Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 11:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Is Copying for Information Security Research ‘Fair Use’?
-- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) -- Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 |
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] |
ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49 pp.229-231 |
MSS, CAS, SIP, VLD |
2023-07-06 13:00 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
[Panel Discussion]
Democratization of Researches in Circuits and Systems fields and Initiatives in Technical Groups Makoto Ikeda (The Univ. of Tokyo), Yasutoshi Aibara (OVT), Shigetoshi Nakatake (The Univ. of Kitakyushu), Takayuki Nakachi (Univ. of Ryukyus), Shingo Yamaguchi (Yamaguchi Univ.) CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 |
Open Access initiatives, which allow access and use of research results funded by public research funds not only by the ... [more] |
CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7 pp.34-36 |
RCC, ISEC, IT, WBS |
2023-03-14 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Secure communication based on high precision space-time synchronization Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 |
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] |
IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80 pp.97-102 |
ICSS, IPSJ-SPT |
2023-03-13 14:40 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2022-53 |
In recent years, network-based intrusion detection systems (NIDS), which are systems for detecting unauthorized access o... [more] |
ICSS2022-53 pp.31-36 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2022-68 pp.121-126 |
EA, EMM, ASJ-H |
2022-11-22 13:00 |
Online |
Online |
[Fellow Memorial Lecture]
Security and Privacy Preservation for Speech Signal
-- Approach from speech information hiding technology -- Masashi Unoki (JAIST) EA2022-60 EMM2022-60 |
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] |
EA2022-60 EMM2022-60 pp.99-104 |
ISEC, SITE, LOIS |
2022-11-18 09:25 |
Online |
Online |
Analysis of EU Cyber Resilience Act
-- from a Perspective of Cyber Supply Chain Security -- Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16 |
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] |
ISEC2022-32 SITE2022-36 LOIS2022-16 pp.16-19 |
AP, SANE, SAT (Joint) |
2022-07-29 11:15 |
Hokkaido |
Asahikawa Taisetsu Crystal Hall (Primary: On-site, Secondary: Online) |
Evaluation of Secure Transmission Performance of Spatially-Selective Modulation in an Indoor Environment Hitoro Yonawa, Yuka Morishima, Hisato Iwai, Shinsuke Ibi (Doshisha Univ.) AP2022-57 |
As a physical layer security technique, we have proposed spatially-selective modulation (SSM) which consists of multiple... [more] |
AP2022-57 pp.129-134 |
RCS |
2022-06-17 15:20 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66 |
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] |
RCS2022-66 pp.247-252 |
RCC, WBS, SAT, MICT |
2022-05-26 15:50 |
Online |
Online |
Construction of high-efficient information reconciliation method using polar codes and adaptive post selection for continuous-variable quantum key distribution Yamaura Kensuke (NITech), Endo Hiroyuki (NICT), Yamashita Yuma, Okamoto Eiji (NITech), Toyoshima Morio (NICT) WBS2022-11 RCC2022-11 SAT2022-11 MICT2022-11 |
Quantum key distribution using optical laser satellites has currently been attracting attention for its information-theo... [more] |
WBS2022-11 RCC2022-11 SAT2022-11 MICT2022-11 pp.52-57 |
CQ, CS (Joint) |
2022-05-12 14:20 |
Fukui |
Fukui (Fuku Pref.) (Primary: On-site, Secondary: Online) |
Distributed Network Intrusion Detection System Using Federated Learning Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5 |
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] |
CQ2022-5 pp.20-25 |
IT, ISEC, RCC, WBS |
2022-03-10 16:50 |
Online |
Online |
[Special Invited Talk]
A spread of Information Theory Researches Hirosuke Yamamoto (U.Tokyo) IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78 |
We look back on the research themes dealt with in our researches of information theory for 47 years, and think about the... [more] |
IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78 pp.117-121 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2022-03-10 12:05 |
Online |
Online |
Implementation and evaluation of decentralized information flow control system using container-based virtualization Ayato Tachibana, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2021-47 DC2021-81 |
Decentralized Information Flow Control(DIFC) is a method to prevent vulnerabilities more effectively than Mandatory Acce... [more] |
CPSY2021-47 DC2021-81 pp.14-19 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-07 14:45 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
A Research of U.K Telecommunications (Security) Act 2021
-- Toward a Study of How to Change Information Security into Mandatory -- Yusuke Tachibana (FIT) SITE2021-53 IA2021-66 |
In December 2021, the UK passed the Telecommunications (Security) Act 2021. This act requires telecom operators to take ... [more] |
SITE2021-53 IA2021-66 pp.45-51 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 11:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technology for SDN-Based New Generation Network Satoru Izumi (NIT, Sendai) NS2021-90 CQ2021-72 ICM2021-25 |
Internet of Things (IoT) society in which various devices such as laptop, smart phone, tablet, home appliances, vehicle,... [more] |
NS2021-90 CQ2021-72 ICM2021-25 p.36(NS), p.41(CQ), p.19(ICM) |
PN |
2021-08-30 10:35 |
Online |
Online |
On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography Takehisa Iwakoshi (Mie Univ.) PN2021-12 |
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] |
PN2021-12 pp.1-6 |
RCS |
2021-06-23 10:30 |
Online |
Online |
A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35 |
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] |
RCS2021-35 pp.37-42 |
WBS, IT, ISEC |
2021-03-05 13:30 |
Online |
Online |
Information retrieval for security reports using behavior of cyber attacker Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73 |
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more] |
IT2020-154 ISEC2020-84 WBS2020-73 pp.257-264 |
CQ (2nd) |
2021-01-21 11:05 |
Online |
Online |
[Invited Lecture]
Hot Topics in Forwarding and Privacy in Information-Centric Networking Yuki Koizumi, Toru Hasegawa (Osaka Univ.) |
Information-Centric Networking (ICN), where communication is based on named content objects instead of named hosts, is ... [more] |
|
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |