IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
BioX 2022-10-03
16:30
Okinawa   A proposal on Reflective Pseudo Blood Volume Pulse Presentation Attack against PPG Sensor
Tatsuya Takehisa (NICT/Nissin), Hayato Ushimaru (NICT/CDI), Daisuke Makita, Dai Arisue (NICT), Satoshi Mimura (NICT/Ierae), Ryo Iijima (Waseda), Ryouichi Isawa, Daisuke Inoue (NICT) BioX2022-59
The authors study an attack that presents a pseudo pulse wave signal to a photoplethysmography (PPG) sensor. A previous ... [more] BioX2022-59
pp.20-25
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
ICSS, IPSJ-SPT 2020-03-02
13:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96
 [more] ICSS2019-96
pp.207-212
ICSS, IPSJ-SPT 2019-03-07
14:45
Okinawa NICT Okinawa Electromagnetic Technology Center Implementation and evaluation of aggregate message authentication method
Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73
 [more] ICSS2018-73
pp.29-33
HWS
(2nd)
2018-12-13
11:35
Tokyo Tokyo Univ. Takeda Bldg. Takeda Hall (Advance abstract in Japanese is available) [more]
ICSS 2015-03-04
09:00
Okinawa Meio Univiersity Novel USB Hub against the Malicious USB Devices
Tatsuya Takehisa (NICT/Nissin), Makoto Iwamura (NICT/NTT), Hayato Ushimaru (NICT/CDI), Daisuke Inoue (NICT) ICSS2014-73
USB devices that adapt USB interfaces (USB keyboards and USB mouses) are prevalent. However, a new attack has been repor... [more] ICSS2014-73
pp.61-66
BioX 2014-10-17
11:25
Okinawa Nobumoto Ohama Memorial Hall (Ishigaki) Evaluation of Liveness Detection Methods against Flat Panel-based Presentation Attack
Tatsuya Takehisa (Nissin), Tetsushi Ohki, Akira Otsuka (AIST), Manabu Inuma (Josai Univ.) BioX2014-38
Recently, The presentation attack spoofing to the biometrics authentication system that use fake biometric samples are ... [more] BioX2014-38
pp.55-59
IA, ICSS 2013-06-21
14:15
Niigata Ao-re Nagaoka NONSTOP: Secure Remote Analysis Platform for Cybersecurity Information
Tatsuya Takehisa (NICT/Nissin), Daisuke Inoue, Masashi Eto (NICT), Katsunari Yoshioka (YNU), Takahiro Kasama, Junji Nakazato, Koji Nakao (NICT) IA2013-15 ICSS2013-15
Practical attack information such as attack traffic and malware samples is extremely important for researchers in the fi... [more] IA2013-15 ICSS2013-15
pp.85-90
IA, ICSS 2010-06-17
15:45
Kyoto Academic Center for Computing and Media Studies, Kyoto University Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack
Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] IA2010-7 ICSS2010-7
pp.37-42
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
16:50
Hiroshima Hiroshima Univ. Evaluation of Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Masanori Hirotomo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) LOIS2009-39 IE2009-80
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the ... [more] LOIS2009-39 IE2009-80
pp.119-124
IA, ICSS 2009-06-18
14:20
Tokyo Kikai-Shinko-Kaikan Bldg *
Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] IA2009-7 ICSS2009-15
pp.37-42
IA, ICSS 2009-06-18
14:45
Tokyo Kikai-Shinko-Kaikan Bldg Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Ryoichi Isawa (CRYPTO Co., Ltd.), Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-8 ICSS2009-16
VPN servers that offer remote access in the Internet are exposed under many kinds of cyber-attacks. In recent years, cyb... [more] IA2009-8 ICSS2009-16
pp.43-48
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan