Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SITE, LOIS, ISEC |
2024-11-14 13:10 |
Fukuoka |
|
BSIwRBA:Blockchain Service Infrastructure with Remote Biometric Authentication Toshiaki Saisho (AITC) ISEC2024-67 SITE2024-64 LOIS2024-31 |
While anonymity of users is important for safe and secure activities in cyber society, the identifiability and trackabil... [more] |
ISEC2024-67 SITE2024-64 LOIS2024-31 pp.29-36 |
SITE, LOIS, ISEC |
2024-11-15 11:15 |
Fukuoka |
|
A One-Time Password Authentication Scheme for IoT Environments Koki Mizoguchi, Akihiro Shimizu (KUT) ISEC2024-79 SITE2024-76 LOIS2024-43 |
Ensuring security in IoT environments is becoming increasingly important. The core of security technology is cryptograph... [more] |
ISEC2024-79 SITE2024-76 LOIS2024-43 pp.112-117 |
SITE, LOIS, ISEC |
2024-11-15 14:55 |
Fukuoka |
|
Practical Application of Case-based Learning on Public Key Authentication in General Information Education Daisuke Suzuki (Hokuriku Univ.) ISEC2024-84 SITE2024-81 LOIS2024-48 |
The purpose of this research is to verify whether incorporating a real-world example of public key authentication into a... [more] |
ISEC2024-84 SITE2024-81 LOIS2024-48 pp.144-147 |
BioX |
2024-10-31 15:10 |
Okinawa |
Miraisozo Center (Miyako) |
Understanding the contribution of handedness on distinguishing operators of a dual-arm robot Maharage Nisansala Sevwandi Perera, Franziska Zimmer (UTokyo), Tsugumi Sato (NiTech), Roberta Tamponi, Ryosuke Kobayashi, Mhd Irvan, Rie Shigetomi Yamaguchi (UTokyo), Yoshihiro Tanaka (NiTech) BioX2024-77 |
Avatar robotic systems enable remote human control for tasks, potentially becoming widespread in public spaces. Trust be... [more] |
BioX2024-77 pp.31-36 |
BioX |
2024-10-31 17:00 |
Okinawa |
Miraisozo Center (Miyako) |
[Short Paper]
An experimental study on interchangeability between swipe and flick authentication for continuous authentication on smartphones Hiromichi Yoshii, Yasushi Yamazaki (The Univ. of Kitakyushu) BioX2024-81 |
While many authentication schemes based on flick or swipe traits from smartphone touchscreens have been proposed, there ... [more] |
BioX2024-81 pp.53-58 |
BioX |
2024-11-01 09:20 |
Okinawa |
Miraisozo Center (Miyako) |
Consistent Team, Consistent Data: Authenticating Esports Players Through In-Game Behavioral Data and Game-State Analysis with Uniform Team Composition Franziska Zimmer, Mhd Irvan, Roberta Tamponi, Maharage Nisansala Sevwandi Perera, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi (The University of Tokyo) BioX2024-83 |
In esports, teamwork is crucial for winning, with each player performing specific roles. However, can a player be unique... [more] |
BioX2024-83 pp.65-70 |
BioX |
2024-11-01 10:30 |
Okinawa |
Miraisozo Center (Miyako) |
A Study on the Evaluation Dataset using Synthetic Images : Part1 Heterogene-ous Illumination Yumo Ouchi, Hidetsugu Uchida, Hajime Nada, Chiaki Kawase (Fujitsu), Shigefumi Yamada (JAISA) BioX2024-85 |
In biometric authentication, we can evaluate the generalization performance of a authentication model by using heterogen... [more] |
BioX2024-85 pp.77-80 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 13:50 |
Hokkaido |
Sapporo Convention Center |
The OU-ISIR continuous authentication database comprising face and speech biometrics Xiang Li, Chi Xu, Yasushi Yagi (Osaka Univ.) ISEC2024-14 SITE2024-11 BioX2024-24 HWS2024-14 ICSS2024-18 EMM2024-20 |
Unlike conventional login authentication which only verifies users’ identity once at the beginning of a system session, ... [more] |
ISEC2024-14 SITE2024-11 BioX2024-24 HWS2024-14 ICSS2024-18 EMM2024-20 pp.38-43 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 16:40 |
Hokkaido |
Sapporo Convention Center |
Illegal login detection using eye movements when entering authentication codes Sachi Fujimoto, Chisa Takano, Masaki Inamura (HCU) ISEC2024-34 SITE2024-31 BioX2024-44 HWS2024-34 ICSS2024-38 EMM2024-40 |
With the expansion of Internet-based services, many people now have their own accounts to use these services. In this si... [more] |
ISEC2024-34 SITE2024-31 BioX2024-44 HWS2024-34 ICSS2024-38 EMM2024-40 pp.170-175 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:05 |
Hokkaido |
Sapporo Convention Center |
Flick input PIN code authentication combined blink and gaze manipulation Moritomo Nara, Bo Wu, Kiminori Sato (TUT) ISEC2024-35 SITE2024-32 BioX2024-45 HWS2024-35 ICSS2024-39 EMM2024-41 |
In this paper, we propose a flick-in PIN code authentication system that combines eye-blink and gaze manipulation.
The ... [more] |
ISEC2024-35 SITE2024-32 BioX2024-45 HWS2024-35 ICSS2024-39 EMM2024-41 pp.176-181 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 17:30 |
Hokkaido |
Sapporo Convention Center |
Security Analysis of a Contactless Dial Lock Authentication System Kaiya Yokokura, Bo Wu, Kiminori Sato (TUT) ISEC2024-36 SITE2024-33 BioX2024-46 HWS2024-36 ICSS2024-40 EMM2024-42 |
Currently, knowledge-based authentication methods such as PIN codes, passwords, and patterns are widely used in many asp... [more] |
ISEC2024-36 SITE2024-33 BioX2024-46 HWS2024-36 ICSS2024-40 EMM2024-42 pp.182-187 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 09:40 |
Hokkaido |
Sapporo Convention Center |
Security Analysis on the Authentication Process Using Bluetooth Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ISEC2024-47 SITE2024-44 BioX2024-57 HWS2024-47 ICSS2024-51 EMM2024-53 |
Sinumy Corporation has developed a personal authentication process using Bluetooth, which employs a unique authenticatio... [more] |
ISEC2024-47 SITE2024-44 BioX2024-57 HWS2024-47 ICSS2024-51 EMM2024-53 pp.255-260 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 15:15 |
Hokkaido |
Sapporo Convention Center |
An Experimental Study on Radio Frequency Fingerprinting-based Authentication in IEEE 802.11g Zhen Jia, Zewei Guo (FUN), Wenhao Huang (Keio Univ.), Yin Chen (Reitaku Univ.), Jinxiao Zhu (TDU), Xiaohong Jiang (FUN) ISEC2024-60 SITE2024-57 BioX2024-70 HWS2024-60 ICSS2024-64 EMM2024-66 |
Radio frequency (RF) fingerprinting is a promising technique that utilizes unique hardware imperfections to authenticate... [more] |
ISEC2024-60 SITE2024-57 BioX2024-70 HWS2024-60 ICSS2024-64 EMM2024-66 pp.344-349 |
RCC, RCS, SeMI, NS, SR, RISING (Joint) |
2024-07-18 11:15 |
Hokkaido |
Hokkaido Citizens Activities Promotion Center (Primary: On-site, Secondary: Online) |
Initial Design and Evaluation of Interoperation Method between CYPHONIC and Other Services Kazuki Miyamura, Yoshiya Suzuki, Guilherme Seidy Ujiie, KatsuHiro Naito (AIT), Hidekazu Suzuki (Meijo Univ.) SeMI2024-26 |
The authors have proposed CYber PHysical Overlay Network over Internet Communication (CYPHONIC) as a communication proto... [more] |
SeMI2024-26 pp.69-74 |
IMQ, HIP |
2024-07-12 15:00 |
Hokkaido |
Satellite Campus, Sapporo City University |
Examination of Feature Extraction in Keystroke Dynamics Using Hand Finger Shapes during Keyboard Input Hitoshi Saito, Kazuhiro Notomi (KAIT) IMQ2024-5 HIP2024-36 |
The keyboard is the most widespread human interface. If the features of keyboard operation can be used for identificatio... [more] |
IMQ2024-5 HIP2024-36 pp.13-18 |
ITE-ME, ITE-IST, BioX, SIP, MI, IE [detail] |
2024-06-07 11:20 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Development of a Gait Authentication Method Robust to Differences in Clothing Using 2D Pose Estimation Shuji Awai, Takahiro Yoshioka, Takeshi Konno (Fujitsu), Daisuke Imoto, Masakatsu Honma (National Research Institute of Police Science) SIP2024-9 BioX2024-9 IE2024-9 MI2024-9 |
In this study, we developed a gait authentication method robust to clothing differences. Existing gait recognition metho... [more] |
SIP2024-9 BioX2024-9 IE2024-9 MI2024-9 pp.46-49 |
ICD |
2024-04-11 10:45 |
Kanagawa |
(Primary: On-site, Secondary: Online) |
[Invited Lecture]
An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) ICD2024-2 |
Strong physically unclonable function (Strong PUF) is a hardware-security circuit that generates response outputs corres... [more] |
ICD2024-2 p.7 |
ICSS, IPSJ-SPT |
2024-03-21 16:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
One Million Routers Under Control: Vulnerabilities in IoT Devices with DDNS Service Kanta Okugawa (Ritsumei/NICT), Yoshiki Mori, Masaki Kubo, Takahiro Kasama (NICT), Koichi Mouri (Ritsumei), Daisuke Inoue (NICT) ICSS2023-78 |
IoT devices such as routers and webcams have dynamic DNS (DDNS) functions as one of the methods to remotely manage devic... [more] |
ICSS2023-78 pp.63-70 |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Proxy Re-Authentication Capable of Key and Data Compression Yoshiro Matsuoka, Sohto Chiku (YNU), Keisuke Hara (AIST/YNU), Junji Shikata (YNU) IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 |
In this paper, we propose a new cryptographic protocol called proxy re-authentication capable of key and data compressio... [more] |
IT2023-83 ISEC2023-82 WBS2023-71 RCC2023-65 pp.52-59 |
CNR, BioX |
2024-02-29 13:30 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Design of Aerial dialing PIN code input authentication system using deep learning hand shape authentication Jun Wang, Bo Wu, Kiminori Sato (TUT) BioX2023-70 CNR2023-37 |
With the continuous development of modern technology, the demand for contactless authentication is increasing, and a sim... [more] |
BioX2023-70 CNR2023-37 pp.1-6 |