IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 111 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SITE, IPSJ-EIP 2013-05-16
11:25
Kanagawa Institute of Infomation Security Proposal of SNS Membership Qualification System Using Security Information Database
Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] SITE2013-3
pp.11-16
SITE, IPSJ-EIP 2013-05-16
13:30
Kanagawa Institute of Infomation Security [Invited Talk] Property versus Secrecy: -- Toward A General Theory for Information Law --
Koichiro Hayashi (Institute of Information Security) SITE2013-5
 [more] SITE2013-5
pp.23-28
ICSS 2013-03-25
11:35
Kanagawa Yokohama National University Partially Doubly-Encrypted ID-based Encryption and its Security
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] ICSS2012-60
pp.19-24
IA, SITE, IPSJ-IOT [detail] 2013-03-15
16:05
Nara Todaiji Total Cultural Center A Fieldwork Study on Location Privacy Issues Caused by Wi-Fi/Bluetooth Communication
Shogo Orio, Hiroshi Ueda (Kyoto Univ.), Tetsutaro Uehara (RIIS), Yu Tsuda (Kyoto Univ.), Katsuyasu Yoshimura, Tomohide Yamamura, Ryouichi Nomura (FXSS) SITE2012-71 IA2012-109
In Wi-Fi and Bluetooth connection, by specifications, devices exchange their unique assigned device addresses in the cle... [more] SITE2012-71 IA2012-109
pp.249-254
NS, IN
(Joint)
2013-03-08
09:40
Okinawa Okinawa Zanpamisaki Royal Hotel Proposition on Identity Management for Business Users in Cloud Environment
Takuma Iwabuchi, Atsuhiro Goto (IISEC) NS2012-259
With the recent growth of cloud computing market and with ID life cycle becoming more multifaceted, the importance of ID... [more] NS2012-259
pp.547-552
NS, IN
(Joint)
2013-03-08
13:40
Okinawa Okinawa Zanpamisaki Royal Hotel A Study of sensor data privacy concern from multiple points of view toward its fully utilizing society
Takamichi Aso, Atsuhiro Goto (IISEC) NS2012-284
Recently sensor service gets attention. It has some big opportunities because of using of various and large amount of da... [more] NS2012-284
pp.693-698
NS, IN
(Joint)
2013-03-08
14:30
Okinawa Okinawa Zanpamisaki Royal Hotel Android Security Improvement by Visualization of Application Behavior
Rika Hayashi, Atsuhiro Goto (IISEC) NS2012-286
Android applications which work out of users' intention, "suspicious application", are becoming from "annoying" to "thre... [more] NS2012-286
pp.705-710
NS, IN
(Joint)
2013-03-08
14:50
Okinawa Okinawa Zanpamisaki Royal Hotel Comparing Malware with Already Analyzed One to Make Static Analysis Efficient
Hiroki Hada, Atsuhiro Goto (IISEC) NS2012-287
 [more] NS2012-287
pp.711-716
ICSS 2012-11-22
11:35
Hiroshima Miyajima Mori-no-Yado An analytical study for sensor service provider to keep their use's security
Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] ICSS2012-47
pp.13-18
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM
(Joint) [detail]
2012-07-20
11:00
Ibaraki University Hall, University of Tsukuba Location Proof by GPS and WLAN Information
Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] MoMuC2012-18 IE2012-43
pp.43-48
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
13:30
Hokkaido   Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems -- For Overcoming Contradiction of Protection and Utilization of Personal Data --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
 [more] ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
pp.175-179
ICSS 2012-03-16
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy
Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] ICSS2011-47
pp.49-54
KBSE 2011-09-21
09:30
Overseas Ocean Grand Hotel Jeju Development of a Software Security Learning Environment
Atsuo Hazeyama (TGU), Hiroto Shimizu (IIS) KBSE2011-24
Importance for software security technologies has been recognized according to increase of services on the internet. It ... [more] KBSE2011-24
pp.1-6
ISEC, IT, WBS 2011-03-03
10:50
Osaka Osaka University Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] IT2010-70 ISEC2010-74 WBS2010-49
pp.15-22
ISEC, IT, WBS 2011-03-03
11:15
Osaka Osaka University A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] IT2010-71 ISEC2010-75 WBS2010-50
pp.23-30
AN, MoNA, USN
(Joint)
2011-01-21
10:30
Hiroshima Hiroshima City University Computer Simulation on Rescueing Movement using Adhoc Network in case of a disaster
Yuta Koide, Naoshi Sato, Kazuyuki Ishii (IISEC) USN2010-58
A variety of wireless networks were high-speed and steady and it came to be organizable as the wireless technology devel... [more] USN2010-58
pp.107-112
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
10:30
Aomori Hirosaki University On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2010-26 SITE2010-22 ICSS2010-32
pp.123-132
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
13:25
Aomori Hirosaki University Attribute-based encryption with arbitrary number of authorities
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] ISEC2010-30 SITE2010-26 ICSS2010-36
pp.153-158
IT, ISEC, WBS 2010-03-04
09:25
Nagano Nagano-Engineering Campus, Shinshu University Considerations on Web System Development Process against XSS worms.
Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security) IT2009-73 ISEC2009-81 WBS2009-52
(To be available after the conference date) [more] IT2009-73 ISEC2009-81 WBS2009-52
pp.7-14
AI 2010-01-22
11:00
Tokyo   Reduction technique of user rating histories for information filtering systems
Takayuki Uda (IISEC), Tetsuo Kinoshita (TOHOKU Univ.) AI2009-21
The information filtering system refers to action histories and evaluation histories of the user to perform filtering. ... [more] AI2009-21
pp.13-18
 Results 41 - 60 of 111 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan