|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CPSY, IPSJ-ARC |
2016-10-06 10:00 |
Chiba |
Makuhari-messe |
[Technology Exhibit]
Security technologies for non-volatile memory in IoT devices
-- Mechanisms for on-chip MCU and off-chip memory system -- Mikio Hashimoto, Yoshiyuki Amanuma, Kentaro Umesawa, Ryuichi Koike, Jun Kanai, Naoko Yamada (Toshiba) CPSY2016-51 |
Non-volatile memory content modification is serious issues on IoT appliances, since evil effects continue over power cyc... [more] |
CPSY2016-51 pp.37-42 |
DC, CPSY |
2009-04-21 13:25 |
Tokyo |
Akihabara Satellite Campus, Tokyo Metropolitan Univ. |
A Security Data-Flow Analysis in the Secure Software Development Environment DFITS Fukutomo Nakanishi, Ryotaro Hayashi, Hiroyoshi Haruki, Yurie Fujimatsu, Mikio Hashimoto (Toshiba Corp.) CPSY2009-4 DC2009-4 |
We proposed a development environment DFITS, which helps security programmers to create software against tampering in-me... [more] |
CPSY2009-4 DC2009-4 pp.19-24 |
DC, CPSY, IPSJ-SLDM, IPSJ-EMB |
2008-03-27 10:50 |
Kagoshima |
|
Porting of Linux OS to secure processor Yurie Fujimatsu, Hiroyoshi Haruki, Mikio Hashimoto (Toshiba Corp.) DC2007-89 CPSY2007-85 |
Recently, secure processors have been recognized as effective means ofprotection of software running on untrustworthy ho... [more] |
DC2007-89 CPSY2007-85 pp.31-36 |
CPSY, DC |
2006-04-14 14:40 |
Tokyo |
Takeda Hall |
Rapid Authorization and Succession Mechanism for Interprocess Communication on Security Processor L-MSP Mikio Hashimoto, Hiroyoshi Haruki, Takeshi Kawabata (Toshiba) |
[more] |
CPSY2006-8 DC2006-8 pp.43-48 |
CPSY, DC |
2006-04-14 16:50 |
Tokyo |
Takeda Hall |
[Panel Discussion]
[Panel Discussion] Dependability and Security
-- Device, Architecture and Software -- Shuichi Sakai, Hiroshi Nakamura, Masahiro Goshima (Univ. Tokyo), Satoshi Matsuoka (TITECH), Mikio Hashimoto (Toshiba), Kiyoshi Kohiyama (Fujitsu Labs.), Tomohiro Nakamura (Hitachi) |
Dependability and security are two of the most significant things in information systems. Dependability, however, is com... [more] |
CPSY2006-12 DC2006-12 p.67 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|