Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-15 13:50 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution Sakae Chikara, Tsunekazu Saito (NTT) IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 |
This paper discusses the issues involved in combining key-sharing schemes with different security rationales, such as qu... [more] |
IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126 pp.386-392 |
OCS, CS (Joint) |
2023-01-12 14:50 |
Fukuoka |
CANAL CITY HAKATA (Primary: On-site, Secondary: Online) |
Redundant Key Exchange Architecture for Cryptographic Processing of Distributed Optical Transponders Atsushi Taniguchi, Yasuyuki Sanari, Momoko Miura, Yasuhiro Mochida, Keizo Murakami, Sakae Chikara (NTT) CS2022-64 |
(Advance abstract in Japanese is available) [more] |
CS2022-64 pp.7-11 |
LOIS |
2017-03-03 14:15 |
Okinawa |
N.Ohama Memorial Hall |
A study on availability of attribute on smart device management system with functional encryption Makiko Aoyagi, Sakurako Tamura, Sakae Chikara, Hiroaki Isaka (NTT) LOIS2016-96 |
The Smart Device Management System provides access control for applications and contents by attribute information specif... [more] |
LOIS2016-96 pp.189-194 |
ISEC, LOIS, SITE |
2016-11-08 10:50 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT) ISEC2016-62 SITE2016-52 LOIS2016-40 |
The Smart Device Management System provides access control for applications and contents by the specified parameters of ... [more] |
ISEC2016-62 SITE2016-52 LOIS2016-40 pp.69-74 |
LOIS |
2013-03-08 15:30 |
Okinawa |
|
An Implementation of Situation-Sensitive Function Controller for Smartphones and its Evaluation. Ryota Sato, Sakae Chikara, Tetsuya Okuda, Shigeru Kayaguchi (NTT) LOIS2012-104 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. The situation in which smartp... [more] |
LOIS2012-104 pp.203-208 |
LOIS |
2012-03-08 13:50 |
Okinawa |
Meio Univ. |
A Proposal of Situation-Sensitive Application Launcher for Smartphones Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] |
LOIS2011-83 pp.61-66 |
ISEC, LOIS |
2011-11-15 10:55 |
Osaka |
Osaka Electro-Communication University |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46 |
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] |
ISEC2011-52 LOIS2011-46 pp.123-128 |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
ISEC, LOIS |
2010-11-18 09:00 |
Ibaraki |
Tsukuba Univ. |
Sample Investigation and the Consideration to Compromising Cryptosystems in SSL Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) ISEC2010-59 LOIS2010-38 |
In the information society, the encryption technology is indispensable. The improvement of computer performance causes t... [more] |
ISEC2010-59 LOIS2010-38 pp.65-72 |
SS |
2008-03-04 09:55 |
Nagasaki |
Nagasaki Univ. |
A Proposal of The Secure Software Engineering Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71 |
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] |
SS2007-71 pp.85-90 |
LOIS, IPSJ-CN |
2007-06-01 14:10 |
Osaka |
|
The Fragment Aggregation Certification Method Noriaki Saito, Tetsurou Yamazaki, Sakae Chikara, Toru Kobayashi, Atsushi Kanai (NTT) |
A lot of threats like a ID theft are increasing though our daily life became convenient by using the Internet, and we wi... [more] |
OIS2007-8 pp.43-48 |
LOIS |
2006-05-19 17:00 |
Tokyo |
NTT Musashino R&D Center |
A Security Consideration in ID Information Sharing Service Sakae Chikara, Yoshiaki Seki, Shin-ichi Nakahara, Tetsurou Yamazaki, Tatsuya Kushida, Ichizo Nakamura, Atsushi Kanai (NTT) |
A variety of systems, such as material flow management system and security gate system, use Barcode, QR code and RFID, w... [more] |
OIS2006-9 pp.49-54 |