|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
SC |
2022-03-11 13:00 |
Online |
EventIn |
[Invited Talk]
Artificial Intelligence (AI) and Trust Related Issues for a Super-smart Society Toshikazu Fukushima (JST) SC2021-40 |
This talk describes the trends and issues in policy and technological development for "Trustworthy AI". As the accuracy ... [more] |
SC2021-40 p.32 |
SWIM |
2020-11-28 14:35 |
Online |
Online |
Success factors on long-term large-scale collaborative research between university and industry
-- Case study on collaboration program with industry in Osaka University -- Koji Nishio (Bunkyo Univ.) SWIM2020-9 |
The purpose of this study is to consider how the long-term large-scale university-industry collaboration worked, and the... [more] |
SWIM2020-9 pp.18-25 |
IA |
2014-01-30 15:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal and Evaluation of a Cooperative Malicious Node Isolation Mechanism for WSNs Ailixier Aikebaier, Masahiro Jibiki, Yuuichi Teranishi, Nozomu Nishinaga (NICT) IA2013-73 |
In wireless sensor networks (WSNs), due to fault and malicious behaviors of network entities, the collected sensor data ... [more] |
IA2013-73 pp.31-36 |
IN, NS (Joint) |
2011-03-04 14:10 |
Okinawa |
Okinawa Convention Center |
A Proposal of Trustworthy Information Oriented Network (TION) Ruidong Li, Masugi Inoue (NICT) IN2010-190 |
The current Internet architecture is designed for host-to-host communications, while information dissemination and retri... [more] |
IN2010-190 pp.277-282 |
IN, NS, CS (Joint) |
2009-09-11 13:25 |
Miyagi |
Tohoku University (Miyagi) |
A Design of Adaptive Overlay Network for Public Key Management Seiya Nakayama (Tohoku Univ.), Atsushi Takeda (Tohoku Bunka Gakuen Univ./Tohoku Univ.), Gen Kitagata, Debasish Chakraborty, Norio Shiratori (Tohoku Univ.) IN2009-56 |
In ubiquitous computing environments, a lot of private data is sent through computer networks. Therefore, we need a secu... [more] |
IN2009-56 pp.99-104 |
NS, IN (Joint) |
2008-03-07 08:15 |
Okinawa |
Bankoku Shinryokan |
Social Networking Architecture
-- Network Construction, Operation, and Utilization based on Human Trust Chain -- Katsunori Yamaoka, Akira Sasaki, Kenta Yasukawa, Takamichi Miyata, Yoshinori Sakai (Tokyo Tech.) IN2007-190 |
Current service authorization systems have mostly assumed administrators are divided from ordinal users and the
all the... [more] |
IN2007-190 pp.187-192 |
IT, ISEC, WBS |
2007-03-16 14:50 |
Gunma |
Gunma Univ. (Kiryu Campus) |
A technique for making PKI robust Masaki Yoshida, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Manabu Maeda (Matsushita) |
We study a strategy for recovering a PKI system without reconstructing the whole one when the trust anchor has been brok... [more] |
IT2006-105 ISEC2006-160 WBS2006-102 pp.119-124 |
SS |
2005-10-14 10:00 |
Saitama |
Jumonji University |
A New Architecture for Trust Management with User Presence Jun Noda (NEC), Hisashi Mouri (NAIST), Yoshiaki Takata, Hiroyuki Seki (NEC/NAIST), Daigo Taguchi, Mie Takahashi, Itaru Hosomi (NEC) |
This paper proposes a flexible trust management method that assigns a trust to the user based on digital certificates as... [more] |
SS2005-50 pp.13-18 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|