IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 9 of 9  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS 2016-03-04
Okinawa Central Community Center, Miyakojima-City A study on variations in the false rejection rate and the false acceptance rate on human-behavior-based authentication
Kenichiro Muto, Ryo Yamada, Fumiaki Kudo, Hideki Kawabe, Takahiro Yamamoto (NTT) LOIS2015-85
False rejection rate (FRR) and false acceptance rate (FAR) are generally used as indices of identification accuracy in b... [more] LOIS2015-85
LOIS 2016-03-04
Okinawa Central Community Center, Miyakojima-City A study on personalized selection methods for authentication elements and algorithms
Fumiaki Kudo, Kenichiro Muto, Hideki Kawabe, Takahiro Yamamoto (NTT) LOIS2015-86
Modern smartphones and wearable devices comprise a multitude of sensors which can be utilized to measure a variety of us... [more] LOIS2015-86
LOIS 2016-03-04
Okinawa Central Community Center, Miyakojima-City A study on data protection requirements for an authentication system using personal data
Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] LOIS2015-87
IA, ICSS 2015-06-12
Fukuoka Kyushu Institute of Technology Univ. Experimental Results on an Attack Detection System for Advanced Persistent Threats
Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] IA2015-9 ICSS2015-9
LOIS 2012-03-08
Okinawa Meio Univ. A Proposal of Situation-Sensitive Application Launcher for Smartphones
Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] LOIS2011-83
ISEC, LOIS 2011-11-15
Osaka Osaka Electro-Communication University A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] ISEC2011-52 LOIS2011-46
LOIS 2011-03-04
Okinawa Ishigaki IT business support center A Consideration of Security Risk in Compromising Hash Function -- An Exposure of Vulnerability against Information Storage System --
Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] LOIS2010-81
ISEC, LOIS 2010-11-18
Ibaraki Tsukuba Univ. Sample Investigation and the Consideration to Compromising Cryptosystems in SSL
Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) ISEC2010-59 LOIS2010-38
In the information society, the encryption technology is indispensable. The improvement of computer performance causes t... [more] ISEC2010-59 LOIS2010-38
ISEC, IT, WBS 2008-02-29
Tokyo   Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack
Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) IT2007-50 ISEC2007-147 WBS2007-81
Enocoro is a pseudorandom number generator for a stream cipher proposed by Hitachi,Ltd at ISEC in September, 2007.
In... [more]
IT2007-50 ISEC2007-147 WBS2007-81
 Results 1 - 9 of 9  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan