IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-22
11:20
Okinawa OIST
(Primary: On-site, Secondary: Online)
Development of an Outsourcing Password Evaluation System using Intel SGX
Takeki Kitayama, Yuma Nishihira (Tokai Univ.), Akira Kanaoka (Toho Univ.), Yoshio Kakizaki, Toshihiro Ohigashi (Tokai Univ.) ICSS2023-93
Users are required to set passwords that are both complex and not included in leaked lists, with the recent increase in ... [more] ICSS2023-93
pp.174-179
ICSS 2022-11-07
14:20
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Real-time detection method for DOM-based XSS via multiple files
Shu Hiura, Akira Kanaoka (Toho Univ.) ICSS2022-40
DOM Based XSS is one of the most common vulnerabilities related to injection attacks and is caused by improper JavaScrip... [more] ICSS2022-40
pp.13-18
ISEC 2019-05-17
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. A secure method of provisioning IoT devices with few operations
Dai Yamamoto, Hirotaka Kokubo, Takanori Machida, Ikuya Morikawa (FUJITSU LABORATORIES LTD.), Akira Kanaoka (Toho Univ.) ISEC2019-8
Recently, most IoT devices have been connected to cloud servers, which provide users with useful services such as remote... [more] ISEC2019-8
pp.37-44
ICSS, IA 2016-06-07
11:00
Saga Saga University Measuring BGP Origin Validation Effect for Mis-Origination
Masahito Ando (Toho Univ.), Masayuki Okada (JPNIC), Akira Kanaoka (Toho Univ.) IA2016-10 ICSS2016-10
Current Border Gateway Protocol (BGP) operation in the Internet has serious problem about Mis-Origination which is hijac... [more] IA2016-10 ICSS2016-10
pp.51-56
ICSS, IA 2014-06-06
11:20
Hyogo Takikawa Memorial Hall, Kobe University Ransomware: Threat Analysis and Countermeasures
Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] IA2014-7 ICSS2014-7
pp.33-38
SWIM 2014-05-23
15:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Simple Secret Computation Method to increase User's Sense of Safety in Cloud Services
Yohtaro Miyanishi (ISEM), Xiagong Han, Shinji Kitagami (Waseda Univ.), Akira Kanaoka, Fumiaki Sato (Toho Univ.), Yoshiyori Urano, Norio Shiratori (Waseda Univ.) SWIM2014-4
Users of cloud computing could not wipe away the anxiety about the data and programs may be abused or leaked, because us... [more] SWIM2014-4
pp.19-24
ICSS, IPSJ-SPT 2014-03-27
15:45
Okinawa Meio Univiersity On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers
Yuka Enomoto, Akira Kanaoka (Toho Univ.) ICSS2013-68
From Windows Vista, automatic network printer discovery and configuration is available by UPnP functions.
Recent Window... [more]
ICSS2013-68
pp.37-41
ICSS, IPSJ-SPT 2014-03-27
16:10
Okinawa Meio Univiersity Applying Identity-based Cryptography to Mutual Authentication between OpenFlow Devices
Tomoko Kazama, Akira Kanaoka (Toho Univ.) ICSS2013-69
Current OpenFlow specification apply TLS to establish mutual authentication between a controller and a switch, as option... [more] ICSS2013-69
pp.43-48
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
14:50
Hokkaido   TLS with Pre-shared Key Extended by Identity-based Encryption
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka (Fujitsu Labs.), Akira Kanaoka (Toho Univ.) ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45
TLS-PSK is a protocol to support mutual authentication based on pre-shared keys (PSKs). Since TLS-PSK does not need any ... [more] ISEC2013-43 SITE2013-38 ICSS2013-48 EMM2013-45
pp.315-321
ICSS 2012-11-22
14:05
Hiroshima Miyajima Mori-no-Yado Evaluation of Probabilistic Packet Marking Methods using Arrival Probabilisity of Marked Packets
Nasato Gotoh, Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (JPNIC), Eiji Okamoto (Univ. of Tsukuba) ICSS2012-50
Probabilistic Packet Marking (PPM) is one of the IP traceback technologies which is used to defense Denial of Service (D... [more] ICSS2012-50
pp.31-36
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:50
Hokkaido   Architecture Design for Visualizing Risks and Implementing Adequate Security
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT) ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17
 [more] ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17
pp.109-114
ICSS 2012-03-16
13:20
Tokyo Kikai-Shinko-Kaikan Bldg. Device for Transparent Probabilistic Packet Marking
Akira Kanaoka (Univ. of Tsukuba), Masayuki Okada (Univ. of Tsukuba/JPNIC), Eiji Okamoto (Univ. of Tsukuba) ICSS2011-43
Probabilistic Packet Marking (PPM) is known as better defence solution for Denial of Service (DoS) attack. However, most... [more] ICSS2011-43
pp.25-30
ICSS 2011-11-18
16:30
Tokushima Naruto University of Education Soko Soko Security: Providing Appropriate Security in Required Level
Akira Kanaoka (Univ. of Tsukuba) ICSS2011-38
 [more] ICSS2011-38
pp.39-41
ICSS 2010-11-05
14:30
Hiroshima Hiroshima City University Network Topology Analysys for Web Malware Risk Assesment
Akira Kanaoka (Univ. of Tsukuba), Masahiko Kato (IIJ), Eiji Okamoto (Univ. of Tsukuba) ICSS2010-50
Risk Condition Reference Model indicated by National Information Security Center (NISC) simulated dynamics of threat beh... [more] ICSS2010-50
pp.35-40
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
10:55
Aomori Hirosaki University Implementation of Key Generation Center for Identity-based Encryption
Akira Kanaoka, Takuya Houri, Eiji Okamoto (Univ. of Tsukuba) ISEC2010-27 SITE2010-23 ICSS2010-33
Identity-based Encryption (IBE) is approaching to practical use recently,
but several significant points to be solved r... [more]
ISEC2010-27 SITE2010-23 ICSS2010-33
pp.133-139
ICSS 2009-11-13
10:40
Miyazaki University of Miyazaki Identifying Potentially-Impacted Area using CVSS for Networked Systems
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.of Tsukuba), Masahiko Kato (IIJ Tech. Inc.) ICSS2009-54
CVSS(Common Vulnerability Scoring System) is a vulnerability scoring method. CVSS is composed of
three metrics groups: ... [more]
ICSS2009-54
pp.1-6
ISEC 2009-09-25
16:10
Tokyo Kikai-Shinko-Kaikan Bldg. A verifiable server-aided computation of scalar multiplication on elliptic curves
Kouta Tamura, Naoki Kanayama, Akira Kanaoka, Tadahiko Ito, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba) ISEC2009-50
Server-aided computation is the method which delegates computation to server side to execute heavy computation
like a ... [more]
ISEC2009-50
pp.73-78
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
14:15
Akita Akita University Risk Assessment Method for Networked Systems using CVSS
Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] ISEC2009-34 SITE2009-26 ICSS2009-48
pp.189-194
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan