|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-14 09:30 |
Osaka |
Osaka Univ. (Suita Campus) |
A Study on Malicious Communication Detection Using Attack Characteristics of Malware on an Internal Network. Ken Aono, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 |
Recently, targeted attacks have been increasing.
Malicious attackers use malware to gain access to the organization's ... [more] |
IT2023-113 ISEC2023-112 WBS2023-101 RCC2023-95 pp.249-253 |
RCC, ISEC, IT, WBS |
2024-03-14 15:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Content-Similarity in DNS Graph WenBo Zhou, Yuki Ishida, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of information Sciences) IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 |
Phishing attacks, known as a prevalent form of social engineering attacks, have become one of the most significant cyber... [more] |
IT2023-128 ISEC2023-127 WBS2023-116 RCC2023-110 pp.332-336 |
RCC, ISEC, IT, WBS |
2024-03-14 15:30 |
Osaka |
Osaka Univ. (Suita Campus) |
Phishing Detection Method Based on Machine Learning Using DNS Graph Yuki Ishida, Syota Nihei, Junko Sato, Atsushi Waseda, Masaki Hanada (Tokyo Univ. of Information Sciences) IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 |
Recently, phishing scams have been on the rise, the need for effective defense methods against this phishing scams.
A b... [more] |
IT2023-129 ISEC2023-128 WBS2023-117 RCC2023-111 pp.337-342 |
WBS, IT, ISEC |
2018-03-09 09:50 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On (Un)Deniability of Plausible Deniability Atsushi Waseda, Ryo Nojima (NICT) IT2017-141 ISEC2017-129 WBS2017-122 |
Recently a new security definition for synthetic datasets is roposed.
This definition requires each synthetic record ha... [more] |
IT2017-141 ISEC2017-129 WBS2017-122 pp.225-230 |
IT, ISEC, WBS |
2012-03-01 14:20 |
Kanagawa |
|
Consideration for IT-secure password protected secret sharing Atsushi Waseda, Ryo Nojima (NICT) IT2011-52 ISEC2011-79 WBS2011-53 |
Bagherzand et al. proposed the password protected secret sharing scheme whose shares are protected by the user password... [more] |
IT2011-52 ISEC2011-79 WBS2011-53 pp.41-43 |
SANE, SAT (Joint) |
2011-02-25 15:30 |
Hyogo |
NICT Kobe Research Laboratories |
Study on high speed mobile laser communications and secure global quantum key distribution technology Morio Toyoshima, Takashi Sasaki, Hideki Takenaka, Yoshihisa Takayama, Mikio Fujiwara, Masahiro Takeoka, Masahide Sasaki, Zhen Wang, Shigehito Miki, Taro Yamashita, Hidema Tanaka, Atsushi Waseda, Seiho Uratsuka, Toshihiko Umehara, Jyunpei Uemoto (NICT) SANE2010-167 |
National Institute of Information and Communications Technology (NICT) successfully developed the quantum entanglement s... [more] |
SANE2010-167 pp.49-51 |
ISEC |
2007-05-18 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
consideration of quantum Oblivious Transfer Atsushi Waseda (NICT), Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji (JAIST) ISEC2007-10 |
Quantum oblivious transfer (QOT) is one of the important primitive for quantum security. In representative example of Q... [more] |
ISEC2007-10 pp.65-68 |
IT, ISEC, WBS |
2007-03-16 13:50 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On Quantum Secret Sharing between Multiparty and Multiparty without Quantum Memory Takayuki Takagi, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (Jaist) |
[more] |
IT2006-116 ISEC2006-171 WBS2006-113 pp.185-190 |
ISEC |
2005-12-16 15:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Consideration for the quantum multi-secret sharing using MSP Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (JAIST) |
Quantum secret sharing schemes(QSSS) was proposed by Hillery for the first time. Afterwards, various techniques are prop... [more] |
ISEC2005-119 pp.53-60 |
IT, WBS, ISEC |
2005-03-18 10:20 |
Kyoto |
Kyoto Univ. |
Consideration for Quantum Secret Sharing Ken Sasaki, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (JAIST) |
Quantum secret sharing schemes(QSSS) was proposed by Hillery\cite{HBB99} for the first time. Afterwards, various techniq... [more] |
IT2004-71 ISEC2004-127 WBS2004-186 pp.7-11 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|