IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1181  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
MSS, CAS, IPSJ-AL [detail] 2023-11-17
15:45
Okinawa   Construction of criminal models using kernel density estimation
Kenta Sakakura, Eiji Konaka (Meijo Univ.)
(To be available after the conference date) [more]
LOIS, SITE, ISEC 2023-11-09
10:50
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT)
(To be available after the conference date) [more]
MW, EMCJ, EST, IEE-EMC [detail] 2023-10-19
13:10
Yamagata Yamagata University
(Primary: On-site, Secondary: Online)
Genetic Algorithm XSS Attack Payload Generation and WAF Evaluation
Yu Funahashi, Hideaki Kimura (Chubu Univ)
(To be available after the conference date) [more]
BioX 2023-10-12
14:45
Okinawa Nobumoto Ohama Memorial Hall A study on a federated learning system for high accuracy biometric authentication
Yusei Suzuki, Yosuke Kaga (Hitachi)
(To be available after the conference date) [more]
IA 2023-09-22
15:00
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Signing key management in cryptocurrency custodians learned from DNSSEC
Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] IA2023-30
pp.115-122
CPSY, DC, IPSJ-ARC [detail] 2023-08-04
13:40
Hokkaido Hakodate Arena
(Primary: On-site, Secondary: Online)
A Classification of Security Threats and Countermeasure Directions for Cloud-based Railway Signalling Systems Using COTS Components
Takashi Toyama, Akihiro Gion (RTRI)
Research and development of cloud-based railway signaling systems, which remotely control signalling devices or trains f... [more]
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
13:20
Hokkaido Hokkaido Jichiro Kaikan ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 The Hardware Security Technical Committee invited the author to give a presentation about his recent elevation to IEEE F... [more] ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35
pp.141-146
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:00
Hokkaido Hokkaido Jichiro Kaikan An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication
Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
pp.165-170
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan Secure Cryptographic Unit with built-in Signature Generation Hardware for Aggregate Signature Schemes and its FPGA Implementation
Toshihiro Sato, Shohei Kawasaki (SCU), Kaoru Masada (Tokyo Univ.), Riku Anzai, Junichi Sakamoto, Naoki Yoshida (YNU), Yasuyoshi Uemura (SCU), Makoto Ikeda (Tokyo Univ.), Tsutomu Matsumoto (YNU) ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42
Secure Cryptographic Unit (SCU) consists of a hardware cryptographic engine and an access control mechanism for the engi... [more] ISEC2023-42 SITE2023-36 BioX2023-45 HWS2023-42 ICSS2023-39 EMM2023-42
pp.182-187
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:00
Hokkaido Hokkaido Jichiro Kaikan Is Copying for Information Security Research ‘Fair Use’? -- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) --
Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
pp.229-231
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
pp.232-238
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
14:50
Hokkaido Hokkaido Jichiro Kaikan Anomaly detection with dataset including replay-attack communication
Koushi Nishi, Futa Yuichi (TUT), Okazaki Hiroyuki (Shinshu University) ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
General-purpose devices and communications are increasingly introduced to control systems in factories and power plants ... [more] ISEC2023-52 SITE2023-46 BioX2023-55 HWS2023-52 ICSS2023-49 EMM2023-52
pp.247-254
EST, MW, EMT, OPE, MWPTHz, IEE-EMT [detail] 2023-07-20
11:25
Hokkaido Muroran Institute of Technology
(Primary: On-site, Secondary: Online)
Millimeter-Wave Three-Dimensional Imaging using Dielectric Lens for Security Application
Arie Setiawan, Shu Sato (Mie Univ.), Naruto Yonemoto (ENRI), Hitoshi Nohmi (Alouette Technlogy Inc.), Hiroshi Murata (Mie Univ.) EMT2023-27 MW2023-45 OPE2023-27 EST2023-27 MWPTHz2023-23
Millimeter-wave (mmW) has been an increasingly attractive research area in security solutions due to its ability to pene... [more] EMT2023-27 MW2023-45 OPE2023-27 EST2023-27 MWPTHz2023-23
pp.100-105
SeMI, RCS, RCC, NS, SR
(Joint)
2023-07-13
09:25
Osaka Osaka University Nakanoshima Center + Online
(Primary: On-site, Secondary: Online)
A Study on Complexity Reduction of Bit Assignment and Performance Improvement by Channel Code Concatenation in Chaos Modulation
Ryo Tozawa, Yuuki Mori, Seiya Yamashita, Eiji Okamoto (NITech), Tetsuya Yamamoto (Panasonic) RCS2023-86
In recent years, with the rapid increase of Internet of Things (IoT) devices in industries, healthcare, and other fields... [more] RCS2023-86
pp.33-38
IA, ICSS 2023-06-20
16:00
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Cybersecurity education and the role of universities
Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] IA2023-6 ICSS2023-6
p.31
SWIM, KBSE 2023-05-19
15:10
Shizuoka
(Primary: On-site, Secondary: Online)
DARPA-Like Organization and Role of Univeristy -- A Global Perspective Regarding AI R&D --
Haruki Ueno (NII) KBSE2023-3 SWIM2023-3
Dual-use technology (DUT) refers to technology that can be used for both peaceful and military purposes, and has its roo... [more] KBSE2023-3 SWIM2023-3
pp.13-20
HWS 2023-04-15
09:15
Oita
(Primary: On-site, Secondary: Online)
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor
Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] HWS2023-9
pp.34-36
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2023-03-24
09:00
Kagoshima Amagi Town Disaster Prevention Center (Tokunoshima)
(Primary: On-site, Secondary: Online)
A preliminary study on time-dependency of cyber security vulnerability assessment
Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] CPSY2022-42 DC2022-101
pp.49-54
IA, SITE, IPSJ-IOT [detail] 2023-03-17
10:25
Gunma Maebashi Institute of Technology
(Primary: On-site, Secondary: Online)
[Invited Talk] Dual-Use of Cybersecurity -- From the Threat Landscape in Cyberspace with a Focus on IoT Security --
Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] SITE2022-62 IA2022-85
pp.45-52
RCC, ISEC, IT, WBS 2023-03-14
09:25
Yamaguchi
(Primary: On-site, Secondary: Online)
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields
Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more]
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
pp.74-79
 Results 1 - 20 of 1181  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan