IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 41  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, IN
(Joint)
2022-03-10
11:20
Online Online A Study on Telephone System with User Authentication
Hiromu Aoshima (NTT) NS2021-132
I propose a telephone system with a function to authenticate individual users. In this system, if callees register calle... [more] NS2021-132
pp.59-63
SRW 2018-08-20
12:45
Okayama Okayama Univ. Implementations of System Software Update and User Authentication Functions in Elastic Wireless Local-Area Network System
Md. Manowarul Islam, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Kwenga Ismael Munene (Okayama Univ.) SRW2018-14
Nowadays, the wireless local-area network (WLAN) has become common for the Internet access due to a low-cost solution us... [more] SRW2018-14
pp.31-36
PRMU, BioX 2018-03-18
14:45
Tokyo   A Kinect-based Multimodal Person Authentication System with User Existence Confirmation
Lin Zhou, Koji Iwano (Tokyo City Univ.) BioX2017-46 PRMU2017-182
Person identification systems used for receiving pension need to have countermeasures against fraud by "spoofing" as ann... [more] BioX2017-46 PRMU2017-182
pp.61-66
NS, IN
(Joint)
2018-03-01
10:30
Miyazaki Phoenix Seagaia Resort A Study on Key Re-registration due to Change of Device for Mobile-Device-based Public Key Authentication
Hideo Nishimura, Takao Yamashita, Yasuhiko Yoshimura, Satoru Furukawa (NTT) IN2017-101
A mobile-device-based public key authentication method is standardized in the FIDO Alliance to eliminate the passwords i... [more] IN2017-101
pp.69-74
LOIS, ISEC, SITE 2017-11-09
09:30
Kyoto   Consciousness Investigation of Passwords Management in University Students -- Questionnaire Design based on Friend Relationships --
Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] ISEC2017-50 SITE2017-32 LOIS2017-27
pp.7-12
LOIS, ISEC, SITE 2017-11-09
10:00
Kyoto   User Authentication Keeping Method Using Watch Type Devices -- Case of Acceleration Sensors --
Mio Matsushita, Kohei Nagata, Yoshiaki Seki (Tokyo City Univ.) ISEC2017-51 SITE2017-33 LOIS2017-28
Wearable devices are going to be popular in near future. These devices also can be used in user authentications. In thes... [more] ISEC2017-51 SITE2017-33 LOIS2017-28
pp.13-18
IT, EMM 2016-05-19
15:35
Hokkaido Otaru Economic Center Multimodal User Authentication Focusing on Long-term Heart Rate Sequences from Wearable Devices
Takaaki Yoshida (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Babaguchi Noboru (Osaka Univ.) IT2016-9 EMM2016-9
This paper proposes a multimodal authentication system for smartphones
by using two sequences of different measurement ... [more]
IT2016-9 EMM2016-9
pp.49-54
ICD, IE, VLD, IPSJ-SLDM [detail] 2015-10-26
13:50
Miyagi   [Invited Talk] Human pattern recognition and humanics security
Masakatsu Nishigaki (Shizuoka Univ.) VLD2015-28 ICD2015-41 IE2015-63
It is very important to achieve the security of ICT systems. As everybody knows, however, security and usability is trad... [more] VLD2015-28 ICD2015-41 IE2015-63
p.11
BioX 2015-08-25
09:55
Hokkaido Otaru Port Marina User Interface Evaluation of Palm Vein Authentication for Mobile Devices
Takahiro Aoki (Fujitsu labs.) BioX2015-19
In recent years, palm vein authentication is widely spreading in use. And also mobile devices such as notebook PCs or ta... [more] BioX2015-19
pp.33-38
CAS, CS 2015-02-27
13:55
Tottori Tottori University Keystroke dynamics-based user identification via n-graph paths for shorter characteristic texts
Yoshihiro Kaneko, Takuya Tsujimoto, Keisuke Ohshima, Atsushi Kato (Gifu Univ.) CAS2014-138 CS2014-110
Needless to say, computer systems should be more secure for our safe life and society nowadays. A keystroke dynamics-bas... [more] CAS2014-138 CS2014-110
pp.101-105
ISEC, LOIS, SITE 2014-11-22
13:45
Hyogo   How to Utilize Location Information for Distinguishing Users
Takuya Funakoshi, Masahiro Mambo (Kanazawa Univ.) ISEC2014-68 SITE2014-59 LOIS2014-38
Lifelig, log of individual daily activity, is a valuable resource useful for decision making, recommendation or statisti... [more] ISEC2014-68 SITE2014-59 LOIS2014-38
pp.71-76
MoNA, IPSJ-MBL, IPSJ-UBI 2014-03-14
13:25
Kanagawa Keio Univ. (Hiyoshi Campus) Convenience-oriented Hybrid Biometric Identification using Aerial Signature
Kentaro Yamamoto, Eiji Kamioka (Shibaura Inst. of Tech.) MoNA2013-81
Personal authentication has been regarded as an important research domain from the viewpoint of security and privacy pro... [more] MoNA2013-81
pp.237-242
KBSE 2013-11-01
13:35
Ehime Ehime University Design and Implementation of IC Card-based Attendance Management System
Motohiro Mitani, Yukio Hori, Yoshiro Imai (Kagawa Univ.) KBSE2013-53
This paper describes an IC card-based attendance management system with Web camera for university lectures and other evi... [more] KBSE2013-53
pp.1-5
ISEC 2013-09-13
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. A new array disorder in user authentication by keystroke dynamics
Yoshihiro Kaneko (Gifu Univ.) ISEC2013-52
Keystroke dynamics-based user authentication research has been recognized as one of potentially valid biometrics. This ... [more] ISEC2013-52
pp.9-12
IA, SITE, IPSJ-IOT [detail] 2013-03-15
10:00
Nara Todaiji Total Cultural Center Identifying User Authentication Methods on SSH Sessions
Akihiro Satoh, Yutaka Nakamura, Takeshi Ikenaga (Kyushu Inst. of Tech.) SITE2012-61 IA2012-99
A dictionary attack against SSH services is a common security threat. Traditional ways for detecting the attacks rely on... [more] SITE2012-61 IA2012-99
pp.151-156
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
09:00
Hokkaido   Keystroke Authentication Using the Technique of Quality engineering
Hitoshi Osaka, Koya Yano (Nihon Univ.) ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19
The personal authentication by a keystroke is the biometrics using the Characteristics of the action that imitation by a... [more] ISEC2012-27 SITE2012-23 ICSS2012-29 EMM2012-19
pp.121-126
CAS, NLP 2011-10-20
13:55
Shizuoka Shizuoka Univ. Password Enhancement in Keystroke Dynamics with a Hamming Distance-like Filtering
Yoshihiro Kaneko (Gifu Univ.) CAS2011-40 NLP2011-67
Keystroke dynamics-based user authentication research has been done for decades and been positioned as one of inexpensiv... [more] CAS2011-40 NLP2011-67
pp.43-48
ISEC, IT, WBS 2011-03-04
14:55
Osaka Osaka University User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.) IT2010-101 ISEC2010-105 WBS2010-80
Recently, several user authentication methods using keystroke characteristics for free-style text have been presented.
... [more]
IT2010-101 ISEC2010-105 WBS2010-80
pp.213-220
ICM, LOIS 2011-01-20
17:05
Nagasaki   A User Attestation System Using a Cellular Phone Equipped with Digital Camera and 2D Color Code
Noriyasu Yamamoto, Toshihiko Wakahara (FIT) ICM2010-42 LOIS2010-53
For accessing Internet, a reusable password method is frequently used because of its simplicity. This reusable password ... [more] ICM2010-42 LOIS2010-53
pp.51-56
IN 2010-12-16
12:35
Hiroshima Hiroshima City Univ. A Collaborative Scheme for Dynamic User Management in P2P Applications
Kazuma Kadowaki, Satoshi Fujita (Hiroshima Univ.) IN2010-98
To ensure the security and privacy in Peer-to-Peer (P2P) applications, a user management scheme is needed. Typical conve... [more] IN2010-98
pp.7-11
 Results 1 - 20 of 41  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan