IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 117  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
R 2022-10-07
15:15
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on Pull-Type Security Patch Management Policies for Intrusion Tolerant Systems
Junjun Zheng (Osaka Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-37
This paper considers the pull-type security patch management policies for intrusion tolerant systems. A composite stocha... [more] R2022-37
pp.31-36
ICM 2022-07-07
14:50
Hokkaido Tokachi Plaza
(Primary: On-site, Secondary: Online)
[Invited Talk] Zero Trust Architecture and Risk Management
Yuki Unno (Fujitsu Research) ICM2022-14
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] ICM2022-14
pp.21-23
SC 2022-05-27
10:55
Online Online Improving data security by mapping data and storage relations for data management in large environment
Avais Ahmad, Shinichi Hayashi, Satoshi Kaneko, Takashi Tameshige (Hitachi) SC2022-4
Large-scale organizations are required to manage multitude data assets and identify data flow and lo cation. Relationshi... [more] SC2022-4
pp.19-24
IA, SITE, IPSJ-IOT [detail] 2022-03-08
13:30
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
IoT Device Security Survey Using Home Automation Apps
Mizuki Ohno, Takahiro Endo, Kenichi Kanayama, Kenichi Nagami (INTEC) SITE2021-57 IA2021-70
We have released a home automation application called "KADENTECHO". Based on the accumulated data from this app, we cond... [more] SITE2021-57 IA2021-70
pp.69-74
IA, ICSS 2021-06-21
16:25
Online Online [Invited Talk] An Authentication Scheme for WLAN Physical Layer
Miyuki Hirose (KIT) IA2021-8 ICSS2021-8
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] IA2021-8 ICSS2021-8
p.43
ISEC 2021-05-19
11:35
Online Online [Invited Talk] Efficient blockchain-based IoT firmware update considering distribution incentives (from IDC 2021)
Tatsuhiro Fukuda (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2021-4
This paper proposes a firmware distribution method that provides incentives for distributors to help with distribu- tion... [more] ISEC2021-4
p.18
ICSS, IPSJ-SPT 2021-03-01
11:30
Online Online Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] ICSS2020-31
pp.31-36
ICSS 2020-11-26
15:00
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
pp.17-20
NS 2020-04-16
16:40
Online Online [Invited Talk] Data Life-Cycle Protection for Ubiquitous Data Sharing
Ruidong Li (NICT) NS2020-4
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] NS2020-4
pp.19-41
IA 2019-10-04
16:25
Tokyo Tokyo Univ., Hongo Campus, Takeda Hall Device management method for IoT security by network equipment
Yoshifumi Atarashi (Alaxala), Ray Atarashi (IIJ-II), Yutaka Oiwa (AIST) IA2019-21
The security of industrial system (i.e. factories, hospitals) are important. So we developed security management systems... [more] IA2019-21
pp.7-14
MIKA
(2nd)
2019-10-04
10:15
Hokkaido Hokkaido Univ. [Poster Presentation] Study for an advanced secure PDS service
Yuka Miyagi, Hiroki Yanagisawa, Noriharu Miyaho (TDU)
In recent years, personal information management technology called PDS (Personal Data Store) has been devel... [more]
IA, ICSS 2019-06-07
11:20
Miyagi Research Institute for Electrical Communication, Tohoku University Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network
Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] IA2019-8 ICSS2019-8
pp.37-41
NS 2019-04-19
14:15
Kagoshima Tenmonkan Vision Hall A Study on Identity Exchange System in Consideration of User's Privacy
Motoshi Horii, Dai Suzuki, Kenji Taka, Takeshi Kawasaki, Satoshi Imai (Fujitsu Labs.) NS2019-18
Service provider requires service users’ personal data such as their name and address to identify each of the service us... [more] NS2019-18
pp.103-106
ICSS, IPSJ-SPT 2019-03-08
14:25
Okinawa NICT Okinawa Electromagnetic Technology Center Traffic analysis to detect abnormal smartphone application behavior
Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] ICSS2018-87
pp.167-172
ICSS, IPSJ-SPT 2019-03-08
14:50
Okinawa NICT Okinawa Electromagnetic Technology Center Performance survey for IoT security function on smartphone
Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] ICSS2018-68
pp.1-6
HWS, VLD 2019-03-01
17:10
Okinawa Okinawa Ken Seinen Kaikan An Extended of Secure Remote Management Architecture for IoT-device
Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] VLD2018-136 HWS2018-99
pp.255-260
IN 2019-01-21
15:10
Aichi WINC AICHI The Efforts for Improving Operation and Security of Educational Information Systems in Information Departments
Yuta Tamaki, Daisuke Isa, Tomokazu Nagata, Yuji Taniguchi (Ryukyu Univ.) IN2018-76
The educational information system provided by the Intelligent Information Course of the University of the Ryukyus is op... [more] IN2018-76
pp.25-29
CQ, ICM, NS, NV
(Joint)
2018-11-16
09:15
Ishikawa   Development of System to Analyze Advanced Attacks Using Self-Organizing Map
Akifumi Iwasa, Hikohmi Suzuki (Shinshu Univ.), Tetsuya Ui (NEC) NS2018-140
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] NS2018-140
pp.57-61
CQ, ICM, NS, NV
(Joint)
2018-11-16
13:45
Ishikawa   [Encouragement Talk] Unit-separete Network Access Control based on Hierarchical Network Architecture
Yu Tamura (UEC), Takashi Naito (NII), Nattapong Kitsuwan (UEC) NS2018-148
This paper proposes a Hierarchical Role-based Network Access Control (HRNAC) approach to set the flexible rule for each ... [more] NS2018-148
pp.105-110
 Results 1 - 20 of 117  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan