IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 23  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, IA
(Joint)
2021-12-16
17:05
Hiroshima Higashi-Senda campus, Hiroshima Univ.
(Primary: On-site, Secondary: Online)
Evaluation of Processing Delay of Authentication and Authorization Infrastructure for IoT Data Distribution System Using Ticket-based Access Control
Masaki Yoshii, Ryohei Banno, Osamu Mizuno (Kogakuin Univ.) IA2021-39
We have proposed a new service model based on IoT data distribution using fog computing. It is expected that fog nodes i... [more] IA2021-39
pp.44-49
ICTSSL, IEE-SMF, IN 2021-10-21
09:50
Online Online Proposal and Evaluation of Cryptographic Communication Method that Separates Components Related to Coding and Decoding in IoT Environment
Reita Suzuki (Niigata Univ.), Takafumi Hayashi (Nihon Univ.), Keisuke Nakano (Niigata Univ.) ICTSSL2021-20
MQTT is one of the lightweight messaging protocols currently used in the IoT environment, but there is no clear rule reg... [more] ICTSSL2021-20
pp.12-17
SITE, ISEC, LOIS 2018-11-04
10:00
Fukuoka   Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] ISEC2018-72 SITE2018-50 LOIS2018-32
pp.45-50
IA 2018-10-12
17:05
Tokyo Takeda Hall, Tokyo Univ. (No. 88) On an Experiment of a Shared Wide Area Access Network Infrastructure for Japanese Universities regarding Work Style Reforms
Motoyuki Ohmori (Tottori Univ.), Koji Okamura (Kyushu Univ.) IA2018-35
Japanese government has been trying to reform work style in Japan. One of work style reforms is flexible work style like... [more] IA2018-35
pp.17-19
SWIM 2018-05-19
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. A proposal of peer 2 peer economic activity platform
Nobuhiro Kataoka (IL), Akira Horimai (Figio), Masahiko Kubota (MIND), Kenji Saotome (Housei Univ.), Shoei Komatsu (APSOM) SWIM2018-3
Advances in digital infrastructure have brought about major changes in economic activity. Individuals can carry out econ... [more] SWIM2018-3
pp.9-13
BioX 2016-08-19
11:20
Miyagi   A Study on Convenient Key Update for Public Biometrics Infrastructure
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi (Hitachi) BioX2016-15
Network society and e-government services are advanced, and the importance of personal authentication infrastructure inc... [more] BioX2016-15
pp.45-50
IN, IA
(Joint)
2015-12-18
13:20
Hiroshima Hiroshima City University Using a Multi-domain Authentication and Authorization Infrastructure Yamata-no-Orochi in a Distributed Storage System Content Espresso
Kei Mikami, Daisuke Ando, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IN2015-88
Currently, every internet service has its own authentication and authorization mechanism, and ev- ery service domain man... [more] IN2015-88
pp.101-106
IN, NV
(Joint)
2014-07-18
09:45
Hokkaido Hokkaido Univ. Proposal on office network setting method using SDN and authentication infrastructure
Yoshinao Kikuchi, Yuji Agawa (NTT) IN2014-40
This paper proposes an office network setting method which based on SDN (Software Defined Network) and authentication in... [more] IN2014-40
pp.61-66
IA 2012-10-19
14:30
Overseas Phuket Design and Implementation of File Authentication System using Timestamp Mechanism for a Distributed File System
Tetsuya Ogaki (Univ. of Electro-Comm./NICT), Hidenobu Watanabe, Tsukasa Iwama, Mitsue Den, Ken T. Murata (NICT) IA2012-47
Gfarm, a distributed file system for a petabyte scale data intensive computing or a shared storage for big data, is grad... [more] IA2012-47
pp.79-84
ICSS, IA 2012-06-21
14:55
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University A Proposal of a Functional Extension Framework for Authn & Authz Federation Infrastructure using Web Browser Add-on
Toyokazu Akiyama (Kyoto Sangyo Univ.), Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura (NII) IA2012-3 ICSS2012-3
We have constructed an academic authn \& authz infrastructure by
using Web single sign-on in a community, named GakuNin... [more]
IA2012-3 ICSS2012-3
pp.13-18
ITS, WBS
(Joint)
2011-12-15
13:50
Nagasaki   Online/offline Authentication Protocol in Car to Car/Infrastructure Communication Systems
Eriko Ando, Hisayoshi Sato, Yasuko Fukuzawa (Hitachi) ITS2011-22
Services such as sending a pre-crash sensing warning and traffic condition warning are expected to be provided in car-to... [more] ITS2011-22
pp.13-18
IA 2011-11-29
09:25
Hokkaido Greenpia Onuma (Hakodate) Development of Authentication Infrastructure for Tokai Academic Cloud Using Shibboleth and CAS
Shoji Kajita (Kyoto Univ.), Shoichi Saito (Nagoya Inst. of Tech.), Masatoshi Tsuchiya (Toyohashi Univ. of Tech.), Daisuke Yamamoto (Nagoya Inst. of Tech.), Tsunehiko Suzuki (Chukyo Univ.), Yukiko Yamaguchi (Nagoya Univ.), Takahiro Hasegawa (Shizuoka Univ.), Akiumi Hasegawa (Chukyo Univ.), Akiji Tanaka, Yuichi Uchida (Gifu Univ.), Ichiro Mitsuhashi, Yoshimasa Ohta (Mie Univ.), Hiroki Takakura (Nagoya Univ.), Hiroshi Matsuo (Nagoya Inst. of Tech.) IA2011-44
This paper describes the current status of Authentication Infrastructure for Tokai Academic Cloud. Currently we have bee... [more] IA2011-44
pp.49-53
ICSS 2011-03-25
13:50
Tokyo Suspended Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-61
The development of today's wireless technology with its sophisticated devices and applications has attracted many users ... [more] ICSS2010-61
pp.29-34
IA 2009-11-25
14:55
Saga Saga-Ken Design and implementation of Single Sign-On Authentication in Large-scale Campus Network
Takatoshi Fujimura, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) IA2009-60
Abstract Network services depend on Web browsers has been growing, however, the increase of the authentication situation... [more] IA2009-60
pp.13-18
IA, SITE 2009-03-05
17:20
Kumamoto   Development of "Opengate-PKI" Network User Authentication System with PKI
Suguru Fujisawa, Makoto Otani, Kenzi Watanabe (Saga University) SITE2008-69 IA2008-92
PKI(Public Key Infrastructure) provides security service on network, for example encryption of data, guarantee of data i... [more] SITE2008-69 IA2008-92
pp.149-154
IA, SITE 2009-03-06
09:30
Kumamoto   Single Sign-On with Opengate
Hirofumi Eto, Makoto Otani, Kenzi Watanabe, Shin-ichi Tadaki (Saga Univ.) SITE2008-88 IA2008-111
Information systems in a university need inter-cooperation mechanisms and their portal sites.
This requires single-sign... [more]
SITE2008-88 IA2008-111
pp.259-264
IA 2009-01-29
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. Investigation of Lifelong Information Services Using Lifelong User ID in Higher Educational Institutions
Shoji Kajita, Yoshihiro Ohta, Yoshinori Tajima, Hisanori Tajima, Yasushi Hirano, Hisashi Naito, Kenji Mase (Nagoya Univ.) IA2008-62
Nagoya University ID is a lifelong User ID issued by Information
Communication Technology Services, instead of Univer... [more]
IA2008-62
pp.83-88
ICM 2008-05-08
16:00
Kagoshima Kagoshima Public Access Center Construction and Management of Unified-Server in Nagoya University
Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more]
ICM2008-9
pp.47-52
ITE-HI, ITE-AIT, ITE-ME, IE, ITS 2008-02-18
15:45
Hokkaido Graduate School of Information Science and Technology Hokkaido Univ A Study on User Authentication Infrastructure for Telematics
Katsuyuki Umezawa, Seiichi Susaki, Masamori Kashiyama (Hitachi, Ltd) ITS2007-58 IE2007-241
Recently, the number of those who use the car by the rental, the lease, and the car sharing has increased. When a telema... [more] ITS2007-58 IE2007-241
pp.133-138
IA 2007-05-30
11:00
Tokyo National Institute of Informatics [Invited Talk] The Construction of Campus-wide IT Authentication Infrastructure -- Installation Examples and Issues in Osaka University --
Toyokazu Akiyama, Yuuichi Teranishi, Shingo Okamura, Eisaku Sakane, Go Hasegawa, Ken-ichi Baba, Hirotaka Nakano, Shinji Shimojo (Osaka Univ.) IA2007-9
In Osaka University, since many academic affairs systems are going to become online, we have upgraded campus-wide IT aut... [more] IA2007-9
pp.47-52
 Results 1 - 20 of 23  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan