Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2023-11-16 13:00 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2023-51 pp.1-6 |
RCC, ISEC, IT, WBS |
2023-03-14 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Claimable Designated Verifier Signature Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 |
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] |
IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92 pp.171-178 |
ICSS, IPSJ-SPT |
2023-03-13 16:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Implementation and Evaluation for Remote-Control Security System of IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67 |
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] |
ICSS2022-67 pp.115-120 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68 |
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] |
ICSS2022-68 pp.121-126 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Implementation of aggregate message authentication and its evaluation Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96 |
[more] |
ICSS2019-96 pp.207-212 |
ICSS |
2019-11-13 16:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Study on evaluation system for aggregate message authentication and its application to IoT systems Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67 |
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] |
ICSS2019-67 pp.41-46 |
ICSS, IPSJ-SPT |
2019-03-07 14:45 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Implementation and evaluation of aggregate message authentication method Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73 |
[more] |
ICSS2018-73 pp.29-33 |
IT, ISEC, WBS |
2019-03-08 09:00 |
Tokyo |
University of Electro-Communications |
History-Free Sequential Aggregate MAC without Pseudorandom Permutation Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102 |
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] |
IT2018-101 ISEC2018-107 WBS2018-102 pp.155-162 |
ICSS |
2015-03-03 15:40 |
Okinawa |
Meio Univiersity |
A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69 |
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more] |
ICSS2014-69 pp.37-42 |
SWIM |
2011-11-18 15:00 |
Tokyo |
Tokai Univ.(Takanawa) |
Proposal of Remote Medical Care Model through INMARSAT Satellite Masafumi Chiba, Tamotsu Noji, Shigeki Tanaka, Kayo Ubukata, Yasuhiro Fujita, Toru Kaizu (Tokai Univ.), Hiroshi Senda (JDC) SWIM2011-26 |
It is an important problem to secure the safety of the student and the school personnel who embarks in executing the pra... [more] |
SWIM2011-26 pp.47-52 |
IA, ICSS |
2010-06-17 15:45 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7 |
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] |
IA2010-7 ICSS2010-7 pp.37-42 |
|