IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Data Security Verification in Supply Chain
Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] ICTSSL2022-19
OME 2021-12-24
Online Online Research on fabrication of core selective polymerization type light-induced self-written optical waveguide using infrared optical communication wavelength
Haruki Otaka, Hidetaka Terasawa, Okihiro Sugihara (Utsunomiya Univ.) OME2021-27
Light-induced self-written (LISW) optical waveguides are expected to realize an easy connections between optical fiber a... [more] OME2021-27
BioX, ITE-ME, ITE-IST [detail] 2014-06-16
Ishikawa Kanazawa University, Kakuma Campus Design of Biometric Authentication System with Template Protection Using SIM Card
Norihiro Okui, Haruki Ota, Ryu Watanabe, Yutaka Miyake (KDDI Labs) BioX2014-3
 [more] BioX2014-3
ISEC, IT, WBS 2011-03-04
Osaka Osaka University Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] IT2010-96 ISEC2010-100 WBS2010-75
ISEC, SITE, IPSJ-CSEC 2008-07-24
Fukuoka Fukuoka Institute of System LSI Design Industry Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone
Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.)
When a cellular phone is lost or stolen, it may be unjustly used by a malicious user. There are many cellular phones wit... [more] ISEC2008-24 SITE2008-18
IT, WBS, ISEC 2005-03-18
Kyoto Kyoto Univ. Implementation of a Security Protocol Analyzer based on Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] IT2004-54 ISEC2004-110 WBS2004-169
ISEC 2004-09-17
Tokyo Kikai-Shinko-Kaikan Bldg. Study of Security Protocol Analyzer Considering Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more]
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan