IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 12 of 12  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-15
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
A Study on Hybrid Key Agreement with Post Quantum Cryptography and Quantum Key Distribution
Sakae Chikara, Tsunekazu Saito (NTT) IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126
This paper discusses the issues involved in combining key-sharing schemes with different security rationales, such as qu... [more] IT2022-129 ISEC2022-108 WBS2022-126 RCC2022-126
pp.386-392
OCS, CS
(Joint)
2023-01-12
14:50
Fukuoka CANAL CITY HAKATA
(Primary: On-site, Secondary: Online)
Redundant Key Exchange Architecture for Cryptographic Processing of Distributed Optical Transponders
Atsushi Taniguchi, Yasuyuki Sanari, Momoko Miura, Yasuhiro Mochida, Keizo Murakami, Sakae Chikara (NTT) CS2022-64
(Advance abstract in Japanese is available) [more] CS2022-64
pp.7-11
LOIS 2017-03-03
14:15
Okinawa N.Ohama Memorial Hall A study on availability of attribute on smart device management system with functional encryption
Makiko Aoyagi, Sakurako Tamura, Sakae Chikara, Hiroaki Isaka (NTT) LOIS2016-96
The Smart Device Management System provides access control for applications and contents by attribute information specif... [more] LOIS2016-96
pp.189-194
ISEC, LOIS, SITE 2016-11-08
10:50
Fukui Community Hall & AOSSA Mall, Fukui An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption
Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT) ISEC2016-62 SITE2016-52 LOIS2016-40
The Smart Device Management System provides access control for applications and contents by the specified parameters of ... [more] ISEC2016-62 SITE2016-52 LOIS2016-40
pp.69-74
LOIS 2013-03-08
15:30
Okinawa   An Implementation of Situation-Sensitive Function Controller for Smartphones and its Evaluation.
Ryota Sato, Sakae Chikara, Tetsuya Okuda, Shigeru Kayaguchi (NTT) LOIS2012-104
According to the rapid spread of smartphones, their usage pattern is becoming diversified. The situation in which smartp... [more] LOIS2012-104
pp.203-208
LOIS 2012-03-08
13:50
Okinawa Meio Univ. A Proposal of Situation-Sensitive Application Launcher for Smartphones
Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] LOIS2011-83
pp.61-66
ISEC, LOIS 2011-11-15
10:55
Osaka Osaka Electro-Communication University A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol
Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] ISEC2011-52 LOIS2011-46
pp.123-128
LOIS 2011-03-04
09:10
Okinawa Ishigaki IT business support center A Consideration of Security Risk in Compromising Hash Function -- An Exposure of Vulnerability against Information Storage System --
Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] LOIS2010-81
pp.95-100
ISEC, LOIS 2010-11-18
09:00
Ibaraki Tsukuba Univ. Sample Investigation and the Consideration to Compromising Cryptosystems in SSL
Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) ISEC2010-59 LOIS2010-38
In the information society, the encryption technology is indispensable. The improvement of computer performance causes t... [more] ISEC2010-59 LOIS2010-38
pp.65-72
SS 2008-03-04
09:55
Nagasaki Nagasaki Univ. A Proposal of The Secure Software Engineering
Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] SS2007-71
pp.85-90
LOIS, IPSJ-CN 2007-06-01
14:10
Osaka   The Fragment Aggregation Certification Method
Noriaki Saito, Tetsurou Yamazaki, Sakae Chikara, Toru Kobayashi, Atsushi Kanai (NTT)
A lot of threats like a ID theft are increasing though our daily life became convenient by using the Internet, and we wi... [more] OIS2007-8
pp.43-48
LOIS 2006-05-19
17:00
Tokyo NTT Musashino R&D Center A Security Consideration in ID Information Sharing Service
Sakae Chikara, Yoshiaki Seki, Shin-ichi Nakahara, Tetsurou Yamazaki, Tatsuya Kushida, Ichizo Nakamura, Atsushi Kanai (NTT)
A variety of systems, such as material flow management system and security gate system, use Barcode, QR code and RFID, w... [more] OIS2006-9
pp.49-54
 Results 1 - 12 of 12  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan