|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:55 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Data Security Verification in Supply Chain Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19 |
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] |
ICTSSL2022-19 pp.12-17 |
OME |
2021-12-24 13:30 |
Online |
Online |
Research on fabrication of core selective polymerization type light-induced self-written optical waveguide using infrared optical communication wavelength Haruki Otaka, Hidetaka Terasawa, Okihiro Sugihara (Utsunomiya Univ.) OME2021-27 |
Light-induced self-written (LISW) optical waveguides are expected to realize an easy connections between optical fiber a... [more] |
OME2021-27 pp.7-10 |
BioX, ITE-ME, ITE-IST [detail] |
2014-06-16 14:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Design of Biometric Authentication System with Template Protection Using SIM Card Norihiro Okui, Haruki Ota, Ryu Watanabe, Yutaka Miyake (KDDI Labs) BioX2014-3 |
[more] |
BioX2014-3 pp.13-18 |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
Verification Points of Security Against a Passive Attack for Key Exchange Protocols Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75 |
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] |
IT2010-96 ISEC2010-100 WBS2010-75 pp.177-184 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 14:15 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Implementation of Palm Position Alignment Method in Palmprint Verification Using Cellular Phone Haruki Ota, Ryu Watanabe, Toshiaki Tanaka (KDDI Labs.) |
When a cellular phone is lost or stolen, it may be unjustly used by a malicious user. There are many cellular phones wit... [more] |
ISEC2008-24 SITE2008-18 pp.59-66 |
IT, WBS, ISEC |
2005-03-18 15:55 |
Kyoto |
Kyoto Univ. |
Implementation of a Security Protocol Analyzer based on Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] |
IT2004-54 ISEC2004-110 WBS2004-169 pp.25-30 |
ISEC |
2004-09-17 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Security Protocol Analyzer Considering Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more] |
ISEC2004-67 pp.1-8 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|