IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 20  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, LOIS 2019-11-02
14:20
Osaka Osaka Univ. Proposal of a Password Storage Method for Network Login -- Using an External Storage Device for Screenshots --
Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] ISEC2019-82 SITE2019-76 LOIS2019-41
pp.127-132
LOIS, ISEC, SITE 2017-11-09
09:30
Kyoto   Consciousness Investigation of Passwords Management in University Students -- Questionnaire Design based on Friend Relationships --
Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] ISEC2017-50 SITE2017-32 LOIS2017-27
pp.7-12
LOIS, ISEC, SITE 2017-11-09
10:00
Kyoto   User Authentication Keeping Method Using Watch Type Devices -- Case of Acceleration Sensors --
Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) ISEC2017-51 SITE2017-33 LOIS2017-28
Wearable devices are going to be popular in near future. These devices also can be used in user authentications. In thes... [more] ISEC2017-51 SITE2017-33 LOIS2017-28
pp.13-18
ISEC, LOIS, SITE 2016-11-08
10:00
Fukui Community Hall & AOSSA Mall, Fukui Risks of approval in the SNS using the OAuth authentication
Tatsuzi Yoshida, Yoshiaki Seki (Tokyo City Univ) ISEC2016-60 SITE2016-50 LOIS2016-38
Smartphones and Social Network Service (SNS) are widely used all over the world. So, the users scarce in information lit... [more] ISEC2016-60 SITE2016-50 LOIS2016-38
pp.57-62
LOIS, IPSJ-CN, IPSJ-SPT 2015-05-15
14:00
Tokyo Tsuda College, Kodaira Campus Risk Assessment of Privacy Disclosure in Facebook Use -- Privacy Setting and Awareness of the Young Members in Society --
Yoshiaki Seki, Sumire Hirota, Mizuki Yamazaki (Tokyo City Univ.) LOIS2015-7
Facebook is gathering many users as a place of the communication between the friends. On the other hand, unexpected priv... [more] LOIS2015-7
pp.85-90
LOIS, IPSJ-CN, IPSJ-SPT 2015-05-15
14:30
Tokyo Tsuda College, Kodaira Campus Analysis of Congestion in Sightseeing Spots by using Twitter Logs
Kei Sato, Yoshiaki Seki (Tokyo City Univ.) LOIS2015-8
Recent Japan congestion in sightseeing spots is a major social problem. Quality of sightseeing is influenced by time los... [more] LOIS2015-8
pp.91-96
LOIS, IPSJ-DC
(Joint)
2014-07-25
11:30
Tokyo   Systematic analysis for the decision guidelines in the adoption and operation of BYOD -- Contradiction between rules and information security --
Takashi Hatashima (NTT), Yoshiaki Seki (TCU), Yasuhisa Sakamoto, Shigeru Kayaguchi (NTT) LOIS2014-16
As performance and portability of information device are getting improved, companies take to the concept of new working ... [more] LOIS2014-16
pp.29-34
LOIS 2014-03-08
14:25
Okinawa   Risk Assessment of Information Leak in Twitter Use of Employee -- Tweet Experience and Consciousness about Business --
Yoshiaki Seki, Naoko Chiba (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-75
Companies are apprehensive about the information leak according to the handiness of Twitter. In this paper, we conduct W... [more] LOIS2013-75
pp.125-130
LOIS 2014-03-08
14:50
Okinawa   Risk Assessment of Information Leak in Twitter Use of Employee -- The Actual Situation and Effectiveness of Company's Measures for Employee Tweets --
Naoko Chiba, Yoshiaki Seki (NTT), Yoshiaki Hashimoto (Univ. of Tokyo) LOIS2013-76
The cases, such as the employees posting to Twitter about customer information of the celebrity and the unpublished info... [more] LOIS2013-76
pp.131-136
LOIS 2013-03-07
16:00
Okinawa   Investigation of Information Sharing System which tweets Behavior of Information Security
Satoshi Hara, Hiroki Miura (Univ. of Electro-Comm), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm) LOIS2012-85
 [more] LOIS2012-85
pp.95-100
LOIS 2013-03-07
16:20
Okinawa   Implementation of Information Sharing System which tweets Behavior of Information Security
Hiroki Miura, Satoshi Hara (Univ. of Electro-Comm.), Yoshiaki Seki (NTT), Hirohiko Suwa (Univ. of Electro-Comm.) LOIS2012-86
In this paper We implement Securitter that the information-sharing system
using Twitter which improves information sec... [more]
LOIS2012-86
pp.101-106
LOIS, IPSJ-CN, IPSJ-SPT 2012-05-18
16:40
Chiba Chiba Institute of Technology A Study of the Risk Management in Life Log Service
Shigeaki Tanimoto, Ken Takahashi (CIT), Yoshiaki Seki (NTT), Motoi Iwashita (CIT), Hiroyuki Sato (s.tanimoto@m.ieice.org), Atsushi Kanai (HOSEI University) LOIS2012-8
In recent years, Life Log Service treating action records, such as an individual search log and a data on shoppers' brow... [more] LOIS2012-8
pp.127-132
ISEC, LOIS 2011-11-15
10:55
Osaka Osaka Electro-Communication University A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] ISEC2011-52 LOIS2011-46
pp.123-128
LOIS 2011-03-04
09:10
Okinawa Ishigaki IT business support center A Consideration of Security Risk in Compromising Hash Function -- An Exposure of Vulnerability against Information Storage System --
Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] LOIS2010-81
pp.95-100
ISEC, LOIS 2010-11-18
09:00
Ibaraki Tsukuba Univ. Sample Investigation and the Consideration to Compromising Cryptosystems in SSL
Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) ISEC2010-59 LOIS2010-38
In the information society, the encryption technology is indispensable. The improvement of computer performance causes t... [more] ISEC2010-59 LOIS2010-38
pp.65-72
ISEC, LOIS 2010-11-18
09:30
Ibaraki Tsukuba Univ. A Proposal of a method to Check Cryptographic Algorithms in Security Protocols -- A Countermeasure against Compromising of Cryptosystems in SSL --
Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] ISEC2010-60 LOIS2010-39
pp.73-80
LOIS, IPSJ-CN 2008-05-23
13:20
Chiba Keyaki Bldg, Chiba University Consideration of management assistant in a research organization
Yoshiaki Seki (NTT) OIS2008-8
In organization, information sharing and knowledge accumulation show the substantial changes as ICT progresses. Especial... [more] OIS2008-8
pp.43-48
ISEC, LOIS 2006-11-16
13:25
Chiba Univ. of Tokyo(Kashiwa Campus) A study of Multi-Homing Group service Architecture -- A Consideration of inter-group collision control method --
Shigeaki Tanimoto, Yoshiaki Seki, Osamu Shionoiri, Atsushi Kanai (NTT)
 [more] ISEC2006-89 OIS2006-47
pp.7-12
LOIS 2006-05-19
10:00
Tokyo NTT Musashino R&D Center ID-linker: Towards remote control technique which uses RFID
Yoshiaki Seki (NTT)
As RFID tags spread, it is possible to identify one by one by using the RFID. We propose the technique by which the remo... [more] OIS2006-1
pp.1-6
LOIS 2006-05-19
17:00
Tokyo NTT Musashino R&D Center A Security Consideration in ID Information Sharing Service
Sakae Chikara, Yoshiaki Seki, Shin-ichi Nakahara, Tetsurou Yamazaki, Tatsuya Kushida, Ichizo Nakamura, Atsushi Kanai (NTT)
A variety of systems, such as material flow management system and security gate system, use Barcode, QR code and RFID, w... [more] OIS2006-9
pp.49-54
 Results 1 - 20 of 20  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan