IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 80 of 110 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2015-03-03
16:15
Okinawa Meio Univiersity Link Structural Analysis of Drive-by-Download Attacks
Yuji Dairiki (Kobe Univ.), Masaki Kamizono (SecureBrain), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2014-70
In analyzing Drive-by-Download (DBD) attack, it is basic and essential to analysis the link structure through tracking t... [more] ICSS2014-70
pp.43-48
ICSS 2015-03-04
11:15
Okinawa Meio Univiersity A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-86
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is require... [more] ICSS2014-86
pp.139-144
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] ICSS2014-91
pp.169-174
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] ICSS2014-92
pp.175-179
ICSS 2015-03-04
14:30
Okinawa Meio Univiersity Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Takeru Naruse (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-93
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for data access control on a cloud storage system. In ... [more] ICSS2014-93
pp.181-186
ICSS, IA 2014-06-06
14:50
Hyogo Takikawa Memorial Hall, Kobe University List Representation Using Succinct Data Structure for Packet Filtering
Yuta Kitamura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-12 ICSS2014-12
In packet filtering, increase of filtering rules causes the following two problems; complication of grasping all rules a... [more] IA2014-12 ICSS2014-12
pp.61-65
ICSS, IA 2014-06-06
15:15
Hyogo Takikawa Memorial Hall, Kobe University A Web-based Encrypted File Sending and Receiving System and Applying OpenID Authentication
Kohei Isobe (Nagoya Inst. of Tech.), Masanori Hirotomo (Saga Univ.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) IA2014-13 ICSS2014-13
In the case of sending and receiving files which need secret via the Internet, files get encrypted. Encrypting files req... [more] IA2014-13 ICSS2014-13
pp.67-72
ICSS, IPSJ-SPT 2014-03-27
14:20
Okinawa Meio Univiersity General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] ICSS2013-65
pp.19-24
ICSS, IPSJ-SPT 2014-03-27
14:55
Okinawa Meio Univiersity SSL Client Authentication with TPM -- Issuance of Public Key Certificate with OpenID and Terminal Authentication with SSL Client Certificate --
Akihito Shinoda (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-66
TPM-embedded terminals can be used as authentication tokens by issuing certificates to signature keys generated by TPM. ... [more] ICSS2013-66
pp.25-30
ICSS, IPSJ-SPT 2014-03-28
14:45
Okinawa Meio Univiersity Supporting Effect Assessment of Accessing Malicious Web Sites with Multi-Environment Analysis
Takayuki Yoshinori, Akihito Shinoda (Nagoya Inst. of Tech), Masaki Kamizono (NICT), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech) ICSS2013-85
It is not always true that enough information can be got by just using website analysis services, because some malicious... [more] ICSS2013-85
pp.161-166
LOIS 2014-03-08
15:30
Okinawa   Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] LOIS2013-77
pp.137-141
LOIS 2014-03-08
16:20
Okinawa   Linkable System Using Encrypted Personal Identification Information for Clinical Research
Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] LOIS2013-79
pp.149-154
ISEC, LOIS 2013-11-29
10:55
Miyagi Tohoku Univ. on evaluation for estimating link loss rates by using network coding
Youji Fukuta (Aichi Univ. of Education), Yoshiaki Shiraishi (Kobe Univ.), Masami Mohri (Gifu Univ.) ISEC2013-66 LOIS2013-32
Monitoring or inference of internal network characteristics, such as transmission topology, link losses and delay, from ... [more] ISEC2013-66 LOIS2013-32
pp.45-50
ICSS 2013-03-25
11:10
Kanagawa Yokohama National University Design and Implementation of Application Framework for Pairing-based Cryptography
Takuya Ban (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-59
Applications of pairing-based cryptography are searchable encryption, secure function evaluation and so on. To implement... [more] ICSS2012-59
pp.13-18
ICSS 2013-03-25
11:35
Kanagawa Yokohama National University Partially Doubly-Encrypted ID-based Encryption and its Security
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] ICSS2012-60
pp.19-24
LOIS 2013-03-07
14:10
Okinawa   A Secure Personal Information Management Method Using Linkable Anonymizing and Hybrid Cipher for Information Sharing Systems in Home Medical Care and Nursing
Taichi Tatsuda, Wataru Mizoguchi, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-80
There is a demand for collaborative approach to provide efficient services with various profession in the home medical c... [more] LOIS2012-80
pp.65-70
LOIS 2013-03-07
14:30
Okinawa   Medical Consumer Controllable Information Disclosing Method by Secret Sharing for Personal Health Record
Wataru Mizoguchi, Taichi Tatsuda, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-81
There is a need for self-management of medical and health information by medical consumers themselves using PHR(Personal... [more] LOIS2012-81
pp.71-76
ICSS 2012-11-22
10:45
Hiroshima Miyajima Mori-no-Yado On Distribution of Certificate Revocation List Using Random Network Coding for VANET
Taisuke Yamamoto, Tomoki Matsukawa (NITECH), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH) ICSS2012-45
Intelligent transport system (ITS) is for resolving traffic accidents and congestion by using information and communicat... [more] ICSS2012-45
pp.1-6
ICSS 2012-11-22
15:10
Hiroshima Miyajima Mori-no-Yado A Framework for Issuing AIK Certificate for Two-Factor Authentication by TPM and Its Support System
Akihito Shinoda (NITECH), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (NITECH), Ryoji Noguchi (Toyotsu Syscom) ICSS2012-52
An information system that handles confidential information should be used multi-factor authentication. TPM-embedded ter... [more] ICSS2012-52
pp.43-48
ICSS 2012-11-22
16:00
Hiroshima Miyajima Mori-no-Yado On the Sense of Security for Registering Privacy Information to Return Refugee Supporting System
Kaori Okumura, Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-54
In Japan, public transportation is sometimes temporary suspended because of a typhoon and a torrential downpour. Hence, ... [more] ICSS2012-54
pp.55-60
 Results 61 - 80 of 110 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan