IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 87  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
15:30
Osaka Osaka Univ. (Suita Campus) Research Directions in Formal Verification of Transport Layer Security Protocols
Hideki Sakurada (NTT/Kyushu Univ.), Kouichi Sakurai (Kyushu Univ./ATR) IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103
The TLS protocol is used to secure communications between web servers and clients, and is essential for security: it all... [more] IT2023-121 ISEC2023-120 WBS2023-109 RCC2023-103
pp.287-293
RCC, ISEC, IT, WBS 2023-03-15
14:15
Yamaguchi
(Primary: On-site, Secondary: Online)
Notes on applying cryptographic proof systems to implement the uniqueness of Non Fungible Token
Kouichi Sakurai (Kyushu Univ.) IT2022-130 ISEC2022-109 WBS2022-127 RCC2022-127
 [more] IT2022-130 ISEC2022-109 WBS2022-127 RCC2022-127
pp.393-397
ICSS 2021-11-29
13:00
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Current status, issues, and research trends of user authentication in mobile networks
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] ICSS2021-46
pp.1-6
SITE, ISEC, LOIS 2021-11-12
14:25
Online Online A theory of designing two factor authentications: Google’s FIDO/U2F as an example
Kouichi Sakurai (Kyushu Univ.) ISEC2021-44 SITE2021-38 LOIS2021-27
 [more] ISEC2021-44 SITE2021-38 LOIS2021-27
pp.18-19
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2021-07-20
14:25
Online Online Computer experiment evaluation for time variance of virtual currency mining using cryptographic hash function
Kei Ikebe, Kouichi Sakurai (Kyushu Univ.) ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41
Cryptocurrencies are searching for solutions to difficult-to-calculate problems called mining when conducting transactio... [more] ISEC2021-36 SITE2021-30 BioX2021-37 HWS2021-36 ICSS2021-41 EMM2021-41
pp.161-166
WBS, IT, ISEC 2021-03-05
09:25
Online Online Construction of non-malleable codes based on graph theory
Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.) IT2020-144 ISEC2020-74 WBS2020-63
Non-malleable codes protect communications against adversarial tampering of data, which can be seen as a relaxation of e... [more] IT2020-144 ISEC2020-74 WBS2020-63
pp.195-200
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Consideration on the mechanism of identifying and tracking Bitcoin users
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] ICSS2020-44
pp.108-113
IT 2020-12-03
11:40
Online Online Introduction on Information Theory and Its Applications at Tel Aviv University -- Class of "Codes and Sequences" for Graduate Students --
Kouichi Sakurai, YuJie GU (Kyushu Univ.) IT2020-51
 [more] IT2020-51
pp.146-147
ISEC 2020-05-20
14:40
Online Online Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions -- Serial Concatenation and Parallel Concatenation --
Hiroaki Anada (Univ. Nagasaki), Kouichi Sakurai (Kyushu Univ.) ISEC2020-9
In Bitcoin, the computational problem which miners should solve is
an equation described in the term of a hash functio... [more]
ISEC2020-9
pp.33-40
COMP, IPSJ-AL 2020-05-09
09:30
Online Online On Power and limitation of adversarial example attacks
Kouichi Sakurai (Kyushu Univ.) COMP2020-5
A risk of adversarial example attacks which cause deep learning to make wrong decisions is getting serious even from a c... [more] COMP2020-5
pp.33-36
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
IT, ISEC, WBS 2019-03-08
12:05
Tokyo University of Electro-Communications Secret Sharing on Evolving Multi-level Access Structure
Partha Sarathi Roy (KDDI Research), Sabyasachi Dutta (Kyushu Univ.), Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) IT2018-121 ISEC2018-127 WBS2018-122
 [more] IT2018-121 ISEC2018-127 WBS2018-122
pp.281-284
SITE, ISEC, LOIS 2018-11-03
12:00
Fukuoka   Computationally-independent pair of one-way functions in presence of leakage
Sabyasachi Dutta, Kouichi Sakurai (Kyushu Univ.) ISEC2018-66 SITE2018-44 LOIS2018-26
 [more] ISEC2018-66 SITE2018-44 LOIS2018-26
pp.13-18
SITE, ISEC, LOIS 2018-11-03
12:30
Fukuoka   Secret sharing of color images: An algebraic approach
Sabyasachi Dutta (Kyushu Univ.), Avishek Adhikari (Univ. Calcutta), Sushmita Ruj (ISI,Kolkata), Kouichi Sakurai (Kyushu Univ.) ISEC2018-67 SITE2018-45 LOIS2018-27
 [more] ISEC2018-67 SITE2018-45 LOIS2018-27
pp.19-24
EMM, IT 2017-05-23
11:55
Yamagata Yamagata University(Yonezawa Campus) Investigation on the Effect of Error Correction by RS Code on Pattern Masking of Double Encoded Two-dimensional Code
Nobuyuki Teraura (TCRI), Keiichi Iwamura (TUS), Isao Echizen (NII), Kouichi Sakurai (kyushu Univ.) IT2017-12 EMM2017-12
The black cell of a two dimensional code is coded in normal black ink (infrared absorption) and special black ink (infra... [more] IT2017-12 EMM2017-12
pp.67-72
ICSS, IPSJ-SPT 2017-03-13
14:50
Nagasaki University of Nagasaki A Brief Review on Anomaly Detection and its Applications to Cybersecurity
Danilo Vasconcellos Vargas, Kouichi Sakurai (Kyudai) ICSS2016-50
 [more] ICSS2016-50
pp.37-42
ICSS, IPSJ-SPT 2017-03-14
12:20
Nagasaki University of Nagasaki Evaluation of Host Independent and Distributed Detection System of the Network Attack by Using OpenFlow
Ryosuke Miyazaki (ISIT/Kyushu Univ.), Junpei Kawamoto (), Shinichi Matsumoto (Kyushu Univ.), Kouichi Sakurai (ISIT/Kyushu Univ.) ICSS2016-69
In recent years, cyber attacks are in various ways, and we must detect as many kinds of attacks as possible. Therefore, ... [more] ICSS2016-69
pp.177-182
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
11:10
Yamaguchi   Fully Secure Secret-sharing Schemes Using Indistinguishability Obfuscation
Hui Zhao, Kouichi Sakurai (Kyushu Univ.) ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
We provide an cryptographic realization of secret-sharing scheme based on obfuscation, and prove that this model is UC s... [more] ISEC2016-31 SITE2016-25 ICSS2016-31 EMM2016-39
pp.137-143
IT, ISEC, WBS 2016-03-11
11:15
Tokyo The University of Electro-Communications Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) IT2015-134 ISEC2015-93 WBS2015-117
Multivariate public key cryptsystem (MPKC) is one candidate for post-quantum cryptosystem. For the signature scheme Rain... [more] IT2015-134 ISEC2015-93 WBS2015-117
pp.205-210
ICSS, IPSJ-SPT 2016-03-03
15:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Current Status and Issues of the Application of AI Technology for Digital Forensics
Shinichi Matsumoto (ISIT), Kouichi Sakurai (Kyushu Univ.)
 [more]
 Results 1 - 20 of 87  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan