IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 476 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
BioX, SIP, IE, ITE-IST, ITE-ME [detail] 2023-05-19
13:30
Mie Sansui Hall, Mie University
(Primary: On-site, Secondary: Online)
Writer Verification Based on Finger-writing of a Simple Symbol -- Introduction of Finger-softness Feature --
Takumi Fukuda, Takahiro Horiuchi, Isao Nakanishi (Tottori Univ) SIP2023-14 BioX2023-14 IE2023-14
We proposed writer verification based on writing of a simple symbol on a smartphone screen, called where users draw a si... [more] SIP2023-14 BioX2023-14 IE2023-14
pp.63-68
BioX, SIP, IE, ITE-IST, ITE-ME [detail] 2023-05-19
14:00
Mie Sansui Hall, Mie University
(Primary: On-site, Secondary: Online)
Frequency Bandwidth Reduction of High-Frequency Intra-Body Propagation Characteristics Used for Attacker's Touch Detection in Fingerprint Authentication
Shunichi Tomura, Koki Yamada, Takahiro Yoshida (TUS) SIP2023-15 BioX2023-15 IE2023-15
In previous studies in our laboratory, we have proposed the attacker’s touch detection method in fingerprint authenticat... [more] SIP2023-15 BioX2023-15 IE2023-15
pp.69-73
ICD 2023-04-10
16:05
Kanagawa
(Primary: On-site, Secondary: Online)
[Invited Lecture] Strong PUF Using SRAM Weak PUF-Based Secret Substitution Layer for Edge-Device Security Applications
Kunyang Liu, Hirofumi Shinohara (Waseda Univ.) ICD2023-7
Strong physically unclonable function (PUF) provides a promising solution for lightweight security applications aimed at... [more] ICD2023-7
p.15
SC 2023-03-17
13:25
Tokyo NII
(Primary: On-site, Secondary: Online)
A Self-Sovereign Service platform with Decentralized Identity and Smart Contracts
Ryo Tateishi, Tatsuto Kibe, Kousuke Kakumoto, Hosono Shigeru (TUT) SC2022-43
The authors propose a design method for a Self-Sovereign service platform that realizes Web 3.0 architecture. To transfo... [more] SC2022-43
pp.28-33
IN, NS
(Joint)
2023-03-02
10:20
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Non-Repudiation Broadcast Authentication Methods for C-V2X Communication
Takaaki Kasai, Takeshi Ogawa (Tokyo Denki Univ.) NS2022-176
In this paper, we propose a real-time and low-computation authentication method for broadcast communication in C-V2X. Th... [more] NS2022-176
pp.53-58
IN, NS
(Joint)
2023-03-03
11:40
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Implementation and Evaluation of Mutual Authentication Scheme in Information-Centric Networking based Wireless Sensor Networks
Takafumi Taya, Eishin Nagaoka, Osamu Mizuno (Kogakuin University) IN2022-113
We have proposed ICSN that applies ICN to Wireless Sensor Networks with the aim of realizing multiple IoT services in a ... [more] IN2022-113
pp.283-288
CNR, BioX 2023-03-01
13:30
Oita
(Primary: On-site, Secondary: Online)
Person Authentication based on Palm Images Using CNN
Kai Ebato, Kouya Tochikubo, Mitsuhiko Meguro (Nihon Univ.) BioX2022-67 CNR2022-33
While conventional biometric authentication extracts geometric features from images, this paper proposes a personal auth... [more] BioX2022-67 CNR2022-33
pp.30-35
CNR, BioX 2023-03-01
14:15
Oita
(Primary: On-site, Secondary: Online)
[Invited Talk] A study on biometric performance evaluation using artificially generated sample images
Mitsutoshi Himaga (JAISA) BioX2022-68 CNR2022-34
In order to evaluate the accuracy of biometric systems, it is necessary to collect biometric samples from a large number... [more] BioX2022-68 CNR2022-34
pp.36-41
CNR, BioX 2023-03-02
11:30
Oita
(Primary: On-site, Secondary: Online)
A Study on Single Modal Ear Acoustic Personal Authentication System
Sora Takagi (Kansai Univ.), Shunsuke Kita (ORIST), Yoshinobu Kajikawa (Kansai Univ.) BioX2022-73 CNR2022-39
Biometric authentication requires the provision of the user's personal biometric information.Currently, the mainstream b... [more] BioX2022-73 CNR2022-39
pp.65-68
LOIS, ICM 2023-01-19
15:00
Fukuoka Kitakyushu International Conference Center
(Primary: On-site, Secondary: Online)
Study of similarity calculation method personal authentication method using changeable granularity living areas based on GPS data
Daisuke Toyama, Sunao Hara, Masanobu Abe (Okayama Univ.) ICM2022-35 LOIS2022-35
In this study, we study personal authentication using the living areas based on GPS data.The latitude and longitude of t... [more] ICM2022-35 LOIS2022-35
pp.25-30
HCGSYMPO
(2nd)
2022-12-14
- 2022-12-16
Kagawa Onsite (Sunport Takamatsu) and Online
(Primary: On-site, Secondary: Online)
Proposal of a PIN input method using an eye tracking device
Kawon Kogi, Tsubasa Tojo, Manabu Okamoto (KAIT)
To use Web services, we need to be authenticated and we need to input passwords. However the people with a physical disa... [more]
HCGSYMPO
(2nd)
2022-12-14
- 2022-12-16
Kagawa Onsite (Sunport Takamatsu) and Online
(Primary: On-site, Secondary: Online)
Proposal of a Confidential Information Entry Method without Fingers
Motoharu Tanaka, Jyunpei Kayama, Otoha Kashiwagi, Shiori Ando, Manabu Okamoto (KAIT)
To use Web services, we need to be authenticated and we need to input passwords. However the people with a physical disa... [more]
ISEC, SITE, LOIS 2022-11-18
17:45
Online Online Aggregate Entity Authentication with Group Testing
Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) ISEC2022-46 SITE2022-50 LOIS2022-30
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication schem... [more] ISEC2022-46 SITE2022-50 LOIS2022-30
pp.100-106
HWS, ICD 2022-10-25
16:15
Shiga
(Primary: On-site, Secondary: Online)
Design and Implementation of Payload Encryption and MAC for CAN Communication Using Lightweight Encryption SIMON
Tomoya Tsuboi, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ) HWS2022-41 ICD2022-33
CAN, which is widely used for in-vehicle networks, is a low-cost and efficient connection between electronic control uni... [more] HWS2022-41 ICD2022-33
pp.64-69
MWPTHz, EST, MW, EMT, OPE, IEE-EMT [detail] 2022-07-19
09:20
Hokkaido Asahikawa Civic Culture Hall
(Primary: On-site, Secondary: Online)
Proposal for 3D vein authentication
Tomoatsu Hasegawa, Hideaki Kimura (Chubu Univ.) EMT2022-7 MW2022-31 OPE2022-10 EST2022-8 MWPTHz2022-5
Today, digital security devices are used in a variety of locations.However, some digital authentication devices have cri... [more] EMT2022-7 MW2022-31 OPE2022-10 EST2022-8 MWPTHz2022-5
pp.1-4
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
15:40
Online Online Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology
Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21
pp.35-39
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
11:05
Online Online A Study on Biometric Modality for Continuous Authentication of Smart Devices
Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.) ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28
In recent years, with the rapid spread of smart devices, biometric authentication technology has been widely used as a u... [more] ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28
pp.70-75
SIP, BioX, IE, MI, ITE-IST, ITE-ME [detail] 2022-05-20
15:00
Kumamoto Kumamoto University Kurokami Campus
(Primary: On-site, Secondary: Online)
Person Verification Based on Finger-Writing of a Simple Symbol on a Smartphone -- Finger contact direction feature extraction by frequency distribution --
Takahiro Horiuchi, Masaya yamazaki, Isao Nakanishi (Tottori Univ.) SIP2022-25 BioX2022-25 IE2022-25 MI2022-25
We have studied on a technology to verify an individual by drawing a simple symbol that everyone are familiar and never ... [more] SIP2022-25 BioX2022-25 IE2022-25 MI2022-25
pp.126-131
NS, IN
(Joint)
2022-03-10
11:20
Online Online A Study on Telephone System with User Authentication
Hiromu Aoshima (NTT) NS2021-132
I propose a telephone system with a function to authenticate individual users. In this system, if callees register calle... [more] NS2021-132
pp.59-63
IT, ISEC, RCC, WBS 2022-03-11
11:10
Online Online Corruption-Correctable Message Authentication Code
Isamu Furuya, Akiko Inoue, Kazuhiko Minematsu (NEC) IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89
We propose correction correctable MAC, which enables to verify data integrity and to correct corruptions of the data.
A... [more]
IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89
pp.180-187
 Results 21 - 40 of 476 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan