Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, ICM |
2024-01-26 11:25 |
Nagasaki |
Nagasaki Prefectural Art Museum (Primary: On-site, Secondary: Online) |
A VPN Method for Security Usage of Public Wireless LANs Hinata Tanoue, Akihiro Shimizu (Kochi Univ. of Tech.) ICM2023-37 LOIS2023-41 |
In public wireless LAN environments, ensuring security is an important issue. An effective method for secure communicati... [more] |
ICM2023-37 LOIS2023-41 pp.51-56 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-30 15:10 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
FPGA Implementation and Area Evaluation of JTAG Access Mechanism Using Lightweight One-Time Password Authentication Scheme Hisashi Okamoto, Jun Ma, Senling Wang, Hiroshi Kai, Hiroshi Takahashi (Ehime Univ), Akihiro Shimizu (Kochi Univ. of Technology) VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 |
When building a cyber-physical system (CPS), it is essential to guarantee the fault tolerance and security of edge devic... [more] |
VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71 pp.168-173 |
QIT (2nd) |
2018-11-26 13:30 |
Tokyo |
The University of Tokyo |
[Poster Presentation]
"Cats" that go beyond the standard quantum limit Mamiko Tatsuta (Univ. Tokyo), Yuichiro Matsuzaki (NTT Basic Research Laboratories), Akira Shimizu (Univ. Tokyo) |
[more] |
|
QIT (2nd) |
2016-11-24 11:40 |
Ibaraki |
KEK Kobayashi-hall |
violation of extensivity of entropy in nonequilibrium steady states Hakoshima Hideaki, Shimizu Akira (UT) |
[more] |
|
QIT (2nd) |
2016-11-25 13:00 |
Ibaraki |
KEK Kobayashi-hall |
[Invited Talk]
Anomalous Quantum States associated with Quantum Breaking of Equivalence of Ensembles Akira Shimizu, Mamiko Tatsuta (Univ. Tokyo) |
There are many `ensembles' in statistical mechanics. When the equivalence of ensembles is broken, we show that a certai... [more] |
|
QIT (2nd) |
2016-11-25 13:50 |
Ibaraki |
KEK Kobayashi-hall |
Generation of a generalized cat state at finite temperature Mamiko Tatsuta, Akira Shimizu (Univ. of Tokyo) |
Superpositions of macroscopically distinct states (which we call “generalized cat states”), such as Schrödinger's c... [more] |
|
ISEC, LOIS |
2011-11-14 17:10 |
Osaka |
Osaka Electro-Communication University |
A suudy of machine learning corresponding to the change of a turn and the of the recognition object Tatsumo Hoji, Yuta Yamada, Akihiro Shimizu (Kochi Univ. of Tech.) ISEC2011-47 LOIS2011-41 |
Recently, with the spread of network cameras, video surveillance cameras has been used as a tool to improve customer ser... [more] |
ISEC2011-47 LOIS2011-41 pp.85-92 |
ISEC, LOIS |
2011-11-15 11:55 |
Osaka |
Osaka Electro-Communication University |
Secure VoIP system for mobile devices Takeaki Kouchi, Tomoki Nakano, Yutaka Ono, Akihiro Shimizu (Kochi Univ. of Tech.) ISEC2011-54 LOIS2011-48 |
In recent years, the Internet connection is available now at low rates outside the spread of public wireless LAN service... [more] |
ISEC2011-54 LOIS2011-48 pp.135-140 |
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] |
2011-09-20 13:00 |
Ehime |
|
Key Exchange method for portable terminal with direct input by user Sasuke Komatsu, Akihiro Shimizu (Kochi Univ. Tech.) LOIS2011-15 IE2011-48 EMM2011-26 |
[more] |
LOIS2011-15 IE2011-48 EMM2011-26 pp.1-5 |
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] |
2011-09-20 13:25 |
Ehime |
|
Research of digital watermark to QR code Koichiro Karita, Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2011-16 IE2011-49 EMM2011-27 |
Recently, the QR(Quick Response) code is published in the poster, the magazine, and the Web screen. It has been widely u... [more] |
LOIS2011-16 IE2011-49 EMM2011-27 pp.7-10 |
LOIS, ICM (Joint) |
2010-01-21 17:35 |
Fukuoka |
Fukuoka Institute of Technology |
Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks Hirokazu Nogura (Kochi Univ. of Tech.), Yuji Nishida (Internet Initiative Japan Inc.), Takasuke Tsuji (Trinity Security Systems, Inc.), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-70 |
[more] |
LOIS2009-70 pp.53-56 |
LOIS, IPSJ-CN |
2009-05-21 15:25 |
Tokyo |
Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg |
Secure Password Authentication Protocol with Key Sharing Function (SPARK) Hirokazu Nogura, Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (T-SS), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-3 |
Various information are sent on public networks.Cryptosystems are necessary for protect these information.Existing key s... [more] |
LOIS2009-3 pp.67-72 |
LOIS, IPSJ-CN |
2009-05-21 15:50 |
Tokyo |
Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg |
An Encrypted VoIP Communication System with a Mobile Phone Hitoshi Mori, Yutaka Ono (Kochi Univ. of Tech.), Takasuke Tsuji (T-SS), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-4 |
In the VoIP(Voice over Internet Protocol) communication using a public network, there is danger from which the content o... [more] |
LOIS2009-4 pp.73-78 |
ICM, LOIS (Joint) |
2009-01-23 10:15 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
A One-Time Password Authentication Scheme Resistant to DoS Attacks Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (Trinity Security Systems, Inc.), Akihiro Shimizu (Kochi Univ. of Tech.) OIS2008-74 |
Various information are sent on the Internet. User authentication is necessary to protect these informa-
tion from atta... [more] |
OIS2008-74 pp.51-56 |
LOIS, IPSJ-DC |
2008-07-25 10:40 |
Hokkaido |
Conference Hall Hokkaido University |
An Authenticated Key Sharing Scheme to Protect Past Secrets Takasuke Tsuji (Trinity Security Systems), Akihiro Shimizu (Kochi Univ. of Tech.) OIS2008-22 |
[more] |
OIS2008-22 pp.41-44 |
CQ, LOIS, IE, IEE-CMN, ITE-ME |
2007-09-27 14:15 |
Tokushima |
The university of Tokushima |
Cryptanalysis JPEG 2000 partial scrambled images based on statistical character Shingo Hamaguchi, Akihiro Shimizu (Kochi Univ.of Tech.) CQ2007-46 OIS2007-36 IE2007-43 |
Users can recognize image outline and protect copyrights on digital images by partial-scrambling.
JPEG 2000 is suggest... [more] |
CQ2007-46 OIS2007-36 IE2007-43 pp.57-60 |
CQ, LOIS, IE, IEE-CMN, ITE-ME |
2007-09-27 15:15 |
Tokushima |
The university of Tokushima |
Authentication Data Distribution Protocol for Wireless Mesh Network Yuji Nishida (KUT), Takasuke Tsuji (Trinity Security Systems), Akihiro Shimizu (KUT) CQ2007-48 OIS2007-38 IE2007-45 |
In recent years, wireless mesh network is studied as a method for providing wireless LAN service widely. Wireless mesh n... [more] |
CQ2007-48 OIS2007-38 IE2007-45 pp.65-70 |
LOIS |
2007-03-09 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg |
Resolving PKI Certificate Chain Finding Problem for Ad Hoc Network using Bloom Filter Yuji Nishida, Akihiro Shimizu (KUT) |
In ad hoc network, we cannot use a trusted Certification Authority and a repository. Hence web-of-trust PKI systems in w... [more] |
OIS2006-72 pp.19-22 |
ISEC, LOIS |
2006-11-16 13:50 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) |
A Study on Selective Encryption Methods for DCT Coefficients Kazushi Okamoto, Masahiro Deguchi, Akihiro Shimizu (Kochi Univ. of Tech) |
Multimedia communications have been developing, and protection of video contents is an important issue.
Encryption tech... [more] |
ISEC2006-90 OIS2006-48 pp.13-18 |
IN, NS, CS (Joint) |
2006-09-14 15:55 |
Miyagi |
|
[Invited Talk]
One-Time Password Authentication Methods Takasuke Tsuji (Trinity Security Systems), Akihiro Shimizu (Kochi Univ. of Tech.) NS2006-79 IN2006-59 CS2006-25 |
Internet and mobile communication applications for managing personal information have been developing. Those application... [more] |
NS2006-79 IN2006-59 CS2006-25 pp.53-56(NS), pp.63-66(IN), pp.21-24(CS) |