|
|
All Technical Committee Conferences (Searched in: Recent 10 Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2025-03-07 16:45 |
Okinawa |
Okinawa Prefectural Museum & Art Museum |
Security Analysis of Proton Key Transparency Exploited via Catch-All Addresses Kaito Naito, Hayato Kimura, Shogo Shiraki, Takanori Isobe (UoH) ICSS2024-122 |
Key Transparency (KT) is a scheme proposed by Melara et al. (Melara et al., USENIX Security ’15) that enables automatic ... [more] |
ICSS2024-122 pp.415-422 |
ICSS, IPSJ-SPT |
2024-03-21 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A comprehensive investigation of forgery attack on the Nostr protocol Hayato Kimura (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo) ICSS2023-69 |
(To be available after the conference date) [more] |
ICSS2023-69 pp.1-8 |
ICSS |
2023-11-16 14:30 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54 |
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] |
ICSS2023-54 pp.22-29 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:30 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Security Analysis on Nostr protocol for decentralized SNS Hayato Kimura, Takanori Isobe (Univ. Hyogo) ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 |
Nostr is a protocol for distributed social networking services (SNS) characterized by being Simple, Resilient, and Verif... [more] |
ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 pp.239-246 |
SITE, ISEC, LOIS |
2018-11-03 11:30 |
Fukuoka |
|
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25 |
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] |
ISEC2018-65 SITE2018-43 LOIS2018-25 pp.7-12 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 14:30 |
Tochigi |
Kinugawa Onsen Hotel |
Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76 |
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] |
SITE2017-65 IA2017-76 pp.91-96 |
ISEC, COMP |
2017-12-21 15:25 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33 |
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] |
ISEC2017-79 COMP2017-33 pp.43-50 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|