IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
09:30
Osaka Osaka Univ. (Suita Campus) A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network.
Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more]
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95
pp.249-253
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Content-Similarity in DNS Graph
WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110
pp.332-336
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) Phishing Detection Method Based on Machine Learning Using DNS Graph
Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more]
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111
pp.337-342
WBS, IT, ISEC 2018-03-09
09:50
Tokyo Katsusika Campas, Tokyo University of Science On (Un)Deniability of Plausible Deniability
Atsushi Waseda, Ryo Nojima (NICT) IT2017-141 ISEC2017-129 WBS2017-122
Recently a new security definition for synthetic datasets is roposed.
This definition requires each synthetic record ha... [more]
IT2017-141 ISEC2017-129 WBS2017-122
pp.225-230
IT, ISEC, WBS 2012-03-01
14:20
Kanagawa   Consideration for IT-secure password protected secret sharing
Atsushi Waseda, Ryo Nojima (NICT) IT2011-52 ISEC2011-79 WBS2011-53
Bagherzand et al. proposed the password protected secret sharing scheme whose shares are protected by the user password... [more] IT2011-52 ISEC2011-79 WBS2011-53
pp.41-43
SANE, SAT
(Joint)
2011-02-25
15:30
Hyogo NICT Kobe Research Laboratories Study on high speed mobile laser communications and secure global quantum key distribution technology
Morio Toyoshima, Takashi Sasaki, Hideki Takenaka, Yoshihisa Takayama, Mikio Fujiwara, Masahiro Takeoka, Masahide Sasaki, Zhen Wang, Shigehito Miki, Taro Yamashita, Hidema Tanaka, Atsushi Waseda, Seiho Uratsuka, Toshihiko Umehara, Jyunpei Uemoto (NICT) SANE2010-167
National Institute of Information and Communications Technology (NICT) successfully developed the quantum entanglement s... [more] SANE2010-167
pp.49-51
ISEC 2007-05-18
14:30
Tokyo Kikai-Shinko-Kaikan Bldg. consideration of quantum Oblivious Transfer
Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST) ISEC2007-10
Quantum oblivious transfer (QOT) is one of the important primitive for quantum security. In representative example of Q... [more] ISEC2007-10
pp.65-68
IT, ISEC, WBS 2007-03-16
13:50
Gunma Gunma Univ. (Kiryu Campus) On Quantum Secret Sharing between Multiparty and Multiparty without Quantum Memory
Takayuki Takagi, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (Jaist)
 [more] IT2006-116 ISEC2006-171 WBS2006-113
pp.185-190
ISEC 2005-12-16
15:40
Tokyo Kikai-Shinko-Kaikan Bldg. Consideration for the quantum multi-secret sharing using MSP
Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (JAIST)
Quantum secret sharing schemes(QSSS) was proposed by Hillery for the first time. Afterwards, various techniques are prop... [more] ISEC2005-119
pp.53-60
IT, WBS, ISEC 2005-03-18
10:20
Kyoto Kyoto Univ. Consideration for Quantum Secret Sharing
Ken Sasaki, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (JAIST)
Quantum secret sharing schemes(QSSS) was proposed by Hillery\cite{HBB99} for the first time. Afterwards, various techniq... [more] IT2004-71 ISEC2004-127 WBS2004-186
pp.7-11
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan