Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
RCC, ISEC, IT, WBS |
2023-03-14 11:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Analysis of (U,U+V)-code Problems with Gramians over Binary and Ternary Fields Ichiro Iwata, Yusuke Yoshida, Keisuke Tanaka (Tokyo Tech) IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 |
Debris-Alazard, Sendrier, and Tillich proposed SURF in 2017, which is an efficient code-based signature scheme. However,... [more] |
IT2022-78 ISEC2022-57 WBS2022-75 RCC2022-75 pp.68-73 |
ICSS, IPSJ-SPT |
2022-03-08 11:20 |
Online |
Online |
A Method for Content Rights Succession and Editing Control Extended to Multi-dimensional Mesh Structures Shinjiro Izumi (TUS), Masaki Inamura (Hiroshima City Univ.), Keiichi Iwamura (TUS) ICSS2021-71 |
In recent years, the CGM media, which is created and distributed by consumers themselves, has become popular, such as Yo... [more] |
ICSS2021-71 pp.72-77 |
EMM |
2019-03-14 10:40 |
Okinawa |
TBD |
Implementation of Digital Signature to QR Symbol with Compatible using Subcell Division and Double Encoding Nobuyuki Teraura (Terrara Code), Isao Echizen (NII), Keiichi Iwamura (TUS) EMM2018-113 |
(To be available after the conference date) [more] |
EMM2018-113 pp.117-122 |
NS |
2019-01-18 13:05 |
Nagasaki |
Nagasaki Prefectural Art Museum |
A Study on Traceability in Supply Chain Network Takeshi Kawasaki, Motoshi Horii, Toshihiko Kurita, Satoshi Imai (FUJITSU LABS.) NS2018-185 |
On today’s complex supply chain networks, traceability is needed to offer a useful information for players in them. In t... [more] |
NS2018-185 pp.41-46 |
ICSS, IA |
2018-06-26 09:00 |
Ehime |
Ehime University |
IA2018-8 ICSS2018-8 |
(To be available after the conference date) [more] |
IA2018-8 ICSS2018-8 pp.47-54 |
ASN, MoNA, MICT (Joint) |
2017-01-19 14:00 |
Oita |
|
Efficient Electronic Signature Method of Vehicle-to-Vehicle Data Communication Satoshi Kawakami, Kenya Sato (Doshisha Univ.) MoNA2016-29 |
Research on intelligent transportation systems aimed at improving the safety of automobiles and comfort of drivers is ac... [more] |
MoNA2016-29 pp.1-5 |
LOIS, IPSJ-SPT, IPSJ-CN |
2016-05-12 13:30 |
Tokyo |
|
A study on utilizing the Public Certification Service for Individuals in the qualification of medical insurance Kenichi Fukuda, Takashi Obi, Kazuyuki Nagata, Hiroyuki Suzuki, Naoko Taira, Nagaaki Ohyama (Tokyo Tech) LOIS2016-1 |
With the introduction of the Social Security and Tax Number System, the Public Certification Service for Individuals(JPK... [more] |
LOIS2016-1 pp.1-6 |
EMM |
2016-03-02 15:40 |
Kagoshima |
Yakushima Environ. and Cultural Vill. Center |
[Poster Presentation]
Copyright Protection Scheme to Realize Edit Control between Two or More contents Tatsuya Fujimoto, Keiichi Iwamura (TUS) EMM2015-84 |
We propose a new copyright protection technology suitable for editable contents, in contrast the conventional copyright ... [more] |
EMM2015-84 pp.45-50 |
LOIS |
2015-03-06 11:10 |
Okinawa |
|
A study on the possibility of utilizing the Public Certification Service for Individuals in the field of finance or credit settlement. Kazushige Fujita, Takashi Obi, Masuyoshi Yachida, Joong Sun Lee, Naoko Taira, Makoto Oku, Eikazu Niwano, Satoshi Noritake, Kenichi Fukuda, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Tech) LOIS2014-84 |
With the introduction of the Social Security and Tax Number System, electronic authentication function, which is require... [more] |
LOIS2014-84 pp.135-140 |
EMM |
2014-03-07 15:00 |
Ishikawa |
JAIST |
[Poster Presentation]
Feasible and content protection system at the same time edit control with signature inheritance Katsuma Koga, Keiichi Iwamura, Masaki Inamura (Tokyo Univ. of Science), Isao Echizen (NII) EMM2013-111 |
In the draft, it is insufficient in the market of Ntentsu circulation technology for copyright protection of current, we... [more] |
EMM2013-111 pp.69-74 |
LOIS, ICM |
2014-01-16 15:40 |
Nagasaki |
Nagasaki Museum of History and Culture |
A study on cooperation between the public sector and the private sector by utilizing the Public Certification Service for Individuals. Kazushige Fujita, Takashi Obi, Chikahiro Miyokawa, Masuyoshi Yachida, Joong Sun Lee, Tetsuya Natsume, Naoko Taira, Eikazu Niwano, Makoto Kumakura, Yoshiaki Iwamaru, Nagaaki Ohyama (Tokyo Inst. of Tech.) ICM2013-40 LOIS2013-44 |
With the introduction of the Social Security and Tax Number System, electronic authentication function, which is require... [more] |
ICM2013-40 LOIS2013-44 pp.29-34 |
ICSS |
2012-11-22 10:45 |
Hiroshima |
Miyajima Mori-no-Yado |
On Distribution of Certificate Revocation List Using Random Network Coding for VANET Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) ICSS2012-45 |
Intelligent transport system (ITS) is for resolving traffic accidents and congestion by using information and communicat... [more] |
ICSS2012-45 pp.1-6 |
ICSS, IA |
2012-06-21 14:55 |
Tokyo |
Room 1206, 1st bldg, Takanawa Campus, Tokai University |
A Proposal of a Functional Extension Framework for Authn & Authz Federation Infrastructure using Web Browser Add-on Toyokazu Akiyama (Kyoto Sangyo Univ.), Takeshi Nishimura, Kazutsuna Yamaji, Motonori Nakamura (NII) IA2012-3 ICSS2012-3 |
We have constructed an academic authn \& authz infrastructure by
using Web single sign-on in a community, named GakuNin... [more] |
IA2012-3 ICSS2012-3 pp.13-18 |
ISEC |
2010-09-10 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Security of the Algebraic Surface Signature Scheme Koichi Sakumoto, Taizo Shirai, Harunaga Hiwatari (Sony) ISEC2010-39 |
ASS-CC proposed by Komano et al. the first signature scheme that is based on hardness of a section finding problem (SFP)... [more] |
ISEC2010-39 pp.9-12 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-02 16:35 |
Aomori |
Hirosaki University |
Cost Estimates of CNTW Attack against EMV Signatures Yumi Sakemi (Okayama Univ.), Tetsuya Izu, Masahiko Takenaka (FUJITSU Lab.), Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.) ISEC2010-36 SITE2010-32 ICSS2010-42 |
Specification of EMV signatures is an ISO/IEC 9796-2 compliant format with extra redundancy, and used for certifying cre... [more] |
ISEC2010-36 SITE2010-32 ICSS2010-42 pp.195-201 |
WBS, IT, ISEC |
2009-03-09 09:00 |
Hokkaido |
Hakodate Mirai Univ. |
Proposal of Piece Falsification Detection Method on JetJigsaw Tatsuyuki Matsushita, Kentaro Umesawa, Shinji Yamanaka (Toshiba) IT2008-43 ISEC2008-101 WBS2008-56 |
In SCIS2009, we proposed JetJigsaw, a content delivery method with content protection mechanism[SCIS2009]. We introduced... [more] |
IT2008-43 ISEC2008-101 WBS2008-56 pp.1-6 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Efficiency of a Redactable Signature with Tree Construction Kunihiko Miyazaki, Yasuo Hatano, Yoshinori Honda (Hitachi Ltd.) |
A digital signature does not allow any alteration of the document to which it is attached. Appropriate alteration of som... [more] |
ISEC2008-22 SITE2008-16 pp.45-50 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 11:10 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Examination of the issues in designing of electronic signature documentation system Miyuki Takao, Koichiro Hayashi (IISEC) ISEC2008-38 |
Electronic signature and Digital timestamp are new technologies which provide high level integrity to digital data. But ... [more] |
ISEC2008-38 pp.23-30 |
ISEC |
2008-05-16 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2008-15 |
There is an open problem to construct ID-based signature schemes which satisfy strongly EUF-ID-CMA, without random oracl... [more] |
ISEC2008-15 pp.99-106 |