IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1137  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
QIT
(2nd)

Kanagawa Keio Univ.
(Primary: On-site, Secondary: Online)
Security of decoy-state quantum key distribution with imperfect phase randomization
Guillermo Currás-Lorenzo, Kiyoshi Tamaki (University of Toyama), Marcos Curty (University of Vigo)
(To be available after the conference date) [more]
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Ishikawa Kanazawa Bunka Hall
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
15:10
Ishikawa Kanazawa Bunka Hall
(Primary: On-site, Secondary: Online)
FPGA Implementation and Area Evaluation of JTAG Access Mechanism Using Lightweight One-Time Password Authentication Scheme
Hisashi Okamoto, Jun Ma, Senling Wang, Hiroshi Kai, Hiroshi Takahashi (Ehime Univ), Akihiro Shimizu (Kochi Univ. of Technology) VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71
When building a cyber-physical system (CPS), it is essential to guarantee the fault tolerance and security of edge devic... [more] VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71
pp.168-173
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:10
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] NS2022-103
pp.19-22
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
ISEC, SITE, LOIS 2022-11-18
09:25
Online Online Analysis of EU Cyber Resilience Act -- from a Perspective of Cyber Supply Chain Security --
Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] ISEC2022-32 SITE2022-36 LOIS2022-16
pp.16-19
RCS, AP, UWT
(Joint)
2022-11-15
11:00
Fukuoka Kyushu University, and Online
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A Study on Performance Improvement of Chaos Modulation-Concatenated Polar Codes with Multi-purpose Frozen Bits by Turbo Decoding
Keisuke Asano, Takumi Abe, Kenta Kato, Yuki Mori, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2022-158
The number of Internet of things (IoT) has been rapidly increasing and is expected to revolutionize industries and peopl... [more] RCS2022-158
pp.19-24
ITE-BCT, OCS, IEE-CMN, OFT 2022-11-10
14:00
Miyagi Forest-Sendai
(Primary: On-site, Secondary: Online)
Experimental Demonstration of Quantum Deliberate Signal Randomization for Y-00 Quantum Noise Stream Cipher
Fumio Futami, Ken Tanizawa, Kentaro Kato (Tamagawa Univ.) OCS2022-41
Deliberate signal randomization (DSR) driven by quantum random numbers is proposed for enhancing security. PSK Y-00 ciph... [more] OCS2022-41
pp.7-12
RISING
(3rd)
2022-10-31
15:00
Kyoto Kyoto Terrsa (Day 1), and Online (Day 2, 3) [Poster Presentation] A Trustworthy Approach for Radio Environment Map Construction in CRNs
Ying GAO, Takeo Fujii (UEC)
A common tool for improving communication efficiency when sharing spatial spectrum is the Radio Environment Map (REM). A... [more]
CS 2022-10-27
11:30
Hiroshima Hiroshima City University Satellite campus
(Primary: On-site, Secondary: Online)
Implementation of a large-scale evaluation platform in a BACnet/IP environment
Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] CS2022-45
pp.11-14
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:55
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Data Security Verification in Supply Chain
Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] ICTSSL2022-19
pp.12-17
HWS, ICD 2022-10-25
10:25
Shiga
(Primary: On-site, Secondary: Online)
A Study on Profiling Side-channel Analysis against AES-CTR
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more]
HWS2022-31 ICD2022-23
pp.6-11
HWS, ICD 2022-10-25
14:15
Shiga
(Primary: On-site, Secondary: Online)
An Estimation Method of the Irradiation Timing of an Attack Pulse for Evaluation of Distance Spoofing Attack Against direct ToF LiDAR
Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) HWS2022-37 ICD2022-29
Autonomous vehicles are equipped with numerous sensors, and the vehicle runs according to their measurements. Therefore,... [more] HWS2022-37 ICD2022-29
pp.41-45
HWS, ICD 2022-10-25
17:05
Shiga
(Primary: On-site, Secondary: Online)
How to Identify the Physical Direction of CAN Message Transmission
Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] HWS2022-43 ICD2022-35
pp.76-81
R 2022-10-07
14:50
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on A Transformer Encoder-Based Malware Classification Using API Calls
Chen Li (Kyutech), Junjun Zheng (Osaka Univ.) R2022-36
Malware is a major security threat to computer systems and significantly impacts system reliability. Recurrent neural ne... [more] R2022-36
pp.25-30
R 2022-10-07
15:15
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on Pull-Type Security Patch Management Policies for Intrusion Tolerant Systems
Junjun Zheng (Osaka Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-37
This paper considers the pull-type security patch management policies for intrusion tolerant systems. A composite stocha... [more] R2022-37
pp.31-36
SIP 2022-08-26
14:26
Okinawa Nobumoto Ohama Memorial Hall (Ishigaki Island)
(Primary: On-site, Secondary: Online)
Generation method of Adversarial Examples using XAI
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SIP2022-72
With the advancement of AI technology, AI can be applied to various fields. Therefore the accountability for the decisio... [more] SIP2022-72
pp.115-120
SAT, RCS
(Joint)
2022-08-25
11:40
Hokkaido
(Primary: On-site, Secondary: Online)
Random Phase based Physical Layer Security Scheme Robust against Multi-antenna Eavesdroppers
Meng YAN, Yuyuan Chang, Kazuhiko Fukawa (Tokyo Tech) RCS2022-104
In contrast with the upper-layer security, the physical-layer security for wireless communications can repel physical la... [more] RCS2022-104
pp.42-47
ICD, SDM, ITE-IST [detail] 2022-08-08
15:45
Online   Evaluation of Low-Latency Cryptography MANTIS based Low-Power oriented Tamper-Resistant Circuit
Kosuke Hamaguchi, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SDM2022-41 ICD2022-9
Lightweight cryptography can not only be implemented in a small area, but also with low latency and low power consumptio... [more] SDM2022-41 ICD2022-9
pp.31-36
 Results 1 - 20 of 1137  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan