IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 39  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
13:50
Online Online Randomness evaluation of TERO-based TRNG with a side-channel attack countermeasure
Saki Osuka (AIST), Daisuke Fujimoto, Yuichi Hayashi (NAIST), Shinichi Kawamura (AIST) ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17
True random number generators (TRNGs) based on ring oscillators (ROs) are employed in many devices because they can be c... [more] ISEC2022-9 SITE2022-13 BioX2022-34 HWS2022-9 ICSS2022-17 EMM2022-17
pp.13-17
IT, ISEC, RCC, WBS 2022-03-11
14:30
Online Online Implementation and Performance Evaluation of Rocca
Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102
pp.256-261
CQ, IMQ, MVE, IE
(Joint) [detail]
2022-03-11
15:40
Online Online (Zoom) Evaluation of the sense of security by focusing on frontal EEG beta frequency band on experiencing VR traffic environment
Sho Ohnishi, Hidehiko Shishido, Yoshinari Kameda (U-Tsukuba) IMQ2021-63 IE2021-125 MVE2021-92
The road must be safe and secure for pedestrians to use. Therefore, it is desirable to evaluate the road environment qua... [more] IMQ2021-63 IE2021-125 MVE2021-92
pp.278-283
RCS, SR, SRW
(Joint)
2021-03-03
10:35
Online Online Context-Based MEC Platform for Augmented-Reality Services in 5G Networks
Yue Wang, Tao Yu, Kei Sakaguchi (Tokyo Tech) RCS2020-211
Augmented reality (AR) has drawn great attention in recent years. However, current AR implementations have drawbacks, e.... [more] RCS2020-211
pp.49-54
ISEC, SITE, LOIS 2019-11-02
14:20
Osaka Osaka Univ. Proposal of a Password Storage Method for Network Login -- Using an External Storage Device for Screenshots --
Jun Tsuchiya, Yoshiaki Seki (Tokyo City Univ.) ISEC2019-82 SITE2019-76 LOIS2019-41
Password authentication is a typical memory authentication method. In order to maintain the strength of the password, us... [more] ISEC2019-82 SITE2019-76 LOIS2019-41
pp.127-132
HWS, VLD 2019-03-01
14:55
Okinawa Okinawa Ken Seinen Kaikan Performance and Security Evaluation of Ring Oscillator PUF Implemented on ASIC
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-131 HWS2018-94
This study evaluates the performance and the security of ring oscillator physical unclonable function (RO PUF) implement... [more] VLD2018-131 HWS2018-94
pp.225-230
HWS, VLD 2019-03-02
13:30
Okinawa Okinawa Ken Seinen Kaikan An Instrumentation Security Metric for ToF Depth-Image Cameras
Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) VLD2018-141 HWS2018-104
We are constructing a system for evaluating instrumentation security of ToF Depth-Image Cameras based on pulse-light spo... [more] VLD2018-141 HWS2018-104
pp.283-288
ISEC 2018-09-07
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Development of Portable Automotive Security Testbed with Adaptability: PASTA
Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] ISEC2018-51
pp.7-14
SS, MSS 2018-01-19
10:15
Hiroshima   On Modeling of Infection Phenomenon and Evaluation of Countermeasure for IoT Malware Mirai by Agent-Oriented Petri Net PN2
Shingo Yamaguchi, Hiroaki Tanaka (Yamaguchi Univ.) MSS2017-63 SS2017-50
In September 2016, an unprecedented massive DDoS attack was launched by IoT devices. This attack was caused by a new typ... [more] MSS2017-63 SS2017-50
pp.91-95
ISEC 2017-05-12
12:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] How to circumvent the two-ciphertext lower bound for linear gabling schemes -- from ASIACRYPT 2016 --
Ryo Kikuchi (NTT) ISEC2017-5
At EUROCRYPT 2015, Zahur et al. argued that all linear, and thus, efficient, garbling schemes need at least two $k$-bit ... [more] ISEC2017-5
p.25
DC 2016-12-16
15:05
Yamagata Sakata Sogo-Bunka Center(Sakata-City) An Evaluation Measures for Contact Avoidance in Delay Tolerant Networks
Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) DC2016-69
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connec-tivity. The idea of co... [more] DC2016-69
pp.27-30
ISEC 2016-09-02
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. Implementation of security evaluation function on a Development Environment of Cryptography using GUI
Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) ISEC2016-46
Security evaluation on cryptography and cryptography development
are two sides of the same coin.
Security evaluation... [more]
ISEC2016-46
pp.49-56
SWIM 2016-08-26
15:25
Tokyo   A Proposal for Trust-ability Evaluation Model of Information Systems
Yohtaro Miyanishi (ISEM, Inc.), Shinji Kitagami (Waseda Univ.), Tadashi Ogino (Meisei Univ.), Funiaki Sato (Toho Univ), Yoriyoshi Urano, Norio Shiratori (Waseda Univ.) SWIM2016-9
Abstract: Recently, it became usual style to use external information systems even for business use system, due to spre... [more] SWIM2016-9
pp.15-22
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
11:30
Aichi NAGOYA TRADE & INDUSTRY CENTER Information Security in National Identification Number called My Number in Japan
Takeshi Niiyama, Toshiro Kita (Doshisha Univ.) ISEC2015-12 SITE2015-10 ICSS2015-22 EMM2015-20
National Identification Number called "My Number" was passed by the House of Councilors on May 24th 2013. It will be eff... [more] ISEC2015-12 SITE2015-10 ICSS2015-22 EMM2015-20
pp.23-30
BioX, ITE-ME, ITE-IST 2015-06-29
14:00
Ishikawa Kanazawa University, Kakuma Campus Security Evaluation for Leakage of a Fingerprint Image from USB-Based Fingerprint Authentication Systems
Daigo Sato, Takeshi Okamoto, Naoto Umehara (KAIT) BioX2015-6
The growing availability of fingerprint authentication systems has resulted in a drop in their price, and their increase... [more] BioX2015-6
pp.39-44
BioX, ITE-ME, ITE-IST 2015-06-30
10:30
Ishikawa Kanazawa University, Kakuma Campus Performance estimation based on artifact species
Tetsushi Ohki, Akira Otsuka (AIST) BioX2015-10
Technology evaluation of biometric authentication systems is widely conducted based on public biometric databases especi... [more] BioX2015-10
pp.73-78
ISEC, IT, WBS 2015-03-03
13:15
Fukuoka The University of Kitakyushu [Invited Talk] Fast and Secure Implementation of Cryptography and its Practical Application
Shinichi Kawamura (Toshiba) IT2014-99 ISEC2014-112 WBS2014-91
The author will talk about his past research on implementation of cryptography. For the practical use of cryptography, i... [more] IT2014-99 ISEC2014-112 WBS2014-91
pp.231-238
R 2014-08-01
15:20
Hokkaido Smile Hotel Hakodate A Study on Evaluation Measures for Performance, Availability and Consistency in Distributed Replication
Satoshi Fukumoto, Ippei Kanda (Tokyo Metropolitan Univ.), Masayuki Arai (Nihon Univ.) R2014-18
While data replication is the promised technique which improves ``performance'' and/or ``availability,'' other propertie... [more] R2014-18
pp.25-30
EMM 2013-05-25
11:10
Kochi Kochijyo Hall [Tutorial Lecture] Basics of audio engineering in studies on Enriched Multimedia -- From hiding toward enrichment --
Akira Nishimura (Tokyo Univ. of Information Sciences) EMM2013-12
194 papers have been published in two years from establishment of
EMM research committee. 47 papers concerned with so... [more]
EMM2013-12
pp.67-72
SSS 2012-11-22
15:40
Tokyo   Proposal of the data evaluation platform which can measure marketing value and security level
Hidenobu Oguri, Kunio Matsui (NIFTY) SSS2012-20
Although the market of big data analysis is expanded in recent years, there are small entry of companies. In fact many c... [more] SSS2012-20
pp.17-20
 Results 1 - 20 of 39  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan