IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 141  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels
Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
pp.306-311
SAT, SANE
(Joint)
2024-02-09
13:20
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation
Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] SANE2023-111
pp.43-48
ICSS 2023-11-16
13:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2023-51
pp.1-6
SR 2023-11-10
11:10
Miyagi
(Primary: On-site, Secondary: Online)
[Short Paper] Model Sharing and Learning for Visually Secure Deep Joint Source Channel Coding
Yuyang Fu, Katsuya Suto (UEC) SR2023-59
Research and development of Deep Joint Source Channel Coding (DeepJSCC) technology, which is a data-driven design of inf... [more] SR2023-59
pp.64-66
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
pp.232-238
RCC, ISEC, IT, WBS 2023-03-14
09:25
Yamaguchi
(Primary: On-site, Secondary: Online)
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields
Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more]
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
pp.74-79
RCC, ISEC, IT, WBS 2023-03-14
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication
Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83
In indoor 3.5-m uplink screen camera communication using a smartphone screen and a video camera, it has been shown that ... [more] IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83
pp.114-119
HWS, VLD 2023-03-01
13:50
Okinawa
(Primary: On-site, Secondary: Online)
Circuit Optimization and Simulation Evaluation for Ultra-Low Voltage of LRPUF Using Manufacturing Variability of Leakage Current
Shunkichi Hata, Kimiyoshi Usami (SIT) VLD2022-77 HWS2022-48
Low power consumption and low-voltage operation become critical issues to be addressed when PUF (Physically Unclonable F... [more] VLD2022-77 HWS2022-48
pp.25-30
HWS, VLD 2023-03-02
15:20
Okinawa
(Primary: On-site, Secondary: Online)
Secure Cache System against On-Chip Threats
Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more]
VLD2022-95 HWS2022-66
pp.113-118
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
ITE-BCT, OCS, IEE-CMN, OFT 2022-11-10
14:00
Miyagi Forest-Sendai
(Primary: On-site, Secondary: Online)
Y-00 Quantum Noise Stream Cipher with Quantum Deliberate Signal Randomization and Its Application to Optical Fiber Transmission System
Fumio Futami, Ken Tanizawa, Kentaro Kato (Tamagawa Univ.) OCS2022-41
Deliberate signal randomization (DSR) driven by quantum random numbers is proposed for enhancing security. PSK Y-00 ciph... [more] OCS2022-41
pp.7-12
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:55
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Data Security Verification in Supply Chain
Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] ICTSSL2022-19
pp.12-17
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
13:50
Online Online An overview of the secrecy of patent applications in the Japanese Law
Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
pp.88-97
ICM 2022-07-07
14:50
Hokkaido Tokachi Plaza
(Primary: On-site, Secondary: Online)
[Invited Talk] Zero Trust Architecture and Risk Management
Yuki Unno (Fujitsu Research) ICM2022-14
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] ICM2022-14
pp.21-23
ICSS, IPSJ-SPT 2022-03-07
13:30
Online Online Time Efficient Risk Assessment Tool for IoT Systems
Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] ICSS2021-60
p.13
RECONF, VLD, CPSY, IPSJ-ARC, IPSJ-SLDM [detail] 2022-01-25
10:20
Online Online FPGA Implementation of Radar Imaging for Walk-Through Security Screening System
Tatsuya Sumiya, Yuki Kobayashi, Masayuki Ariyoshi (NEC) VLD2021-64 CPSY2021-33 RECONF2021-72
To enhance security at facilities such as railway stations and commercial buildings where many people come and go withou... [more] VLD2021-64 CPSY2021-33 RECONF2021-72
pp.84-89
DC 2021-12-10
14:00
Kagawa
(Primary: On-site, Secondary: Online)
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] DC2021-57
pp.13-18
ICSS 2021-11-29
13:50
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automation of Security Vulnerability Analysis by Auto-generated DFD
Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] ICSS2021-48
pp.13-18
RISING
(3rd)
2021-11-16
09:30
Tokyo
(Primary: On-site, Secondary: Online)
On Attack Pattern Classification in IoT Networks for Network Intrusion Detection Systems
Jesse Atuhurra, Takanori Hara (NAIST), Yuanyu Zhang (Xidian Univ.), Shoji Kasahara (NAIST)
With the proliferation of IoT devices, IoT security problems arise. To protect heterogeneous connected devices in IoT ne... [more]
RCS 2021-10-21
10:50
Online Online Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO
Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] RCS2021-120
pp.13-18
 Results 1 - 20 of 141  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan