IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 511  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Ishikawa Kanazawa Bunka Hall
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:10
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] NS2022-103
pp.19-22
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
ISEC, SITE, LOIS 2022-11-18
09:25
Online Online Analysis of EU Cyber Resilience Act -- from a Perspective of Cyber Supply Chain Security --
Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] ISEC2022-32 SITE2022-36 LOIS2022-16
pp.16-19
RCS, AP, UWT
(Joint)
2022-11-15
11:00
Fukuoka Kyushu University, and Online
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A Study on Performance Improvement of Chaos Modulation-Concatenated Polar Codes with Multi-purpose Frozen Bits by Turbo Decoding
Keisuke Asano, Takumi Abe, Kenta Kato, Yuki Mori, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2022-158
The number of Internet of things (IoT) has been rapidly increasing and is expected to revolutionize industries and peopl... [more] RCS2022-158
pp.19-24
SS, IPSJ-SE, KBSE [detail] 2022-07-28
16:30
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Deep Learning Power Analysis Against Protected PRINCE
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) SS2022-4 KBSE2022-14
In recent years, with the development of deep learning, AI has been incorporated in the field of cyber security. On the ... [more] SS2022-4 KBSE2022-14
pp.19-24
AP, SANE, SAT
(Joint)
2022-07-29
11:15
Hokkaido Asahikawa Taisetsu Crystal Hall
(Primary: On-site, Secondary: Online)
Evaluation of Secure Transmission Performance of Spatially-Selective Modulation in an Indoor Environment
Hitoro Yonawa, Yuka Morishima, Hisato Iwai, Shinsuke Ibi (Doshisha Univ.) AP2022-57
As a physical layer security technique, we have proposed spatially-selective modulation (SSM) which consists of multiple... [more] AP2022-57
pp.129-134
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
16:40
Online Online Distance Spoofing Detection by LiDAR and Stereo Camera
Ataru Kubo, Yuki Fukatsu, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23
Automatic driving vehicles use information obtained from onboard ranging sensors to recognize objects such as surroundin... [more] ISEC2022-15 SITE2022-19 BioX2022-40 HWS2022-15 ICSS2022-23 EMM2022-23
pp.46-51
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
17:05
Online Online Security Evaluation of Cryptographic Circuits with Laser Sensors by Double-Spot Laser Irradiation
Masaki Chikano, Naoki Yoshida, Junichi Sakamoto, Syungo Hayashi, Tsutomu Matsumoto (YNU) ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24
A fault injection attack is an attack method that intentionally injects faults into a device to cause it to malfunction,... [more] ISEC2022-16 SITE2022-20 BioX2022-41 HWS2022-16 ICSS2022-24 EMM2022-24
pp.52-57
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
13:50
Online Online An overview of the secrecy of patent applications in the Japanese Law
Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
pp.88-97
RCS 2022-06-16
10:00
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
Secure Precoded OFDM Transmission Using Randomized Unitary Matrix
Naoki Isono, Kengo Ando, Koji Ishibashi (UEC) RCS2022-42
This paper considers a network consisting of a base station (BS), a legitimate user equipment (UE), and an eavesdropper ... [more] RCS2022-42
pp.108-113
RCS 2022-06-17
15:20
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory
Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] RCS2022-66
pp.247-252
SC 2022-05-27
10:55
Online Online Improving data security by mapping data and storage relations for data management in large environment
Avais Ahmad, Shinichi Hayashi, Satoshi Kaneko, Takashi Tameshige (Hitachi) SC2022-4
Large-scale organizations are required to manage multitude data assets and identify data flow and lo cation. Relationshi... [more] SC2022-4
pp.19-24
CQ, CS
(Joint)
2022-05-12
14:20
Fukui Fukui (Fuku Pref.)
(Primary: On-site, Secondary: Online)
Distributed Network Intrusion Detection System Using Federated Learning
Yuya Tsuru, Tomoya Kawakami, Tatsuhito Hasegawa (Univ. of Fukui) CQ2022-5
A network-based intrusion detection system (NIDS) monitors a network and detects unauthorized traffic. Currently, a vari... [more] CQ2022-5
pp.20-25
HWS 2022-04-26
10:55
Tokyo AIST Tokyo Waterfront (Annex)
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attacks against Hardware-Implemented Lightweight Cipher Midori64
Madoka Sako, Kunihiro Kuroda, Yuta Fukuda, Kota Yoshida, Takeshi Fujino (Ritsumeikan Univ.) HWS2022-2
Midori is a lightweight cipher and it is developed to achieve superior circuit size, low latency, and low power consumpt... [more] HWS2022-2
pp.7-12
IT, ISEC, RCC, WBS 2022-03-10
16:50
Online Online [Special Invited Talk] A spread of Information Theory Researches
Hirosuke Yamamoto (U.Tokyo) IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78
We look back on the research themes dealt with in our researches of information theory for 47 years, and think about the... [more] IT2021-103 ISEC2021-68 WBS2021-71 RCC2021-78
pp.117-121
ICSS, IPSJ-SPT 2022-03-07
13:30
Online Online Time Efficient Risk Assessment Tool for IoT Systems
Rajulapati Shourya, Takashi Kawauchi (Hitachi) ICSS2021-60
We have developed an integrated security design platform that provides security analysis independent of the consultant's... [more] ICSS2021-60
p.13
IA, SITE, IPSJ-IOT [detail] 2022-03-07
14:45
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
A Research of U.K Telecommunications (Security) Act 2021 -- Toward a Study of How to Change Information Security into Mandatory --
Yusuke Tachibana (FIT) SITE2021-53 IA2021-66
In December 2021, the UK passed the Telecommunications (Security) Act 2021. This act requires telecom operators to take ... [more] SITE2021-53 IA2021-66
pp.45-51
VLD, HWS [detail] 2022-03-08
11:00
Online Online Evaluation of a Lightweight Cryptographic Finalist on SROS2
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2021-94 HWS2021-71
In cyber-physical systems, small devices are connected to the network to enable the analysis of sensor values. Also, sin... [more] VLD2021-94 HWS2021-71
pp.99-104
 Results 1 - 20 of 511  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan