Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 13:50 |
Online |
Online |
Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST) ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17 |
True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be c... [more] |
ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17 pp.13-17 |
IT, ISEC, RCC, WBS |
2022-03-11 14:30 |
Online |
Online |
Implementation and Performance Evaluation of Rocca Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 |
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] |
IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 pp.256-261 |
CQ, IMQ, MVE, IE (Joint) [detail] |
2022-03-11 15:40 |
Online |
Online (Zoom) |
Evaluation of the sense of security by focusing on frontal EEG beta frequency band on experiencing VR traffic environment Sho Ohnishi, Hidehiko Shishido, Yoshinari Kameda (U-Tsukuba) IMQ2021-63 IE2021-125 MVE2021-92 |
The road must be safe and secure for pedestrians to use. Therefore, it is desirable to evaluate the road environment qua... [more] |
IMQ2021-63 IE2021-125 MVE2021-92 pp.278-283 |
RCS, SR, SRW (Joint) |
2021-03-03 10:35 |
Online |
Online |
Context-Based MEC Platform for Augmented-Reality Services in 5G Networks Yue Wang, Tao Yu, Kei Sakaguchi (Tokyo Tech) RCS2020-211 |
Augmented reality (AR) has drawn great attention in recent years. However, current AR implementations have drawbacks, e.... [more] |
RCS2020-211 pp.49-54 |
ISEC, SITE, LOIS |
2019-11-02 14:20 |
Osaka |
Osaka Univ. |
Proposal of a Password Storage Method for Network Login
-- Using an External Storage Device for Screenshots -- Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41 |
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] |
ISEC2019-82 SITE2019-76 LOIS2019-41 pp.127-132 |
HWS, VLD |
2019-03-01 14:55 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94 |
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] |
VLD2018-131 HWS2018-94 pp.225-230 |
HWS, VLD |
2019-03-02 13:30 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Instrumentation Security Metric for ToF Depth-Image Cameras Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) VLD2018-141 HWS2018-104 |
We are constructing a system for evaluating instrumentation security of ToF Depth-Image Cameras based on pulse-light spo... [more] |
VLD2018-141 HWS2018-104 pp.283-288 |
ISEC |
2018-09-07 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development of Portable Automotive Security Testbed with Adaptability: PASTA Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51 |
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] |
ISEC2018-51 pp.7-14 |
SS, MSS |
2018-01-19 10:15 |
Hiroshima |
|
On Modeling of Infection Phenomenon and Evaluation of Countermeasure for IoT Malware Mirai by Agent-Oriented Petri Net PN2 Shingo Yamaguchi, Hiroaki Tanaka (Yamaguchi Univ.) MSS2017-63 SS2017-50 |
In September 2016, an unprecedented massive DDoS attack was launched by IoT devices. This attack was caused by a new typ... [more] |
MSS2017-63 SS2017-50 pp.91-95 |
ISEC |
2017-05-12 12:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
How to circumvent the two-ciphertext lower bound for linear gabling schemes
-- from ASIACRYPT 2016 -- Ryo Kikuchi (NTT) ISEC2017-5 |
At EUROCRYPT 2015, Zahur et al. argued that all linear, and thus, efficient, garbling schemes need at least two $k$-bit ... [more] |
ISEC2017-5 p.25 |
DC |
2016-12-16 15:05 |
Yamagata |
Sakata Sogo-Bunka Center(Sakata-City) |
An Evaluation Measures for Contact Avoidance in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) DC2016-69 |
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connec-tivity. The idea of co... [more] |
DC2016-69 pp.27-30 |
ISEC |
2016-09-02 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Implementation of security evaluation function on a Development Environment of Cryptography using GUI Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) ISEC2016-46 |
Security evaluation on cryptography and cryptography development
are two sides of the same coin.
Security evaluation... [more] |
ISEC2016-46 pp.49-56 |
SWIM |
2016-08-26 15:25 |
Tokyo |
|
A Proposal for Trust-ability Evaluation Model of Information Systems Yohtaro Miyanishi (ISEM, Inc.), Shinji Kitagami (Waseda Univ.), Tadashi Ogino (Meisei Univ.), Funiaki Sato (Toho Univ), Yoriyoshi Urano, Norio Shiratori (Waseda Univ.) SWIM2016-9 |
Abstract: Recently, it became usual style to use external information systems even for business use system, due to spre... [more] |
SWIM2016-9 pp.15-22 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 11:30 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Information Security in National Identification Number called My Number in Japan Takeshi Niiyama, Toshiro Kita (Doshisha Univ.) ISEC2015-12 SITE2015-10 ICSS2015-22 EMM2015-20 |
National Identification Number called "My Number" was passed by the House of Councilors on May 24th 2013. It will be eff... [more] |
ISEC2015-12 SITE2015-10 ICSS2015-22 EMM2015-20 pp.23-30 |
BioX, ITE-ME, ITE-IST |
2015-06-29 14:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Security Evaluation for Leakage of a Fingerprint Image from USB-Based Fingerprint Authentication Systems Daigo Sato, Takeshi Okamoto, Naoto Umehara (KAIT) BioX2015-6 |
The growing availability of fingerprint authentication systems has resulted in a drop in their price, and their increase... [more] |
BioX2015-6 pp.39-44 |
BioX, ITE-ME, ITE-IST |
2015-06-30 10:30 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Performance estimation based on artifact species Tetsushi Ohki, Akira Otsuka (AIST) BioX2015-10 |
Technology evaluation of biometric authentication systems is widely conducted based on public biometric databases especi... [more] |
BioX2015-10 pp.73-78 |
ISEC, IT, WBS |
2015-03-03 13:15 |
Fukuoka |
The University of Kitakyushu |
[Invited Talk]
Fast and Secure Implementation of Cryptography and its Practical Application Shinichi Kawamura (Toshiba) IT2014-99 ISEC2014-112 WBS2014-91 |
The author will talk about his past research on implementation of cryptography. For the practical use of cryptography, i... [more] |
IT2014-99 ISEC2014-112 WBS2014-91 pp.231-238 |
R |
2014-08-01 15:20 |
Hokkaido |
Smile Hotel Hakodate |
A Study on Evaluation Measures for Performance, Availability and Consistency in Distributed Replication Satoshi Fukumoto, Ippei Kanda (Tokyo Metropolitan Univ.), Masayuki Arai (Nihon Univ.) R2014-18 |
While data replication is the promised technique which improves ``performance'' and/or ``availability,'' other propertie... [more] |
R2014-18 pp.25-30 |
EMM |
2013-05-25 11:10 |
Kochi |
Kochijyo Hall |
[Tutorial Lecture]
Basics of audio engineering in studies on Enriched Multimedia
-- From hiding toward enrichment -- Akira Nishimura (Tokyo Univ. of Information Sciences) EMM2013-12 |
194 papers have been published in two years from establishment of
EMM research committee. 47 papers concerned with so... [more] |
EMM2013-12 pp.67-72 |
SSS |
2012-11-22 15:40 |
Tokyo |
|
Proposal of the data evaluation platform which can measure marketing value and security level Hidenobu Oguri, Kunio Matsui (NIFTY) SSS2012-20 |
Although the market of big data analysis is expanded in recent years, there are small entry of companies. In fact many c... [more] |
SSS2012-20 pp.17-20 |