IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 282  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:00
Hokkaido Hokkaido Jichiro Kaikan Is Copying for Information Security Research ‘Fair Use’? -- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) --
Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
pp.229-231
MSS, CAS, SIP, VLD 2023-07-06
13:00
Hokkaido
(Primary: On-site, Secondary: Online)
[Panel Discussion] Democratization of Researches in Circuits and Systems fields and Initiatives in Technical Groups
Makoto Ikeda (The Univ. of Tokyo), Yasutoshi Aibara (OVT), Shigetoshi Nakatake (The Univ. of Kitakyushu), Takayuki Nakachi (Univ. of Ryukyus), Shingo Yamaguchi (Yamaguchi Univ.) CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7
Open Access initiatives, which allow access and use of research results funded by public research funds not only by the ... [more] CAS2023-7 VLD2023-7 SIP2023-23 MSS2023-7
pp.34-36
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Secure communication based on high precision space-time synchronization
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
pp.97-102
ICSS, IPSJ-SPT 2023-03-13
14:40
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM
Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2022-53
In recent years, network-based intrusion detection systems (NIDS), which are systems for detecting unauthorized access o... [more] ICSS2022-53
pp.31-36
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2022-68
pp.121-126
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
ISEC, SITE, LOIS 2022-11-18
09:25
Online Online Analysis of EU Cyber Resilience Act -- from a Perspective of Cyber Supply Chain Security --
Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] ISEC2022-32 SITE2022-36 LOIS2022-16
pp.16-19
AP, SANE, SAT
(Joint)
2022-07-29
11:15
Hokkaido Asahikawa Taisetsu Crystal Hall
(Primary: On-site, Secondary: Online)
Evaluation of Secure Transmission Performance of Spatially-Selective Modulation in an Indoor Environment
Hitoro Yonawa, Yuka Morishima, Hisato Iwai, Shinsuke Ibi (Doshisha Univ.) AP2022-57
As a physical layer security technique, we have proposed spatially-selective modulation (SSM) which consists of multiple... [more] AP2022-57
pp.129-134
RCS 2022-06-17
15:20
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory
Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] RCS2022-66
pp.247-252
RCC, WBS, SAT, MICT 2022-05-26
15:50
Online Online Construction of high-efficient information reconciliation method using polar codes and adaptive post selection for continuous-variable quantum key distribution
Yamaura Kensuke (NITech), Endo Hiroyuki (NICT), Yamashita Yuma, Okamoto Eiji (NITech), Toyoshima Morio (NICT) WBS2022-11 RCC2022-11 SAT2022-11 MICT2022-11
Quantum key distribution using optical laser satellites has currently been attracting attention for its information-theo... [more] WBS2022-11 RCC2022-11 SAT2022-11 MICT2022-11
pp.52-57
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
IT, ISEC, RCC, WBS 2022-03-10
16:50
Online Online [Special Invited Talk] A spread of Information Theory Researches
Hirosuke Yamamoto (U.Tokyo) IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78
We look back on the research themes dealt with in our researches of information theory for 47 years, and think about the... [more] IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78
pp.117-121
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2022-03-10
12:05
Online Online Implementation and evaluation of decentralized information flow control system using container-based virtualization
Ayato Tachibana, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2021-47 DC2021-81
Decentralized Information Flow Control(DIFC) is a method to prevent vulnerabilities more effectively than Mandatory Acce... [more] CPSY2021-47 DC2021-81
pp.14-19
IA, SITE, IPSJ-IOT [detail] 2022-03-07
14:45
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A Research of U.K Telecommunications (Security) Act 2021 -- Toward a Study of How to Change Information Security into Mandatory --
Yusuke Tachibana (FIT) SITE2021-53 IA2021-66
In December 2021, the UK passed the Telecommunications (Security) Act 2021. This act requires telecom operators to take ... [more] SITE2021-53 IA2021-66
pp.45-51
CQ, ICM, NS, NV
(Joint)
2021-11-26
11:15
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technology for SDN-Based New Generation Network
Satoru Izumi (NIT, Sendai) NS2021-90 CQ2021-72 ICM2021-25
Internet of Things (IoT) society in which various devices such as laptop, smart phone, tablet, home appliances, vehicle,... [more] NS2021-90 CQ2021-72 ICM2021-25
p.36(NS), p.41(CQ), p.19(ICM)
PN 2021-08-30
10:35
Online Online On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography
Takehisa Iwakoshi (Mie Univ.) PN2021-12
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] PN2021-12
pp.1-6
RCS 2021-06-23
10:30
Online Online A Study on Secret Key Sharing Using Time-Division Duplex Channel Information in Radio-Wave Encrypted Modulation
Takumi Abe, Mamoru Okumura, Keisuke Asano, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-35
In recent years, cyber-attacks targeting Internet of things (IoT) terminals have been increasing. As a countermeasure, e... [more] RCS2021-35
pp.37-42
WBS, IT, ISEC 2021-03-05
13:30
Online Online Information retrieval for security reports using behavior of cyber attacker
Yuki Kawaguchi, Mayo Yamasaki (NTT) IT2020-154 ISEC2020-84 WBS2020-73
Cyber security incident responders require related information about related incidents for the quick and comprehensive
... [more]
IT2020-154 ISEC2020-84 WBS2020-73
pp.257-264
CQ
(2nd)
2021-01-21
11:05
Online Online [Invited Lecture] Hot Topics in Forwarding and Privacy in Information-Centric Networking
Yuki Koizumi, Toru Hasegawa (Osaka Univ.)
Information-Centric Networking (ICN), where communication is based on named content objects instead of named hosts, is ... [more]
IT 2020-12-03
16:40
Online Online Implementation and security evaluation of wiretap channel coding in noisy channels
Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] IT2020-62
pp.206-211
 Results 1 - 20 of 282  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan