|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2021-06-22 10:50 |
Online |
Online |
Simulation Evaluation of Incentives for RPKI Deployment Tatsuya Oryu, Ishibashi Keisuke (ICU) IA2021-13 ICSS2021-13 |
The effectiveness of Resource Public Key Infrastructure (RPKI) has been proposed as a countermeasure against BGP route h... [more] |
IA2021-13 ICSS2021-13 pp.68-73 |
ICSS |
2015-03-04 10:25 |
Okinawa |
Meio Univiersity |
Improving certificate validation function in SSL/TLS implementations of web browser Satoshi Kamekawa (JAIST), Atsuko Miyaji (JAIST/JST CREST), Yuichi Futa (JAIST) ICSS2014-84 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ICSS2014-84 pp.127-132 |
ISEC, LOIS, SITE |
2014-11-22 13:20 |
Hyogo |
|
Improving certificate validation in SSL/TLS implementations Satoshi Kamekawa, Atsuko Miyaji, Yuichi Futa (JAIST) ISEC2014-67 SITE2014-58 LOIS2014-37 |
Secure Socket Layer(SSL)/Transport Layer Security(TLS) is a secure communication channel between a server and a client. ... [more] |
ISEC2014-67 SITE2014-58 LOIS2014-37 pp.65-70 |
IA |
2010-11-24 15:35 |
Yamanashi |
Seisen-Ryo |
Design of a Certified E-mail System without a Trusted Third Party Satoshi Ishibashi, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) IA2010-54 |
These days, as e-mails become more and more important, the demand for certified e-mail is growing. Methods for certified... [more] |
IA2010-54 pp.19-24 |
IN |
2009-12-11 11:15 |
Hyogo |
KOBE UNIVERSITY |
Proposal of Trust and Public Key Management over MANET Hideaki Kawabata (Tokai Univ.), Yoshiko Sueda (NTT), Osamu Mizuno (Kogakuin Univ.), Hiroshi Ishii (Tokai Univ.) IN2009-102 |
There have been a number of proposals for self-organizing key management frameworks using web-of-trust defined in Pretty... [more] |
IN2009-102 pp.87-92 |
NS, IN (Joint) |
2008-03-07 09:35 |
Okinawa |
Bankoku Shinryokan |
Self-organized Public Key Management by using a List of Trust Relationship over Mobile Ad Hoc Networks Hideaki Kawabata, Hiroshi Ishii (Tokai Univ.) IN2007-235 |
Several self-organized public key management methods have been already proposed as a certification technology in mobile ... [more] |
IN2007-235 pp.455-459 |
IT, ISEC, WBS |
2007-03-16 14:50 |
Gunma |
Gunma Univ. (Kiryu Campus) |
A technique for making PKI robust Masaki Yoshida, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Manabu Maeda (Matsushita) |
We study a strategy for recovering a PKI system without reconstructing the whole one when the trust anchor has been brok... [more] |
IT2006-105 ISEC2006-160 WBS2006-102 pp.119-124 |
ISEC, LOIS |
2004-11-09 10:55 |
Osaka |
Osaka Univ. |
One-Time Key Type Authentication Scheme for P2P Service Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
In P2P service, there is the case a user would not like to register his/her secret information such as password, because... [more] |
ISEC2004-89 OIS2004-56 pp.29-36 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|