IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 105 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2018-11-21
15:40
Kagoshima   ICSS2018-58 (To be available after the conference date) [more] ICSS2018-58
pp.31-36
ICSS 2018-11-22
10:00
Kagoshima   ICSS2018-60  [more] ICSS2018-60
pp.39-44
ICSS 2018-11-22
10:25
Kagoshima   ICSS2018-61 (To be available after the conference date) [more] ICSS2018-61
pp.45-48
ICSS 2018-11-22
10:50
Kagoshima   Identification Scheme Based on the Binary Syndrome Decoding Problem Using High Density Parity Check Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2018-62
Most of the currently used identification schemes can not be safely used if factoring factorization and discrete logarit... [more] ICSS2018-62
pp.49-54
ICSS 2018-11-22
13:30
Kagoshima   ICSS2018-64 (To be available after the conference date) [more] ICSS2018-64
pp.61-66
ICSS 2018-11-22
13:55
Kagoshima   ICSS2018-65  [more] ICSS2018-65
pp.67-72
ICSS 2018-11-22
14:45
Kagoshima   ICSS2018-67 (To be available after the conference date) [more] ICSS2018-67
pp.79-84
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
12:10
Hokkaido Sapporo Convention Center ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38 This paper addresses the problem of encrypted packet classification based on SSH encrypted network traffic. The objectiv... [more] ISEC2018-39 SITE2018-31 HWS2018-36 ICSS2018-42 EMM2018-38
pp.305-310
ICSS, IA 2018-06-26
09:00
Ehime Ehime University IA2018-8 ICSS2018-8 (To be available after the conference date) [more] IA2018-8 ICSS2018-8
pp.47-54
ICSS, IPSJ-SPT 2018-03-07
15:40
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center ICSS2017-64  [more] ICSS2017-64
pp.79-84
ICSS, IPSJ-SPT 2018-03-08
11:10
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center ICSS2017-75  [more] ICSS2017-75
pp.145-150
ICSS, IPSJ-SPT 2018-03-08
11:35
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center ICSS2017-76  [more] ICSS2017-76
pp.151-156
ICSS, IPSJ-SPT 2018-03-08
15:15
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center On the Ring Signature Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2017-85
The ring signature is one of the group signature schemes that anyone can sign, if it is a group member and can guarantee... [more] ICSS2017-85
pp.215-220
ICSS 2017-11-21
09:30
Oita Beppu International Convention Center ICSS2017-42  [more] ICSS2017-42
pp.23-27
ICSS 2017-11-21
14:00
Oita Beppu International Convention Center ICSS2017-50  [more] ICSS2017-50
pp.71-76
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-05
10:00
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Information Disclosing Mechanism Based on the Healthcare PKI for Collaboration of Home Medical Care and Nursing Services
Yoichiro Inayoshi (NIT), Yoshiaki Shiraishi (Kobe Univ.), Jun Takeo, Shohei Kato, Takaaki Yaguchi, Akira Iwata (NIT) LOIS2017-19 IE2017-40 EMM2017-48
In home medical care and nursing, information sharing using ICT among medical care workers makes team care smooth and im... [more] LOIS2017-19 IE2017-40 EMM2017-48
pp.51-56
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
13:25
Tokyo   A Forensic Support System for Reproduction of Incidents Caused by Drive-by Download
Yuki Okuda, Youji Fukuta (Kindai Univ.), Yoshiaki Shiraishi (Kobe Univ.), Nobukazu Iguchi (Kindai Univ.) ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
In this research, we have developed a system that supports investigation of malware infections and activities in Drive-b... [more] ISEC2017-18 SITE2017-10 ICSS2017-17 EMM2017-21
pp.81-86
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
14:15
Tokyo   ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23  [more] ISEC2017-20 SITE2017-12 ICSS2017-19 EMM2017-23
pp.93-98
IA, ICSS 2017-06-08
15:40
Kochi Kochi University of Technolo, Eikokuji Campus On the Zero Knowledge Proof Type Authentication Scheme Using LDPC Codes
Haruka Ito, Masanori Hirotomo (Saga Univ.), Youji Fukuta (Kindai Univ.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) IA2017-7 ICSS2017-7
 [more] IA2017-7 ICSS2017-7
pp.37-42
ICSS, IPSJ-SPT 2017-03-13
13:25
Nagasaki University of Nagasaki Modeling of Attack Activity for Integrated Analysis of Threat Information
Kenta Nomura, Daiki Ito (Kobe Univ.), Masaki Kamizono (PwC Cyber Services), Yoshiaki Shiraishi, Yasuhiro Takano (Kobe Univ.), Masami Mohri (Gifu Univ.), Yuji Hoshizawa (PwC Cyber Services), Masakatu Morii (Kobe Univ.) ICSS2016-47
Cyber attacks targeting specific victims use multiple intrusion routes and various attack methods. In order to combat su... [more] ICSS2016-47
pp.7-12
 Results 21 - 40 of 105 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan