IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] IT2020-128 ISEC2020-58 WBS2020-47
pp.104-109
SITE 2019-12-06
15:40
Kanagawa   "To be there" as an existence in logical space and an existence in probability measure space -- "Shared logos (partage) on language games" as a necessary condition of physicality --
Tetsuya Morizumi (KU) SITE2019-86
How should the AI relate to the information security? The AI performs Bayesian estimation of a probability distribution ... [more] SITE2019-86
pp.41-46
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
10:55
Kochi Kochi University of Technology Stochastic Existence Connecting Logos that are not necessarily completely divided and Language Games -- Limitations of Security Models and the Possibility of Artificial Intelligence --
Tetsuya Morizumi (KU) ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52
In this paper we describe that AI architecture including input data in artificial intelligence system for Bayesian estim... [more] ISEC2019-49 SITE2019-43 BioX2019-41 HWS2019-44 ICSS2019-47 EMM2019-52
pp.317-324
IA, ICSS 2019-06-07
11:45
Miyagi Research Institute for Electrical Communication, Tohoku University A Survey on the Risks of Bypassing Public Captive Portals through Covert Channels
Hidetaka Masuda, Hideya Ochiai, Hiroshi Esaki (UTokyo) IA2019-9 ICSS2019-9
Public Wi-Fi networks have spread to the world and is now an important infrastructure to us. However, there are many hot... [more] IA2019-9 ICSS2019-9
pp.43-48
IT, ISEC, WBS 2019-03-08
14:20
Tokyo University of Electro-Communications On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks
Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more]
IT2018-124 ISEC2018-130 WBS2018-125
pp.297-302
IA, SITE, IPSJ-IOT [detail] 2012-03-16
09:20
Hokkaido Hokkaido Univ. Design and Implementation of Network Covert Channel Validation Framework
Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) SITE2011-47 IA2011-97
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] SITE2011-47 IA2011-97
pp.185-190
IA, SITE, IPSJ-IOT [detail] 2012-03-16
10:00
Hokkaido Hokkaido Univ. The improvement of a hypergraph-based model against information leakage by inference
Ryo Suzuki (Kanagawa Univ.), Kazuhiro Suzuki (Kochi Univ.), Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-49 IA2011-99
With the advance of internet technology, there has been an explosive increase in information. SNS and cloud services mak... [more] SITE2011-49 IA2011-99
pp.197-202
SITE, IPSJ-EIP 2011-05-19
10:50
Tokyo Tokyo Univ. of Science Genetic Access Matrix Analysis Based on Multi Agent Model
Tetsuya Morizumi (Toyo Nets. & S. I. Co. Ltd.), Kazuhiro Suzuki, Masato Noto, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2011-3
How should individuals contribute to the public good? Conversely, how does the public help the individual? We should ana... [more] SITE2011-3
pp.11-16
ICSS 2011-03-25
13:25
Tokyo Suspended Consideration on hidden-communication channel in the Internet communication device.
Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more]
ICSS2010-60
pp.23-28
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
16:10
Akita Akita University About the Security Model built in the Search Engine
Akihito Toda (KU), Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (KU) ISEC2009-22 SITE2009-14 ICSS2009-36
The Cloud is the logic system with name space where relationships among resources in the Internet are represented by pre... [more] ISEC2009-22 SITE2009-14 ICSS2009-36
pp.45-49
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-02
16:35
Akita Akita University Logical Structure of the Cloud Which Projects Various Values onto Oneself -- From the Aspect of the Agent of Self-Referred Social Systems --
Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2009-23 SITE2009-15 ICSS2009-37
The semantics cloud is a logical system that the relation of the object world is described by the predicate logic, and t... [more] ISEC2009-23 SITE2009-15 ICSS2009-37
pp.51-56
SITE, IPSJ-EIP 2009-06-05
14:25
Tokyo   About Ethics of the Internet Transformed to the Clouds -- From the Aspect of the Access Control --
Tetsuya Morizumi (Toyo Networks & System Integration Co., LTD.), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-1
In this paper ethical problems of the cloud in the Internet is shown. The cloud is defined as follows; the cloud is a lo... [more] SITE2009-1
pp.45-50
SITE, IPSJ-EIP 2009-06-05
14:50
Tokyo   Web push proposal upon the information flow control -- Implimentaion of the filter information in the application server --
Akihito Toda (Kanagawa Univ.), Hiroshi Ichise (UNITEC Co.,Ltd.), Kazuhiro Suzuki (Kanagawa Univ.), Tetsuya Morizumi (Toyo Netwarks & System Integration Co.,Ltd.), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2009-2
Cloud is defined as follows; cloud is a pair of the meta-language and the address. Cloud is used to control covert chann... [more] SITE2009-2
pp.51-56
IA, SITE 2009-03-06
09:30
Kumamoto   Proposal of The Access Control Agent System in the Internet for Semantics Cloud
Tetsuya Morizumi (Toyo Networks & System Integration Co.,Ltd), Hirotsugu Kinoshita (Kanagawa Univ.) SITE2008-82 IA2008-105
The concept called Cloud of the Internet is defined, semantics to which search engine and information production system ... [more] SITE2008-82 IA2008-105
pp.225-230
ISEC, SITE, IPSJ-CSEC 2008-07-24
17:00
Fukuoka Fukuoka Institute of System LSI Design Industry Ontology and Epistemology in Semantic Network for Pluralistic Society -- From the Aspect of Access Control Agent for Social Systems --
Tetsuya Morizumi (TNSI), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IISEC) ISEC2008-29 SITE2008-23
This paper describes why philosophical consideration takes part in designing information filter agent built into "SNS co... [more] ISEC2008-29 SITE2008-23
pp.97-102
ISEC, SITE, IPSJ-CSEC 2007-07-19
13:00
Hokkaido Future University-Hakodate Interpretation and Analysis by Intuitionistic Logic for Incomplete Information,"Covert Channels"
Tetsuya Morizumi (TNSi, IIS), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) ISEC2007-25 SITE2007-19
There is a research where the data base is expressed by the deduction inference to make the world a database in construc... [more] ISEC2007-25 SITE2007-19
pp.65-70
ISEC, SITE, IPSJ-CSEC 2006-07-20
16:35
Okayama Okayama Univ. On Enforcement of Noninterference
Naoyuki Nagatou, Takuo Watanabe (Tokyo Tech)
We discuss a characterization of security policies to be enforced with a monitor. The monitor is a enforcement mechanism... [more] ISEC2006-37 SITE2006-34
pp.207-214
MoNA, IPSJ-MBL 2006-05-19
10:00
Okinawa   Privacy Protection with Customized Java Sandbox Architecture
Md. Nurul Huda (SOKEN-DAI), Eiji Kamioka, Shigeki Yamada (NII) MoMuC2006-18
Multi-party cooperative problem solving techniques require multiple inputs from multiple participants. The participants ... [more] MoMuC2006-18
pp.97-102
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan