|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2018-11-21 15:40 |
Kagoshima |
|
ICSS2018-58 |
(To be available after the conference date) [more] |
ICSS2018-58 pp.31-36 |
ICSS |
2018-11-22 10:00 |
Kagoshima |
|
ICSS2018-60 |
[more] |
ICSS2018-60 pp.39-44 |
ICSS |
2018-11-22 10:25 |
Kagoshima |
|
ICSS2018-61 |
(To be available after the conference date) [more] |
ICSS2018-61 pp.45-48 |
ICSS |
2018-11-22 10:50 |
Kagoshima |
|
Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62 |
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] |
ICSS2018-62 pp.49-54 |
ICSS |
2018-11-22 13:30 |
Kagoshima |
|
ICSS2018-64 |
(To be available after the conference date) [more] |
ICSS2018-64 pp.61-66 |
ICSS |
2018-11-22 13:55 |
Kagoshima |
|
ICSS2018-65 |
[more] |
ICSS2018-65 pp.67-72 |
ICSS |
2018-11-22 14:45 |
Kagoshima |
|
ICSS2018-67 |
(To be available after the conference date) [more] |
ICSS2018-67 pp.79-84 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 12:10 |
Hokkaido |
Sapporo Convention Center |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 |
This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] |
ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 pp.305-310 |
ICSS, IA |
2018-06-26 09:00 |
Ehime |
Ehime University |
IA2018-8 ICSS2018-8 |
(To be available after the conference date) [more] |
IA2018-8 ICSS2018-8 pp.47-54 |
ICSS, IPSJ-SPT |
2018-03-07 15:40 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-64 |
[more] |
ICSS2017-64 pp.79-84 |
ICSS, IPSJ-SPT |
2018-03-08 11:10 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-75 |
[more] |
ICSS2017-75 pp.145-150 |
ICSS, IPSJ-SPT |
2018-03-08 11:35 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
ICSS2017-76 |
[more] |
ICSS2017-76 pp.151-156 |
ICSS, IPSJ-SPT |
2018-03-08 15:15 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
On the Ring Signature Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85 |
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] |
ICSS2017-85 pp.215-220 |
ICSS |
2017-11-21 09:30 |
Oita |
Beppu International Convention Center |
ICSS2017-42 |
[more] |
ICSS2017-42 pp.23-27 |
ICSS |
2017-11-21 14:00 |
Oita |
Beppu International Convention Center |
ICSS2017-50 |
[more] |
ICSS2017-50 pp.71-76 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-05 10:00 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Information Disclosing Mechanism Based on the Healthcare PKI for Collaboration of Home Medical Care and Nursing Services Yoichiro Inayoshi (NIT), Yoshiaki Shiraishi (Kobe Univ.), Jun Takeo, Shohei Kato, Takaaki Yaguchi, Akira Iwata (NIT) LOIS2017-19 IE2017-40 EMM2017-48 |
In home medical care and nursing, information sharing using ICT among medical care workers makes team care smooth and im... [more] |
LOIS2017-19 IE2017-40 EMM2017-48 pp.51-56 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 13:25 |
Tokyo |
|
A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 |
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] |
ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21 pp.81-86 |
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2017-07-14 14:15 |
Tokyo |
|
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 |
[more] |
ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23 pp.93-98 |
IA, ICSS |
2017-06-08 15:40 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7 |
[more] |
IA2017-7 ICSS2017-7 pp.37-42 |
ICSS, IPSJ-SPT |
2017-03-13 13:25 |
Nagasaki |
University of Nagasaki |
Modeling of Attack Activity for Integrated Analysis of Threat Information Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47 |
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] |
ICSS2016-47 pp.7-12 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|