|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 12:35 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A certain classification of trust services Yuji Suga (IIJ) ICSS2023-73 |
This paper describes the trust services that are currently under consideration for international interoperability, and o... [more] |
ICSS2023-73 pp.33-35 |
ICM, NS, CQ, NV (Joint) |
2023-11-21 10:20 |
Ehime |
Ehime Prefecture Gender Equality Center (Primary: On-site, Secondary: Online) |
Let's ENScrypt Yuji Suga (IIJ) NS2023-111 |
We considered a service that issues X.509 certificates for ENS-based domains. When deploying a key to a Web server, it i... [more] |
NS2023-111 p.13 |
RCC, ISEC, IT, WBS |
2023-03-15 11:25 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Constructions of the card-based protocol over a Likert scale that downgrades stages by restricting card input Yuji Suga (IIJ) IT2022-115 ISEC2022-94 WBS2022-112 RCC2022-112 |
We consider card-based protocols in which the input is defined by a Likert scale and the output is only the closeness of... [more] |
IT2022-115 ISEC2022-94 WBS2022-112 RCC2022-112 pp.297-304 |
ICSS, IPSJ-SPT |
2020-03-03 10:10 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Local survey on transitioning of TLS version and EV Certificates Usage (FY2019 4Q) Yuji Suga (IIJ) ICSS2019-86 |
(To be available after the conference date) [more] |
ICSS2019-86 pp.109-111 |
ICSS, IA |
2016-06-06 16:30 |
Saga |
Saga University |
Multidimensional Lamport-like one-time password authentication schemes Yuji Suga (IIJ) IA2016-6 ICSS2016-6 |
[more] |
IA2016-6 ICSS2016-6 p.31 |
ICSS |
2012-11-22 16:50 |
Hiroshima |
Miyajima Mori-no-Yado |
Are measures against SSL/TLS sites dependent on the category which that site belongs?
-- obtained by crawling of renegotiation functions and RSA key lengths -- Yuji Suga (IIJ) ICSS2012-56 |
Are measures against SSL/TLS sites dependent on the category which that site belongs?
It has been recognized man-in-t... [more] |
ICSS2012-56 p.67 |
IA |
2012-09-21 15:05 |
Tokyo |
|
Consideration of Service Defined Infrastructure(SvDI) for IaaS/HaaS Ray Atarashi (IIJ-II), Katsumi Kaneda, Masahiko Kato, Yuji Suga (IIJ), Yasuo Okabe (Kyoto Univ.) IA2012-18 |
[more] |
IA2012-18 pp.37-42 |
ISEC |
2011-12-14 13:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CHES 2011 Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65 |
(To be available after the conference date) [more] |
ISEC2011-65 pp.21-24 |
ISEC |
2011-12-14 15:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Report on CRYPTO 2011 Yuji Suga (IIJ), Noboru Kunihiro (The University of Tokyo), Jun Kogure (IPA), Kanta Matsuura (The University of Tokyo) ISEC2011-69 |
The annual international cryptology conference CRYPTO 2011 was held on August 14th - 18th, 2011, at University of Califo... [more] |
ISEC2011-69 pp.31-33 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|