Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, RCC, ITS |
2021-12-13 09:00 |
Online |
Online |
[Poster Presentation]
Red/blue wavelength division multiplexing transmission characteristics for space-division multiplexing, low-luminance uplink optical camera communication Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) WBS2021-40 ITS2021-14 RCC2021-47 |
Red/blue wavelength division multiplexing was combined with space division multiplexing to increase symbol rate and impr... [more] |
WBS2021-40 ITS2021-14 RCC2021-47 pp.34-39 |
WBS, MICT |
2021-07-30 13:00 |
Online |
Online |
[Poster Presentation]
Space division multiplexing, low-luminance uplink optical camera communication by reducing white light cell size Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) WBS2021-26 MICT2021-19 |
To increase data rate and security at the physical layer of space division multiplexing uplink optical camera communicat... [more] |
WBS2021-26 MICT2021-19 pp.24-29 |
WBS, RCC, SAT, MICT (Joint) [detail] |
2021-05-21 09:45 |
Online |
Online (Zoom) |
Space division multiplexing, low-luminance uplink optical camera communication using a smartphone OLED screen Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) WBS2021-13 RCC2021-13 SAT2021-11 MICT2021-9 |
To increase security at the physical layer of space division multiplexing uplink optical camera communication from a sma... [more] |
WBS2021-13 RCC2021-13 SAT2021-11 MICT2021-9 pp.66-71(WBS), pp.66-71(RCC), pp.54-59(SAT), pp.44-49(MICT) |
BioX |
2019-10-03 14:45 |
Okinawa |
|
[Short Paper]
A Study on biometric information effective for user authentication using gesture pattern Daiki Izumoto, Yasushi Yamazaki (Kitakyushu Univ.) BioX2019-57 |
Pattern lock, which is one of the personal authentication methods using a touch panel of a smartphone, is convenient and... [more] |
BioX2019-57 pp.17-18 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Traffic analysis to detect abnormal smartphone application behavior Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87 |
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] |
ICSS2018-87 pp.167-172 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Performance survey for IoT security function on smartphone Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68 |
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] |
ICSS2018-68 pp.1-6 |
MBE, NC (Joint) |
2018-11-22 13:55 |
Kyoto |
|
Individuality Extraction from Flick Action Trajectory for Personal Identification on Smartphones Masashi Sekikawa, Yuta Ozawa, Kohei Minemura, Masaki Kyoso (TCU) MBE2018-43 |
Latest smartphones which have many functions deal with many personal information. Therefore, advanced security measures ... [more] |
MBE2018-43 pp.35-39 |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2015-02-23 16:40 |
Hokkaido |
Hokkaido Univ. |
Authentication Method against Shoulder-Surfing Attacks using Secondary Channel Akira Aratani, Atsushi Kanai (Hosei Univ.) |
(To be available after the conference date) [more] |
|
ICD, CPSY |
2014-12-01 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Poster Presentation]
A study of a hardware Trojan-based antitheft system Yoshitaka Nakashima, Yasushi Tsukada, Takeshi Kumaki (Ritsumeikan Univ), Masaya Yoshikawa (Meijo Univ), Takeshi Fujino (Ritsumeikan Univ) ICD2014-78 CPSY2014-90 |
Recently, with the revolution of smartphones, many people preserve some private information in smartphone which are cont... [more] |
ICD2014-78 CPSY2014-90 p.29 |
MBE, BioX |
2014-09-12 17:00 |
Nagano |
Shinshu University |
[Poster Presentation]
Performance Assessment by Combined Input Data Method on Flick Input Authentication in Japanese Shinichi Maeda, Masayuki Izumi, Toshiharu Samura (ANCT), Haruhiko Nishimura (Univ. of Hyogo) BioX2014-24 MBE2014-47 |
Recently, smartphones themselves are starting to have value equivalent to that of personal identification and personal p... [more] |
BioX2014-24 MBE2014-47 pp.71-75 |
MBE, BioX |
2014-09-12 17:00 |
Nagano |
Shinshu University |
[Poster Presentation]
A Consideration for Implementation of PIN Input Authentication on Smartphone Masashi Shibata, Masayuki Izumi (ANCT), Yusuke Nishimura (Osaka Univ.), Toshiharu Samura (ANCT), Haruhiko Nishimura (Univ. of Hyogo) BioX2014-25 MBE2014-48 |
Following the rapid spread of smartphone usage, risks of unauthorized use and information leakage are increasing. Conven... [more] |
BioX2014-25 MBE2014-48 pp.77-82 |
LOIS, IPSJ-DC (Joint) |
2014-07-25 11:30 |
Tokyo |
|
Systematic analysis for the decision guidelines in the adoption and operation of BYOD
-- Contradiction between rules and information security -- Takashi Hatashima (NTT), Yoshiaki Seki (TCU), Yasuhisa Sakamoto, Shigeru Kayaguchi (NTT) LOIS2014-16 |
As performance and portability of information device are getting improved, companies take to the concept of new working ... [more] |
LOIS2014-16 pp.29-34 |
ICSS, IPSJ-SPT |
2014-03-28 13:30 |
Okinawa |
Meio Univiersity |
A Method To Detect Android Privilege Escalation Wataru Hasegawa, Lujo Bauer (Carnegie Mellon Univ.), Kilho Shin (Univ. of Hyogo) ICSS2013-82 |
Privilege Escalation on mobile devices is a particular concern, due both to the large amount of sensitive personal data ... [more] |
ICSS2013-82 pp.143-148 |
IN |
2013-10-17 16:45 |
Osaka |
Osaka University |
[Invited Talk]
Business goo for BYOD, for BYOD work style Yuichiro Fukuchi (NTT Communications) IN2013-81 |
BYOD (Bring Your Own Device) bring us big effects, such as cost reduction. But companies have to consider the risk of in... [more] |
IN2013-81 pp.25-29 |
BioX (2nd) |
2013-08-27 13:00 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
Keystroke Biometrics with Sensor Information on Smartphone Toshiharu Samura, Masayuki Izumi (ANCT), Haruhiko Nishimura (Univ. Hyogo) |
Today smartphones are becoming widely used as multipurpose devices. If smartphone was stolen, the risks of leaking perso... [more] |
|
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 11:05 |
Hokkaido |
|
Proposal of the Support System at the Time of Introduction of User Applications in Android OS Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.) ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 |
High-performance mobile phone, called the smartphone is beginning to spread regardless of age in recent years. As a matt... [more] |
ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 pp.13-18 |
LOIS |
2013-03-08 15:30 |
Okinawa |
|
An Implementation of Situation-Sensitive Function Controller for Smartphones and its Evaluation. Ryota Sato, Sakae Chikara, Tetsuya Okuda, Shigeru Kayaguchi (NTT) LOIS2012-104 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. The situation in which smartp... [more] |
LOIS2012-104 pp.203-208 |
LOIS |
2012-03-08 13:50 |
Okinawa |
Meio Univ. |
A Proposal of Situation-Sensitive Application Launcher for Smartphones Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] |
LOIS2011-83 pp.61-66 |
IA, ICSS |
2010-06-18 10:50 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A study on security threats to Android devices Ei Shimamura, Masaya Yamagata (NEC) IA2010-11 ICSS2010-11 |
Due to the increase of non-business use introduced by iPhone and Android, the sales volume of smartphone devices, especi... [more] |
IA2010-11 ICSS2010-11 pp.61-66 |