Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, LOIS |
2019-11-02 14:20 |
Osaka |
Osaka Univ. (Osaka) |
Proposal of a Password Storage Method for Network Login
-- Using an External Storage Device for Screenshots -- Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41 |
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] |
ISEC2019-82 SITE2019-76 LOIS2019-41 pp.127-132 |
LOIS, ISEC, SITE |
2017-11-09 09:30 |
Kyoto |
(Kyoto) |
Consciousness Investigation of Passwords Management in University Students
-- Questionnaire Design based on Friend Relationships -- Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27 |
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] |
ISEC2017-50 SITE2017-32 LOIS2017-27 pp.7-12 |
LOIS, ISEC, SITE |
2017-11-09 10:00 |
Kyoto |
(Kyoto) |
User Authentication Keeping Method Using Watch Type Devices
-- Case of Acceleration Sensors -- Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) ISEC2017-51 SITE2017-33 LOIS2017-28 |
Wearable devices are going to be popular in near future. These devices also can be used in user authentications. In thes... [more] |
ISEC2017-51 SITE2017-33 LOIS2017-28 pp.13-18 |
ISEC, LOIS, SITE |
2016-11-08 10:00 |
Fukui |
Community Hall & AOSSA Mall, Fukui (Fukui) |
Risks of approval in the SNS using the OAuth authentication Tatsuzi Yoshida, Yoshiaki Seki (Tokyo City Univ) ISEC2016-60 SITE2016-50 LOIS2016-38 |
Smartphones and Social Network Service (SNS) are widely used all over the world. So, the users scarce in information lit... [more] |
ISEC2016-60 SITE2016-50 LOIS2016-38 pp.57-62 |
LOIS, IPSJ-CN, IPSJ-SPT |
2015-05-15 14:00 |
Tokyo |
Tsuda College, Kodaira Campus (Tokyo) |
Risk Assessment of Privacy Disclosure in Facebook Use
-- Privacy Setting and Awareness of the Young Members in Society -- Yoshiaki Seki, Sumire Hirota, Mizuki Yamazaki (Tokyo City Univ.) LOIS2015-7 |
Facebook is gathering many users as a place of the communication between the friends. On the other hand, unexpected priv... [more] |
LOIS2015-7 pp.85-90 |
LOIS, IPSJ-CN, IPSJ-SPT |
2015-05-15 14:30 |
Tokyo |
Tsuda College, Kodaira Campus (Tokyo) |
Analysis of Congestion in Sightseeing Spots by using Twitter Logs Kei Sato, Yoshiaki Seki (Tokyo City Univ.) LOIS2015-8 |
Recent Japan congestion in sightseeing spots is a major social problem. Quality of sightseeing is influenced by time los... [more] |
LOIS2015-8 pp.91-96 |
LOIS, IPSJ-DC (Joint) |
2014-07-25 11:30 |
Tokyo |
(Tokyo) |
Systematic analysis for the decision guidelines in the adoption and operation of BYOD
-- Contradiction between rules and information security -- Takashi Hatashima (NTT), Yoshiaki Seki (TCU), Yasuhisa Sakamoto, Shigeru Kayaguchi (NTT) LOIS2014-16 |
As performance and portability of information device are getting improved, companies take to the concept of new working ... [more] |
LOIS2014-16 pp.29-34 |
LOIS |
2014-03-08 14:25 |
Okinawa |
(Okinawa) |
Risk Assessment of Information Leak in Twitter Use of Employee
-- Tweet Experience and Consciousness about Business -- Yoshiaki Seki, Naoko Chiba (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-75 |
Companies are apprehensive about the information leak according to the handiness of Twitter. In this paper, we conduct W... [more] |
LOIS2013-75 pp.125-130 |
LOIS |
2014-03-08 14:50 |
Okinawa |
(Okinawa) |
Risk Assessment of Information Leak in Twitter Use of Employee
-- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets -- Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-76 |
The cases, such as the employees posting to Twitter about customer information of the celebrity and the unpublished info... [more] |
LOIS2013-76 pp.131-136 |
LOIS |
2013-03-07 16:00 |
Okinawa |
(Okinawa) |
Investigation of Information Sharing System which tweets Behavior of Information Security Satoshi Hara, Hiroki Miura (Univ. of Electro-Comm), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm) LOIS2012-85 |
[more] |
LOIS2012-85 pp.95-100 |
LOIS |
2013-03-07 16:20 |
Okinawa |
(Okinawa) |
Implementation of Information Sharing System which tweets Behavior of Information Security Hiroki Miura, Satoshi Hara (Univ. of Electro-Comm.), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm.) LOIS2012-86 |
In this paper We implement Securitter that the information-sharing system
using Twitter which improves information sec... [more] |
LOIS2012-86 pp.101-106 |
LOIS, IPSJ-CN, IPSJ-SPT |
2012-05-18 16:40 |
Chiba |
Chiba Institute of Technology (Chiba) |
A Study of the Risk Management in Life Log Service Shigeaki Tanimoto, Ken Takahashi (CIT), Yoshiaki Seki (NTT), Motoi Iwashita (CIT), Hiroyuki Sato (s.tanimoto@m.ieice.org), Atsushi Kanai (HOSEI University) LOIS2012-8 |
In recent years, Life Log Service treating action records, such as an individual search log and a data on shoppers' brow... [more] |
LOIS2012-8 pp.127-132 |
ISEC, LOIS |
2011-11-15 10:55 |
Osaka |
Osaka Electro-Communication University (Osaka) |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46 |
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] |
ISEC2011-52 LOIS2011-46 pp.123-128 |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center (Okinawa) |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
ISEC, LOIS |
2010-11-18 09:00 |
Ibaraki |
Tsukuba Univ. (Ibaraki) |
Sample Investigation and the Consideration to Compromising Cryptosystems in SSL Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) ISEC2010-59 LOIS2010-38 |
In the information society, the encryption technology is indispensable. The improvement of computer performance causes t... [more] |
ISEC2010-59 LOIS2010-38 pp.65-72 |
ISEC, LOIS |
2010-11-18 09:30 |
Ibaraki |
Tsukuba Univ. (Ibaraki) |
A Proposal of a method to Check Cryptographic Algorithms in Security Protocols
-- A Countermeasure against Compromising of Cryptosystems in SSL -- Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39 |
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] |
ISEC2010-60 LOIS2010-39 pp.73-80 |
LOIS, IPSJ-CN |
2008-05-23 13:20 |
Chiba |
Keyaki Bldg, Chiba University (Chiba) |
Consideration of management assistant in a research organization Yoshiaki Seki (NTT) OIS2008-8 |
In organization, information sharing and knowledge accumulation show the substantial changes as ICT progresses. Especial... [more] |
OIS2008-8 pp.43-48 |
ISEC, LOIS |
2006-11-16 13:25 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) (Chiba) |
A study of Multi-Homing Group service Architecture
-- A Consideration of inter-group collision control method -- Shigeaki Tanimoto, Yoshiaki Seki, Osamu Shionoiri, Atsushi Kanai (NTT) |
[more] |
ISEC2006-89 OIS2006-47 pp.7-12 |
LOIS |
2006-05-19 10:00 |
Tokyo |
NTT Musashino R&D Center (Tokyo) |
ID-linker: Towards remote control technique which uses RFID Yoshiaki Seki (NTT) |
As RFID tags spread, it is possible to identify one by one by using the RFID. We propose the technique by which the remo... [more] |
OIS2006-1 pp.1-6 |
LOIS |
2006-05-19 17:00 |
Tokyo |
NTT Musashino R&D Center (Tokyo) |
A Security Consideration in ID Information Sharing Service Sakae Chikara, Yoshiaki Seki, Shin-ichi Nakahara, Tetsurou Yamazaki, Tatsuya Kushida, Ichizo Nakamura, Atsushi Kanai (NTT) |
A variety of systems, such as material flow management system and security gate system, use Barcode, QR code and RFID, w... [more] |
OIS2006-9 pp.49-54 |