IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
CQ 2024-06-28
14:45
Okinawa
(Primary: On-site, Secondary: Online)
Statistical Analysis on Traffic and Communication Quality of Thin-Telework System
Keisuke Ishibashi (ICU), Yoshiaki KItaguchi (Titech), Kenichi Nagami (Intec), Ichiro Mizukoshi (NTT East), Akira Sato (ITF)
 [more]
IA 2020-10-09
17:15
Online Online Correspondence of Event Exhibition at Online Conference
Yoshifumi Atarashi (Alaxala), Akira Sato (Univ. of Tsukuba) IA2020-17
Some meetings and events have come to be held online for COVID-19. So we have been holding an event exhibition at the ve... [more] IA2020-17
pp.15-18
HWS, VLD 2019-03-02
10:25
Okinawa Okinawa Ken Seinen Kaikan ASIC Chip Implementation and Evaluation of Elliptic Curve Digital Signature Algorithm
Sosuke Sato, Hiroki Yoshida, Kazuki Monta (Kobe Univ.), Takaaki Okidono (ECSEC), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) VLD2018-138 HWS2018-101
We have designed and fabricated application specific semiconductor integrated circuit (ASIC) chips that embody the gener... [more] VLD2018-138 HWS2018-101
pp.267-269
HWS, ICD 2018-10-29
13:25
Osaka Kobe Univ. Umeda Intelligent Laboratory Countermeasures for power noise and side-channel leakage in crypto fmodules (I)
Kazuki Monta, Sousuke Sato, Akihiro Tsukioka (Kobe Univ.), Takaaki Okidono (ECSEC), Takuji Miki, Noriyuki Miura, Makoto Nagata (Kobe Univ.) HWS2018-48 ICD2018-40
 [more] HWS2018-48 ICD2018-40
pp.7-11
IA 2018-10-12
16:15
Tokyo Takeda Hall, Tokyo Univ. (No. 88) A counter method of unused IP address sweep for router
Akira Sato, Shuji Sannomiya (Univ. of Tsukuba), Daiyuu Nobori, Satoshi Matsumoto (ICSCoE of IPA) IA2018-33
 [more] IA2018-33
pp.5-8
ICSS, IA 2018-06-25
14:50
Ehime Ehime University Survey on current situation of incorrect setting of DNS server
Akira Sato (Univ. of Tsukuba), Kazunori Fujiwara (JPRS), Takaho Omuro, Kodai Watanabe, Kenichi Yoshida (Univ. of Tsukuba) IA2018-5 ICSS2018-5
It is necessary for the stable operation of the Internet that DNS (Domain Name System) can be used normally. Currently, ... [more] IA2018-5 ICSS2018-5
pp.27-31
IA 2017-11-16
14:50
Overseas KMITL, Bangkok, Thailand Log analysis for hijacked user account's login detection method based on an autonomous system number of access source
Akira Sato, Shuji Sannomiya, Yoshihiro Oyama, Hisashi Nakai, Kenichi Yoshida, Keisuke Kameyama (Univ. of Tsukuba) IA2017-50
User accounts may be hijacked carelessly, and system administrators
should detect such hijacked user accounts as soon a... [more]
IA2017-50
pp.95-98
IA 2016-11-04
10:55
Overseas Taipei (Taiwan) Real-time Abnormal Traffic Detection Circuit Based on Simple Frequent-Itemset-Mining Method
Shuji Sannomiya, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2016-47
To resist the growth of abnormal traffic such as P2P flows, DDoS attacks and Internet worms, a circuit design to realize... [more] IA2016-47
pp.93-98
IA 2015-11-12
16:00
Chiba NARITA VIEW HOTEL Enhancing performance of cardinality analysis for faster network
Shinichi Mori, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2015-52
Cardinality in network flow data gives useful information for network administrators about suspicious communication on t... [more] IA2015-52
pp.81-85
IA, ICSS 2015-06-12
14:30
Fukuoka Kyushu Institute of Technology Univ. A detect method for an undesirable use of e-mail server using cardinality analysis
Akira Sato, Yuki Kato, Kenichi Yoshida, Yasushi Shinjo (Univ. of Tsukuba) IA2015-16 ICSS2015-16
 [more] IA2015-16 ICSS2015-16
pp.87-92
IA 2014-11-05
16:10
Overseas Thailand [Invited Talk] Vicar in Network
Shinichi Mori, Yuki Kato, Akira Sato, Kenichi Yoshida (Univ. of Tsukuba) IA2014-38
Cardinality is known to be informative to find various network threats. Recently, we have developed methods to analyze I... [more] IA2014-38
pp.21-26
LQE, LSJ 2013-05-17
15:45
Ishikawa   Spectrum measurement using optically trapped gold nanoparticle
Akira Sato, Yoshio Hayasaki (Utsunomiya Univ.) LQE2013-13
Gold nanoparticle cause localized surface plasmon resonance, which enhances an incident wave. The scattering light spect... [more] LQE2013-13
pp.57-61
IA 2009-10-31
09:30
Overseas Tsinghua University (Beijing) A case study of Analyzed Method for the Number of Varieties in Frequently Found Flows in real network environment
Yusuke Shomura, Akira Sato, Kenichi Yoshida, Satoshi Matsumoto, Kozo Itano (Univ. of Tsukuba) IA2009-53
Recently, users are using network in various ways. This makes the
network monitoring and network management difficult t... [more]
IA2009-53
pp.39-44
IA, SITE 2009-03-05
17:40
Kumamoto   Shortening Boot Times of Guest OSes on OS Boot/Shutdown Control System using Authentication Devices
Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano (Univ. of Tsukuba) SITE2008-70 IA2008-93
We are developing an OS boot/shutdown control system which provides a suitable computer environment
by identifying bot... [more]
SITE2008-70 IA2008-93
pp.155-160
IA, SITE 2009-03-05
21:00
Kumamoto   Implementation of an Access Control Mechanism that Enables Delegating Rights of Network Usage Permissions for Guest PCs
Mitsuhiro Mabuchi, Tsuyoshi Ozawa, Shingo Takada, Hiraku Toyooka, Keigo Matsui, Akira Sato, Yasushi Shinjo, Kazuhiko Kato (Univ. of Tsukuba) SITE2008-74 IA2008-97
When guests access their PCs to an organization's network, it is a challenging task for network administrators to achiev... [more] SITE2008-74 IA2008-97
pp.179-184
ICM 2008-05-09
09:55
Kagoshima Kagoshima Public Access Center Secure OS Boot Control System using Authentication Device
Shingo Takada, Akira Sato, Yasushi Shinjo, Hisashi Nakai, Kozo Itano (Univ. of Tsukuba) ICM2008-14
In large enterprise or university campuses, to prepare customized computer environment for users will improve their work... [more] ICM2008-14
pp.77-82
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan