IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 45  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, MICT, WBS, RCC
(Joint) [detail]
2024-05-16
17:20
Miyazaki KITEN Convention hall (Miyazaki)
(Primary: On-site, Secondary: Online)
Event-Triggered Control of Distributed Network Systems under DoS Attacks
Masaki Yanai, Koichi Kobayashi, Yuh Yamashita (Hokkaido Univ.) WBS2024-7 RCC2024-7
(To be available after the conference date) [more] WBS2024-7 RCC2024-7
pp.32-35
IN, IA
(Joint)
2022-12-13
16:15
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Investigation of a drop request protocol for defense against DRDoS attacks
Koji Sugiyama, Ken-ichi Baba (Kogakuin Univ.) IN2022-51
In recent years, the number of DDoS attacks have increased. One way of them is the DRDoS attack which uses non-malicious... [more] IN2022-51
pp.40-45
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
14:15
Online Online A Study for Predicting Correlation Power Analysis Results by Using High-SNR Plaintexts Selected Based on Linear Leakage Model
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18
To reduce the number of traces for evaluating side-channel attack (SCA) resistance, some methods for performing correlat... [more] ISEC2022-10 SITE2022-14 BioX2022-35 HWS2022-10 ICSS2022-18 EMM2022-18
pp.18-22
CCS, NLP 2022-06-09
13:00
Osaka
(Primary: On-site, Secondary: Online)
Conditional entropy based DDoS Attack detection in Software Defined Network
Tian QiWen, miyata sumiko (SIT) NLP2022-1 CCS2022-1
In order to detect each network attack in an SDN environment, an attack detection method has been proposed based on the ... [more] NLP2022-1 CCS2022-1
pp.1-6
VLD, HWS [detail] 2022-03-08
17:15
Online Online Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar
Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] VLD2021-105 HWS2021-82
pp.164-169
HWS, ICD [detail] 2021-10-19
10:50
Online Online Study on Fault Injection into Cryptographic Modules Using Continuous Sinusoidal Waves with Controlled Frequency, Amplitude and Phase
Hikaru Nishiyama, Daisuke Fujimoto, Youngwoo Kim, Yuichi Hayashi (NAIST) HWS2021-43 ICD2021-17
A fault injection attack based on an intentional electromagnetic interference (IEMI) using a continuous sinusoidal wave ... [more] HWS2021-43 ICD2021-17
pp.13-18
IA, ICSS 2021-06-21
13:30
Online Online secure isogeny-based cryptosystem CSIDH for side-channel attacks
Hayato Arai, Atusko Miyaji (Osaka Univ.) IA2021-2 ICSS2021-2
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IA2021-2 ICSS2021-2
pp.8-13
EMCJ 2021-04-16
15:00
Online Online Time-Frequency Domain Correlation Power Analysis for Side-Channel Attack Resistance Evaluation of Practical Modules
Masaki Himuro, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2021-5
When evaluating the Side-Channel Attack resistance of a practical module, the correlation coefficient, a measure of side... [more] EMCJ2021-5
pp.21-26
WBS, IT, ISEC 2021-03-04
11:20
Online Online An Attack on Search Ring-LWE Problem for Even Relative Degree
Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ) IT2020-122 ISEC2020-52 WBS2020-41
The Ring-LWE problem is used to construct homomorphic encryption and has attracted much attention because of its quantum... [more] IT2020-122 ISEC2020-52 WBS2020-41
pp.66-72
WBS, IT, ISEC 2021-03-04
11:45
Online Online Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IT2020-123 ISEC2020-53 WBS2020-42
pp.73-80
IN, NS
(Joint)
2021-03-05
09:30
Online Online A Study on Privacy Protection Leveraging Name Encryption with Multiple Encryption Keys
Toru Hasegawa, Shota Yamada, Yuki Koizumi (Osaka Univ.) IN2020-75
Information Centric Networking (ICN) is a promising Internet architecture wherein destinations are specified by data nam... [more] IN2020-75
pp.126-131
CQ, CBE
(Joint)
2021-01-22
10:10
Online Online Improvement Using White List and QoS Control for SYN Cookie Method
Riku Iwasaki, Shigetomo Kimura (Univ. of Tsukuba) CQ2020-93
In the SYN cookie method, when a system receives a TCP SYN packet, to protect against TCP SYN flood attacks in a statele... [more] CQ2020-93
pp.116-121
ICD, HWS [detail] 2020-10-26
11:20
Online Online Feasibility of lattice attacks on ECDSA
Kotaro Abe, Makoto Ikeda (Tokyo Univ.) HWS2020-30 ICD2020-19
ECDSA secret key is recovered via lattice attacks when only a few bits of nonce$(k)$ are leaked. In this paper, we evalu... [more] HWS2020-30 ICD2020-19
pp.30-35
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] 2020-07-21
16:35
Online Online Secure and Compact Elliptic Curve LR Scalar Multiplication
Yaoan Jin, Atsuko Miyaji (Osaka Univ) ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28
Elliptic curve cryptography (ECC) can ensure an equivalent security with much smaller key sizes. Elliptic curve scalar m... [more] ISEC2020-31 SITE2020-28 BioX2020-34 HWS2020-24 ICSS2020-18 EMM2020-28
pp.111-118
HWS, VLD 2019-03-02
14:20
Okinawa Okinawa Ken Seinen Kaikan Conditions for Successful Attacks on Ultrasonic Range Finder to Output Incorrect Values
Yuya Inoue, Hiroki Nohira, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matumoto (YNU) VLD2018-143 HWS2018-106
Discussion is made on the condition that an attacking device installed at a place not detected from the target ultrasoni... [more] VLD2018-143 HWS2018-106
pp.295-299
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2019-02-20
16:00
Hokkaido Hokkaido Univ. [Invited Talk] Anomaly Detection for Smart Home Based on User Behavior -- ICCE2019 Report --
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric)
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more]

SS, DC 2017-10-20
10:30
Kochi Kochi City Culture-plaza CUL-PORT Wormhole Attacks on Duty-Cycling Wireless Sensor Networks and Their Countermeasures
Wang Wen Yang, Takashi Minohara (Takushoku Univ.) SS2017-32 DC2017-31
Wireless sensor networks(WSN) which employ a large number of wireless
sensor nodes to monitor physical or environmenta... [more]
SS2017-32 DC2017-31
pp.67-72
IE, CS, IPSJ-AVM, ITE-BCT [detail] 2016-12-09
15:15
Ishikawa   Extension of Jigsaw Puzzle Solvers and Its Attack on Permutation-Based Image Encryption Schemes
Tatsuya Chuman, Kenta Kurihara, Sayaka Shiota, Hitoshi Kiya (Tokyo Metro. Univ.) CS2016-63 IE2016-99
Block-based scrambled image encryption schemes have superior features that are compressible and against noises to number... [more] CS2016-63 IE2016-99
pp.115-120
CPSY, DC, IPSJ-ARC
(Joint) [detail]
2016-08-09
12:15
Nagano Kissei-Bunka-Hall (Matsumoto) Formulating Attack Condition on Received Signal Strength Indicator based Device Authentication
Tatsuya Fujii, Takatsugu Ono, Haruichi Kanaya, Koji Inoue (Kyushu Univ.) CPSY2016-22 DC2016-19
Spoofing attack in wireless communications is a critical issue, in which a malicious transmitter attempts to pretend to ... [more] CPSY2016-22 DC2016-19
pp.139-146(CPSY), pp.15-22(DC)
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University A Suspicious Processes Detection Scheme using Process Frequency and Network State
Junji Nakazato, Yu Tsuda, Eto Masashi, Daisuke Inoue, Koji Nakao (NICT) ICSS2015-60
Many serious security incidents caused by the targeted attacks have been occurred. The targeted attacks can not be preve... [more] ICSS2015-60
pp.77-82
 Results 1 - 20 of 45  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan