanabe, Toshiki Shibahara, Mitsuaki Akiyama (NTT), Tatsuya Mori (Waseda Univ.) ICSS2020-54
Search engines are not the only means of accessing online content. The distribution of malicious content has become mor... [more] ICSS2020-54
ICSS, IPSJ-SPT 2021-03-02
Online Online Evaluation of Uncertain Reports by Multiple Anti-virus Engines
Kazuya Nomura (Waseda Univ.), Mistuaki Akiyama (NTT), Masaki Kamizono (Deloitte Tohmatsu Cyber LLC), Takahiro Kasama (NICT) ICSS2020-56
VirusTotal is an online service that provides detection results from multiple anti-virus engines. It is used in a wide r... [more] ICSS2020-56
ICD, HWS [detail] 2020-10-26
Online Online Security Threats and Preventions for Photonics Computing Model
Junko Takahashi, Koji Chida, Takeshi Sakamoto (NTT) HWS2020-33 ICD2020-22
This paper presents security analysis on photonic computing models in All-Photonics Network (APN). New computing archite... [more] HWS2020-33 ICD2020-22
ISEC 2020-05-20
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
HWS 2020-04-07 Online Online A Study on Timing Information Acquiring Methodology for TLB Side-Channel Attacks
Yuki Matsumoto (Kyushu Univ.), Yuichiro Dan, Junko Takahashi (NTT), Takatsugu Ono (Kyushu Univ.) HWS2020-6
We report on the method of acquiring Translation Look-aside Buffer (TLB) access latency which required
for implementing... [more]
ICSS, IPSJ-SPT 2020-03-02
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
ICSS2019-74 (To be available after the conference date) [more] ICSS2019-74
ICSS, IPSJ-SPT 2020-03-03
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Model checking RNNs with modal μ-calculus
Tatsuhiro Aoshima, Toshinori Usui (NTT) ICSS2019-88
Machine learning models have been applied to many cyber-physical systems such as self-driving cars, robotics, and factor... [more] ICSS2019-88
ISEC, SITE, LOIS 2019-11-01
Osaka Osaka Univ. Lattice basis reduction over projected lattices and its application to solving the LWE problem
Satoshi Nakamura, Nariaki Tateiwa (Kyushu Univ.), Koha Kinjo (NTT), Yasuhiko Ikematsu, Masaya Yasuda (Kyushu Univ.) ISEC2019-68 SITE2019-62 LOIS2019-27
The security of modern lattice-based schemes is based on the computational hardness of solving the learning with errors ... [more] ISEC2019-68 SITE2019-62 LOIS2019-27
ICSS, IPSJ-SPT 2019-03-07
Okinawa NICT Okinawa Electromagnetic Technology Center Analyzing Deceptive Internationalized Domain Names
Daiki Chiba, Ayako Akiyama Hasegawa, Takashi Koide (NTT), Yuta Sawabe, Shigeki Goto (Waseda Univ.), Mitsuaki Akiyama (NTT) ICSS2018-76
Internationalized domain names (IDNs) are abused to create domain names visually similar to those of legitimate brands. ... [more] ICSS2018-76
IBISML 2019-03-05
Tokyo RIKEN AIP A Study on Automatic Generation of False Data Injection Attack against Connected Car Service Based on Reinforcement Learning
Yuichiro Dan, Keita Hasegawa, Takafumi Harada, Tomoaki Washio, Yoshihito Oshima (NTT) IBISML2018-109
While the connected car is predicted to prevail by 2025, the appearance of novel cyber attacks is concerned. In this pap... [more] IBISML2018-109
HWS, VLD 2019-03-01
Okinawa Okinawa Ken Seinen Kaikan An Extended of Secure Remote Management Architecture for IoT-device
Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] VLD2018-136 HWS2018-99
Tokyo The University of Tokyo [Poster Presentation] Graph Convolutional Network for Topological stabilizer code.
Amarsanaa Davaasuren (Tokyo Univ.), Yasunari Suzuki (NTT), Keisuke Fujii (Kyoto Univ.), Yasunobu Nakamura (Tokyo Univ.)
Quantum Error Correction (QEC) is vital for fault tolerant quantum computation and requires fast and high-performance de... [more]
Tokyo The University of Tokyo [Poster Presentation] Optimal condition for a cavity QED-based quantum gate
Rui Asaoka, Rina Kanamoto (Meiji Univ,), Yuuki Tokunaga (NTT SP Labs.), Takao Aoki (Waseda Univ.)
Tokyo The University of Tokyo [Poster Presentation] Cross-Resonance gate on 2D-integrated system of superconducting qubits
Kentaro Heya, Kiyoto Mekami, Amarsanaa Davaasuren, Yutaka Takeda, Akhil Pratap Singh, Singo Kono (UT), Yasunari Suzuki (NTT), Koh-ich Nittoh, Koichi Kusuyama (RIKEN), Shuhei Tamate, Yutaka Tabuchi (UT), Yasunobu Nakamura (UT/RIKEN)
Quantum Error Correction is indispensable for large-scale quantum computing. However, quantum error correction codes suc... [more]
Tokyo The University of Tokyo [Poster Presentation] Temporal Shape and Efficiency of Single-Photon Generation Based on Cavity Quantum Electrodynamics
Takeru Utsugi, Fuma Kishida (Waseda), Yuuki Tokunaga (NTT), Takao Aoki (Waseda)
We investigated single photon generation methods based on cavity quantum electrodynamics (cavity-QED) system to realize ... [more]
 Results 1 - 20 of 45  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan