IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 132  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
11:45
Okinawa OIST
(Primary: On-site, Secondary: Online)
Security Analysis on End-to-End Encryption of Zoom Mail
Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ICSS2023-71
Zoom Mail, an email service offered by Zoom Video Communications, incorporates an end-to-end encryption (E2EE) scheme, t... [more] ICSS2023-71
pp.17-24
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2024-03-23
10:15
Nagasaki Ikinoshima Hall
(Primary: On-site, Secondary: Online)

Itsuki Nakai (TUT), Takaaki Fukai, Takahiro Hirofuchi (AIST), Yukinori Sato (TUT) CPSY2023-50 DC2023-116
(To be available after the conference date) [more] CPSY2023-50 DC2023-116
pp.71-76
RCC, ISEC, IT, WBS 2024-03-13
14:15
Osaka Osaka Univ. (Suita Campus) Proxy Re-encryption based on LPN
Haruki Fujimoto, Shingo Sato, Junji Shikata (YNU) IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
We propose a proxy re-encryption (PRE) scheme based on the Learning Parity with Noise (LPN) problem using error-correcti... [more] IT2023-88 ISEC2023-87 WBS2023-76 RCC2023-70
pp.79-86
RCC, ISEC, IT, WBS 2024-03-14
14:40
Osaka Osaka Univ. (Suita Campus) Encrypted data sharing system based on IBE secure against the KGC
Hinata Nishino, Emura keita (Kanazawa Univ) IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
Encryption technology to send and share data is popularized. However, these tools can protect communication route, but t... [more] IT2023-119 ISEC2023-118 WBS2023-107 RCC2023-101
pp.273-278
LOIS, ICM 2024-01-26
11:25
Nagasaki Nagasaki Prefectural Art Museum
(Primary: On-site, Secondary: Online)
A VPN Method for Security Usage of Public Wireless LANs
Hinata Tanoue, Akihiro Shimizu (Kochi Univ. of Tech.) ICM2023-37 LOIS2023-41
In public wireless LAN environments, ensuring security is an important issue. An effective method for secure communicati... [more] ICM2023-37 LOIS2023-41
pp.51-56
SIP 2023-08-07
12:50
Osaka Osaka Univ. (Suita) Convention Center
(Primary: On-site, Secondary: Online)
An Extension of Image Encryption for Vision Transformer Considering Privacy Protection
Haiwei Lin, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) SIP2023-46
In this paper, we propose an extended framework of access control for Vision Transformer (ViT).
The previous study acc... [more]
SIP2023-46
pp.1-6
EMM 2023-03-02
13:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Poster Presentation] An extension of reversible data hiding in encrypted images with high compression performance and flexible processing order
Eichi Arai, Shoko Imaizumi (Chiba Univ.) EMM2022-67
In this paper, we propose a reversible data hiding in encrypted images (RDH-EI) method that achieves both a high compres... [more] EMM2022-67
pp.1-6
IN, NS
(Joint)
2023-03-03
09:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Detection Method of DoH Communications from Non-Encrypted Information at a Middlebox
Yuya Takanashi, Shigetomo Kimura (Univ. of Tsukuba) IN2022-99
DNS over HTTPS (DoH) enhances users' privacy by encripting DNS
communications over HTTPS instead of plaintext. However... [more]
IN2022-99
pp.199-204
IN, NS
(Joint)
2023-03-03
10:10
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Access Control Method with Privacy Preservation in NDN
Yuma Fukagawa, Noriaki Kamiyama (Ritsumeikan Univ.) NS2022-221
Information-Centric Networking (ICN), which transfers Interest by the name of content without using name resolution and ... [more] NS2022-221
pp.310-315
EMM 2023-03-02
16:00
Nagasaki Fukue culture hall
(Primary: On-site, Secondary: Online)
[Invited Talk] Image transformation with random numbers for reliable AI
Hitoshi Kiya (TMU) EMM2022-87
The combined use of deep neural networks (DNNs) and images transformed with random sequences has given a new insight for... [more] EMM2022-87
pp.107-109
HWS, VLD 2023-03-02
15:20
Okinawa
(Primary: On-site, Secondary: Online)
Secure Cache System against On-Chip Threats
Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more]
VLD2022-95 HWS2022-66
pp.113-118
EMM 2023-01-26
09:30
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
Influence of Data Hiding in EtC-Image Classification with Vision Transformer
Kosuke Abe, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) EMM2022-61
A privacy-preserving image classification method with the vision transformer (ViT) was proposed in which the accuracy of... [more] EMM2022-61
pp.1-6
ICSS 2022-11-07
13:30
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
A scalable and asyncronus group end-to-end encryption protocol
Taigen Takeshita, Kousei Akama (Keio Univ.), Masaaki Sato (Tokai Univ.), Keisuke Uehara (Keio Univ.) ICSS2022-38
E2E encryption is useful as a method of maintaining message confidentiality in chat, a modern and easy means of communic... [more] ICSS2022-38
pp.1-6
HWS, ICD 2022-10-25
10:50
Shiga
(Primary: On-site, Secondary: Online)
Power current simulation and side channel leakage evaluation of cryptographic IC chips
Rikuu Hasegawa, Takuya Wadatsumi, Kazuki Monta, Takuji Miki, Makoto Nagata (Kobe Univ.) HWS2022-32 ICD2022-24
Cryptographic modules are threatened by side-channel attacks that use side-channel information to decrypt internal confi... [more] HWS2022-32 ICD2022-24
pp.12-16
CAS, SIP, VLD, MSS 2022-06-16
15:05
Aomori Hachinohe Institute of Technology
(Primary: On-site, Secondary: Online)
Image Classification Using Vision Transformer for Compressible Encrypted Images
Genki Hamano, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8
In this paper, we propose an image classification method for compressible encrypted images without losing classification... [more] CAS2022-8 VLD2022-8 SIP2022-39 MSS2022-8
pp.40-45
IT, ISEC, RCC, WBS 2022-03-11
09:40
Online Online [Invited Talk] Fundamentals and Security of Encrypted Control Systems
Kiminao Kogiso, Kaoru Teranishi (UEC) IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85
Networked control systems are constantly exposed to the threat of cyberattacks by malicious third parties. Cyberattacks ... [more] IT2021-110 ISEC2021-75 WBS2021-78 RCC2021-85
p.161
EMM 2022-03-08
11:15
Online (Primary: Online, Secondary: On-site)
(Primary: Online, Secondary: On-site)
An Extension of High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition
Eichi Arai, Shoko Imaizumi (Chiba Univ.) EMM2021-114
In this paper, we extend a previous reversible data hiding method in encrypted images of high-capacity that uses bit-pla... [more] EMM2021-114
pp.118-123
DC 2022-03-01
13:45
Tokyo Kikai-Shinko-Kaikan Bldg.
(Primary: On-site, Secondary: Online)
A Logic Locking Method based on SFLL-hd at Register Transfer Level
Yohei Noguchi, Masayoshi Yoshimura (Kyoto Sangyo Univ.), Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.) DC2021-72
In recent years, with the increase of VLSI integration, LSI design companies utilize circuit design information, called ... [more] DC2021-72
pp.45-50
RCS, NS
(Joint)
2021-12-16
10:35
Nara Nara-ken Bunka Kaikan and Online
(Primary: On-site, Secondary: Online)
Highly efficient multi-hop transmission using encryption-then-compression based on CRC-aided Polar code
Ryota Yatsu, Koji Ishibashi (UEC), Hideki Endo, Sota Tsuchiya (Tokyo Gas) RCS2021-175
Packet aggregation with compression has been proposed as one of the methods in order to reduce the transmission time, wh... [more] RCS2021-175
pp.1-6
DC 2021-12-10
14:00
Kagawa
(Primary: On-site, Secondary: Online)
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] DC2021-57
pp.13-18
 Results 1 - 20 of 132  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan