IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
14:50
Online Online Distributed Random Number Generation Method on Smart Contracts
Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ) ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33
We propose N-choice game (NCG), a decentralized pseudo-random number generation method that can be executed on smart con... [more] ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33
pp.104-109
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:35
Hokkaido San-Refure Hakodate On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Hongkong Meeting in April,2014 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corporation/IPA), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT) ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2014-27 SITE2014-22 ICSS2014-31 EMM2014-27
pp.171-179
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
16:05
Hokkaido   On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Nice Meeting in April,2013 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Shin'ichiro Matsuo (NICT), Kenji Ohkuma (Toshiba/IPA) ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2013-21 SITE2013-16 ICSS2013-26 EMM2013-23
pp.75-84
SC 2013-03-15
13:40
Tokyo   Towards Provenance-Based Security Risk Assessment
Guillermo Horacio Ramirez Caceres, Yohei Murakami, Koji Zettsu, Takeshi Takahashi, Shin'ichiro Matsuo (NICT)
We are developing a Knowledge Language Grid (KLG) system, which enables users to combine multiple assets data from diffe... [more] SC2012-18
pp.7-12
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
15:50
Hokkaido   Architecture Design for Visualizing Risks and Implementing Adequate Security
Shin'ichiro Matsuo, Akira Kanaoka, Takeshi Takahashi, Shinsuke Miwa, Tadashi Minowa (NICT) ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17
 [more] ISEC2012-25 SITE2012-21 ICSS2012-27 EMM2012-17
pp.109-114
ICSS 2011-11-18
15:30
Tokushima Naruto University of Education Multitenant Cloud Computing: Security Challenges and Approaches
Takeshi Takahashi (NICT), Gregory Blanc, Youki Kadobayashi, Doudou Fall, Hiroaki Hazeyama (NAIST), Shin'ichiro Matsuo (NICT) ICSS2011-36
This paper presents challenges and approaches of techniques enabling multitenancy in cloud computing, especially resourc... [more] ICSS2011-36
pp.25-32
ICSS 2011-03-25
11:35
Tokyo Suspended On Security Model of Cryptographic Protocols for Mobile Devices
Shin'ichiro Matsuo (NICT) ICSS2010-59
Recently, information devices, with lower computational power than general personal computers such as smartphone, are ge... [more] ICSS2010-59
pp.17-21
ISEC, SITE, IPSJ-CSEC 2007-07-20
11:10
Hokkaido Future University-Hakodate On Construction of Block Cipher with Variable Security Parameter
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA), Wakaha Ogata (Tokyo Inst. of Tech.) ISEC2007-48
Currently, cryptographical technology such as an encryption algorithm is used in many IT systems. When an encryption sch... [more] ISEC2007-48
pp.23-28
ISEC, LOIS 2005-11-15
15:10
Fukuoka Kitakyushu Science and Research Park Asymmetric 3-party Password Authenticated Kay Exchange
Toru Iino, Shin'ichiro Matsuo (NTT DATA), Hiroto Matsuoka, Wakaha Ogata (Tokyo Inst. of Tech.)
Password-based authenticated key exchange (PAKE) are protocols in which
two parties establish secure session key by us... [more]
ISEC2005-108 OIS2005-71
pp.63-70
ISEC, LOIS 2005-11-15
15:35
Fukuoka Kitakyushu Science and Research Park A Encryption Scheme with Recording Decryption Evidence
Yasumasa Hirai, Shin'ichiro Matsuo (NTT DATA)
Currently, in order to protect individual's privacy information such as the image of surveillance camera, it is indispen... [more] ISEC2005-109 OIS2005-72
pp.71-76
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan