IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 111 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CAS, CS 2017-02-23
17:05
Shiga   [Special Invited Talk] Cybersecurity for Japan -- Toward Tokyo 2020 and IoT Era --
Atsuhiro Goto (IISEC)
 [more]
ICSS 2016-11-25
14:15
Kanagawa Institute of Information Security Study of behavior each malware function from the API calls
Nobuki Suetsugu, Masaki Hashimoto (IISEC) ICSS2016-40
In recent years, there are various studies to malicious behavior detection. In particular, for the detection, much techn... [more] ICSS2016-40
pp.9-14
ISEC 2016-09-02
10:10
Tokyo Kikai-Shinko-Kaikan Bldg. Bundling Proofs of Knowledge and its Application to Signatures
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) ISEC2016-39
(To be available after the conference date) [more] ISEC2016-39
pp.9-14
ICSS, IPSJ-SPT 2016-03-04
11:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Preliminary Studies of Linkage Analysis among Process Behavior for Intrusion Prevention
Yudai Tomaru, Masaki Hashimoto, Hidehiko Tanaka (iisec) ICSS2015-61
Recently, there are many malware measures such as targeted attacks, communicate with C&C servers, file creation, executi... [more] ICSS2015-61
pp.83-88
ICSS 2015-11-27
14:15
Fukushima AIST, Fukushima Renewable Energy Institute Towards A Practical Implementation of Mandatory Access Control with Logic-Based Language
Masaki Hashimoto, Minetoshi Takizawa (IISEC), Fumihiko Takayama (IIT), Hidenori Tsuji, Hidehiko Tanaka (IISEC) ICSS2015-44
SELinux is an effective MAC system for preventing damage from spreading after security breaches.
In this paper, we repl... [more]
ICSS2015-44
pp.55-60
KBSE, SS, IPSJ-SE [detail] 2015-07-23
10:40
Hokkaido   Proposal of EMSsec-Common Problem for Security and Privacy
Takao Okubo (IISEC), Haruhiko Kaiya (Kanagawa Univ.), Hironori Washizaki (Waseda Univ.), Shinpei Ogata (Shinshu Univ.), Yoshio Kakizaki (Dendai Univ.), Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) SS2015-22 KBSE2015-15
 [more] SS2015-22 KBSE2015-15
pp.69-74
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:15
Aichi NAGOYA TRADE & INDUSTRY CENTER Attribute-Based Two-Tier Signatures
Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more]
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17
pp.1-8
ISEC 2015-05-15
14:35
Tokyo Kikai-Shinko-Kaikan Bldg. Path analysis method of anonymous communication system Tor
Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] ISEC2015-3
pp.15-22
KBSE 2015-03-05
15:25
Tokyo The University of Electro-Communications A Case-based Management System for Secure Software Development Using Software Security Knowledge
Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] KBSE2014-57
pp.31-36
ICSS 2015-03-04
13:40
Okinawa Meio Univiersity Partially Doubly-Encrypted Identity-Based Encryption for Content Centric Networking
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-91
Information Centric Networking (ICN) is a promising paradigm for future architecture of the Internet. Content Centric Ne... [more] ICSS2014-91
pp.169-174
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity A Transformation from Attribute-based Encryption to Associative Searchable Encryption by Using Hash Function
Koji Tomida (Nagoya Inst. of Tech.), Hiroshi Doi (IISEC), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-92
Combining the concept of PEKS and IBE, the Identity-Based Encryption with Keyword Search (IBEKS) has been proposed. In I... [more] ICSS2014-92
pp.175-179
NS, IN
(Joint)
2015-03-03
14:50
Okinawa Okinawa Convention Center A Study on Monitoring of FlowMod Processing in OpenFlow Networks
Kohei Yoshida (Kogakuin Univ), Akihiro Nakao (Tokyo Univ), Masato Oguchi (Ochanomizu Univ), Atsuhiro Goto (IISEC), Shu Yamamoto (Tokyo Univ), Saneyasu Yamaguchi (Kogakuin Univ) NS2014-258
Using SDN, network services can be managed by a centralized controllerand their setting can be dynamically modified. How... [more] NS2014-258
pp.475-480
KBSE 2015-01-27
11:15
Tokyo Kikai-Shinko-Kaikan Bldg. Case base of secure web application development using software security knowledge base
Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] KBSE2014-47
pp.49-54
CS, NS, IN
(Joint)
2014-09-12
14:50
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan The proposal of the privacy protection technique in the network using positional addresses
Taichi Aoki (IISEC) NS2014-101
Our study is a network, that is using location information as an address. One of the theme of a position address
networ... [more]
NS2014-101
pp.129-134
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:35
Hokkaido San-Refure Hakodate On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT) ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27
pp.171-179
ICSS, IPSJ-SPT 2014-03-27
14:20
Okinawa Meio Univiersity General Construction of Certified Data Transmission Protocol Using ID-Based Encryption and ID-Based Signature
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) ICSS2013-65
Certified data transmission protocols are used to attest to the fact that online deals of data is actually made. It is d... [more] ICSS2013-65
pp.19-24
ICSS, IPSJ-SPT 2014-03-28
14:45
Okinawa Meio Univiersity System Security Analysis using Dependency Relationship on Cloud
Yoshiro Wataguchi, Nobuyuki Kanaya (FUJITSU labs), Takao Okubo (IISEC) ICSS2013-93
Recently, many systems are developed using the cloud computing environment. In those systems, an operator of a SaaS uses... [more] ICSS2013-93
pp.231-236
LOIS 2014-03-08
15:30
Okinawa   Identity-Based Encryption for Cloud-Based File Transmission Service and its Evaluation
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-77
While cloud computing is becoming popular, it is not negligible that still many people have a reluctance to place import... [more] LOIS2013-77
pp.137-141
ISEC, LOIS 2013-11-29
13:30
Miyagi Tohoku Univ. The proposal on a vulnerability evaluation method according to information system environment
Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] ISEC2013-69 LOIS2013-35
pp.65-70
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
16:05
Hokkaido   On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
pp.75-84
 Results 21 - 40 of 111 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan