IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 120 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, LOIS 2013-11-29
13:30
Miyagi Tohoku Univ. The proposal on a vulnerability evaluation method according to information system environment
Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] ISEC2013-69 LOIS2013-35
pp.65-70
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
16:05
Hokkaido   On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
pp.75-84
SITE, IPSJ-EIP 2013-05-16
11:25
Kanagawa Institute of Infomation Security Proposal of SNS Membership Qualification System Using Security Information Database
Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] SITE2013-3
pp.11-16
SITE, IPSJ-EIP 2013-05-16
13:30
Kanagawa Institute of Infomation Security [Invited Talk] Property versus Secrecy: -- Toward A General Theory for Information Law --
Koichiro Hayashi (Institute of Information Security) SITE2013-5
 [more] SITE2013-5
pp.23-28
ICSS 2013-03-25
11:35
Kanagawa Yokohama National University Partially Doubly-Encrypted ID-based Encryption and its Security
Makoto Sato (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Hiroshi Doi (IISEC), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) ICSS2012-60
In concealing files by common key encryption, a key used for the encryption must be shared safely between a sender and a... [more] ICSS2012-60
pp.19-24
NS, IN
(Joint)
2013-03-08
09:40
Okinawa Okinawa Zanpamisaki Royal Hotel Proposition on Identity Management for Business Users in Cloud Environment
Takuma Iwabuchi, Atsuhiro Goto (IISEC) NS2012-259
With the recent growth of cloud computing market and with ID life cycle becoming more multifaceted, the importance of ID... [more] NS2012-259
pp.547-552
NS, IN
(Joint)
2013-03-08
13:40
Okinawa Okinawa Zanpamisaki Royal Hotel A Study of sensor data privacy concern from multiple points of view toward its fully utilizing society
Takamichi Aso, Atsuhiro Goto (IISEC) NS2012-284
Recently sensor service gets attention. It has some big opportunities because of using of various and large amount of da... [more] NS2012-284
pp.693-698
NS, IN
(Joint)
2013-03-08
14:00
Okinawa Okinawa Zanpamisaki Royal Hotel A study of information security exchange srchitecture inter-enterprise
Hitoshi Osanai, Atsuhiro Goto (IISEC) NS2012-285
In recent years, the leak of personal information and confidential information in government agencies and companies, web... [more] NS2012-285
pp.699-704
NS, IN
(Joint)
2013-03-08
14:30
Okinawa Okinawa Zanpamisaki Royal Hotel Android Security Improvement by Visualization of Application Behavior
Rika Hayashi, Atsuhiro Goto (IISEC) NS2012-286
Android applications which work out of users' intention, "suspicious application", are becoming from "annoying" to "thre... [more] NS2012-286
pp.705-710
NS, IN
(Joint)
2013-03-08
14:50
Okinawa Okinawa Zanpamisaki Royal Hotel Comparing Malware with Already Analyzed One to Make Static Analysis Efficient
Hiroki Hada, Atsuhiro Goto (IISEC) NS2012-287
 [more] NS2012-287
pp.711-716
ICSS 2012-11-22
11:35
Hiroshima Miyajima Mori-no-Yado An analytical study for sensor service provider to keep their use's security
Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] ICSS2012-47
pp.13-18
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM
(Joint) [detail]
2012-07-20
11:00
Ibaraki University Hall, University of Tsukuba Location Proof by GPS and WLAN Information
Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] MoMuC2012-18 IE2012-43
pp.43-48
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
13:30
Hokkaido   Privacy Preserving Data Processing with Collaboration of Paillier and RSA Public Key Cryptosystems -- For Overcoming Contradiction of Protection and Utilization of Personal Data --
Shigeo Tsujii, Hiroshi Yamaguchi (Chuo Univ.), Hiroshi Doi (IISEC), Yukiyasu Tsunoo (NEC), Ryo Fujita (Chuo Univ.), Takahiko Syouji (YDK) ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
 [more] ISEC2012-33 SITE2012-29 ICSS2012-35 EMM2012-25
pp.175-179
ICSS, IA 2012-06-22
09:00
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University Proposed phishing countermeasures based on URL information analysis
Shingo Matsugaya, Naoshi Sato (IISEC) IA2012-6 ICSS2012-6
Although phishing has been conducted from various countermeasures already, the number of victims are still more likely t... [more] IA2012-6 ICSS2012-6
pp.31-36
DE 2012-06-05
13:25
Tokyo NII、12F Room1208, 1210 Supporting Remote Communication by Multi-media Processing based-on the Development Platform "IwaCam" -- Discussions about the Role of Image and Speech Information for Synchronized Cooking by Two People --
Yoko Yamakata, Atsushi Hashimoto, Takuya Funatomi, Hiromi Hiramatsu (Kyoto Univ.), Hidenori Tsuji (IIT/IISEC), Shinsuke Mori (Kyoto Univ.) DE2012-2
(To be available after the conference date) [more] DE2012-2
pp.7-12
ICSS 2012-03-16
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy
Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] ICSS2011-47
pp.49-54
KBSE 2011-09-21
09:30
Overseas Ocean Grand Hotel Jeju Development of a Software Security Learning Environment
Atsuo Hazeyama (TGU), Hiroto Shimizu (IIS) KBSE2011-24
Importance for software security technologies has been recognized according to increase of services on the internet. It ... [more] KBSE2011-24
pp.1-6
ISEC, IT, WBS 2011-03-03
10:50
Osaka Osaka University Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] IT2010-70 ISEC2010-74 WBS2010-49
pp.15-22
ISEC, IT, WBS 2011-03-03
11:15
Osaka Osaka University A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC) IT2010-71 ISEC2010-75 WBS2010-50
Recently there are a lot of secure digital signature schemes proved by a security notion. The standard security notion f... [more] IT2010-71 ISEC2010-75 WBS2010-50
pp.23-30
AN, MoNA, USN
(Joint)
2011-01-21
10:30
Hiroshima Hiroshima City University Computer Simulation on Rescueing Movement using Adhoc Network in case of a disaster
Yuta Koide, Naoshi Sato, Kazuyuki Ishii (IISEC) USN2010-58
A variety of wireless networks were high-speed and steady and it came to be organizable as the wireless technology devel... [more] USN2010-58
pp.107-112
 Results 41 - 60 of 120 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan