|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IN, NS (Joint) |
2019-03-05 10:50 |
Okinawa |
Okinawa Convention Center |
A Study on Transferring Authorization Privilege for Granting Permission to Use Services to Multiple Users Omori Yoshihiko, Yamashita Takao (NTT) IN2018-126 |
Recently, it is becoming more popular to share a variety of resources such as facilities used in the sharing economy, ac... [more] |
IN2018-126 pp.253-258 |
NS, IN (Joint) |
2018-03-02 15:40 |
Miyazaki |
Phoenix Seagaia Resort |
Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239 |
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] |
NS2017-239 pp.403-408 |
NS, IN (Joint) |
2017-03-03 15:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
A Study on the Secure Sharing of User Authentication Private Keys among Devices Belonging to the Same Owner Hideo Nishimura, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2016-172 |
In recent authentication based on the public-key cryptography, private keys are generated and kept inside the secure are... [more] |
IN2016-172 pp.449-454 |
ICSS, IPSJ-SPT |
2016-03-04 10:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A Study of Security of an Authentication Method Using Public and Private Keys with Relaying Plural Key Pairs Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) ICSS2015-62 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
ICSS2015-62 pp.89-94 |
IN |
2015-10-15 15:20 |
Osaka |
Osaka University |
A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
IN2015-55 pp.13-18 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|