|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, IPSJ-DC (Joint) |
2014-07-25 11:30 |
Tokyo |
|
Systematic analysis for the decision guidelines in the adoption and operation of BYOD
-- Contradiction between rules and information security -- Takashi Hatashima (NTT), Yoshiaki Seki (TCU), Yasuhisa Sakamoto, Shigeru Kayaguchi (NTT) LOIS2014-16 |
As performance and portability of information device are getting improved, companies take to the concept of new working ... [more] |
LOIS2014-16 pp.29-34 |
LOIS |
2013-03-08 15:30 |
Okinawa |
|
An Implementation of Situation-Sensitive Function Controller for Smartphones and its Evaluation. Ryota Sato, Sakae Chikara, Tetsuya Okuda, Shigeru Kayaguchi (NTT) LOIS2012-104 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. The situation in which smartp... [more] |
LOIS2012-104 pp.203-208 |
LOIS |
2012-03-08 13:50 |
Okinawa |
Meio Univ. |
A Proposal of Situation-Sensitive Application Launcher for Smartphones Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] |
LOIS2011-83 pp.61-66 |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
ISEC, LOIS |
2010-11-18 09:30 |
Ibaraki |
Tsukuba Univ. |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39 |
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] |
ISEC2010-60 LOIS2010-39 pp.73-80 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|