IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 77件中 21~40件目 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
PRMU, HIP 2012-12-14
10:00
Yamagata   Large Capacity Barcode with Confidentiality and Error Correction maintaining Compatibility
Nobuyuki Teraura (TCRI), Kouichi Sakurai (KU) PRMU2012-77 HIP2012-66
The barcode (NW-7,CODE39) which has spread now is printed on business form etc., and is utilized for logistics, distribu... [more] PRMU2012-77 HIP2012-66
pp.43-48
EA, EMM 2012-11-17
11:20
Oita OITA Univ. Examination of the compatible barcode for product code with confidentiality and large capacity
Nobuyuki Teraura (TCRI), Kouichi Sakurai (Kyudai) EA2012-101 EMM2012-83
The barcode for goods (EAN/JAN code) which has spread now is printed by packaging of goods etc., and is utilized for poi... [more] EA2012-101 EMM2012-83
pp.117-122
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
10:30
Hokkaido   An efficient variant of Rainbow without triangular matrix representation
Takanori Yasuda (ISIT), Tsuyoshi Takagi (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
 [more] ISEC2012-29 SITE2012-25 ICSS2012-31 EMM2012-21
pp.143-150
ICSS 2012-03-16
14:10
Tokyo Kikai-Shinko-Kaikan Bldg. A Behavior-based Detection Method for Outbreaks of Low-rate Attacks
Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun'ichi Takeuchi (ISIT) ICSS2011-45
Low-rate attacks can conceal their traffic because they are very much like normal communication. Thus, although a number... [more] ICSS2011-45
pp.37-42
ISEC, LOIS 2011-11-15
16:05
Osaka Osaka Electro-Communication University On the Insecurity of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao, Takashi Nishide (Kyushu Univ.), Avishek Adhikari (Univ. of Calcutta), Kyung-Hyune Rhee (Pukyong National Univ.), Kouichi Sakurai (Kyushu Univ.) ISEC2011-61 LOIS2011-55
An improvement of arithmetic coding (AC) has been proposed in the paper (Communications in Nonlinear Science and Numeric... [more] ISEC2011-61 LOIS2011-55
pp.181-188
COMP 2011-06-30
13:35
Hiroshima Hiroshima Univ. Improving the Cloud Revenue using a Failure-aware Server Management Model
Laiping Zhao, Kouichi Sakurai (Kyushu Univ.) COMP2011-19
 [more] COMP2011-19
pp.25-32
ISEC 2011-05-13
13:30
Tokyo Kikai-Shinko-Kaikan Bldg. Revisited: Security of multivariate polynomial signatures over non-commutative rings
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2011-1
 [more] ISEC2011-1
pp.1-7
ISEC 2011-05-13
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. A note on the reduction of the size of keys of Rainbow
Takanori Yasuda (ISIT), Kouichi Sakurai, Tsuyoshi Takagi (Kyushu Univ.) ISEC2011-2
 [more] ISEC2011-2
pp.9-16
ISEC 2011-05-13
14:20
Tokyo Kikai-Shinko-Kaikan Bldg. Fast Implementation and Experimentation of Multivariate Polynomial Cryptosystems on GPU
Satoshi Tanaka, Kouichi Sakurai (Kyushu Univ.) ISEC2011-3
In this paper, we try to fast implementation of QUAD and SPELT. They are stream ciphers with multivariate polynomial (MP... [more] ISEC2011-3
pp.17-22
ICSS 2010-11-05
14:55
Hiroshima Hiroshima City University A Document Access Control Model Based on Role and Security Policy
Liangjian Mao, Kouichi Sakurai (Kyushu Univ.) ICSS2010-51
With the rapid development of information technology, electronic document security issues have become increasingly promi... [more] ICSS2010-51
pp.41-46
ICSS 2010-03-26
15:55
Fukuoka The University of Kitakyushu A Study on Worms Using Search Engine to Spread
Jingyu Hua, Kouichi Sakurai (Kyushu Univ.) ICSS2009-67
 [more] ICSS2009-67
pp.29-34
IT, ISEC, WBS 2010-03-05
14:40
Nagano Nagano-Engineering Campus, Shinshu University An effective attack against a chaos-based image scrambling encryption
Liang Zhao, Kouichi Sakurai (Kyushu Univ.) IT2009-112 ISEC2009-120 WBS2009-91
An image encryption algorithm which makes use of chaos system for shuffling the pixel bits was proposed in [G.-D. Ye, Pa... [more] IT2009-112 ISEC2009-120 WBS2009-91
pp.269-274
ICSS 2009-11-13
15:30
Miyazaki University of Miyazaki Packet filtering with IP address database and identification of attack path
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ)
 [more]
ICSS 2009-11-13
15:55
Miyazaki University of Miyazaki A Consideration of Feature Extraction for Attacks on Darknet
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ/ISIT) ICSS2009-60
Network monitoring is very important to early detect and defend the threats in the Internet caused by worm's scanning ac... [more] ICSS2009-60
pp.37-42
ICSS 2009-11-13
16:20
Miyazaki University of Miyazaki The relation betwenn the arrangement of network sensors and the information obtained by the sensors
Seiichiro Mizoguchi, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
Network monitoring is valuable for grabbing the threats in the Internet. The data captured by network sensors will be us... [more]
WBS, IT, ISEC 2009-03-10
14:50
Hokkaido Hakodate Mirai Univ. Composition of functionalities in UC framework
Tadashi Araragi (NTT), Chunhua Su, Kouichi Sakurai (Kyushu Univ.) IT2008-89 ISEC2008-147 WBS2008-102
This paper initiates a comprehensive approach for design method for functionality in UC framework. By combining some fun... [more] IT2008-89 ISEC2008-147 WBS2008-102
pp.295-299
ISEC, SITE, IPSJ-CSEC 2008-07-24
15:20
Fukuoka Fukuoka Institute of System LSI Design Industry Variable Probabilistic Packet Mareking with TTL for IP Traceback
Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
There are various kinds of menaces that exist within the network. There is a menace called the DoS
attacks in the one o... [more]
ISEC2008-31 SITE2008-25
pp.109-114
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:45
Fukuoka Fukuoka Institute of System LSI Design Industry A Proposal of Intrusion Detection using Third-parties Support
Masakazu Fujii, Ken'ichi Takahashi (ISIT), Yoshiaki Hori (Kyushu Univ.), Kouichi Sakurai (ISIT) ISEC2008-37
Intrusions are one of the most important issues in the current Internet environment. A lot of researchers and companies ... [more] ISEC2008-37
pp.15-22
ISEC, SITE, IPSJ-CSEC 2008-07-25
10:20
Fukuoka Fukuoka Institute of System LSI Design Industry A Lattice Model of the General Confidentiality Policies
Taketoshi Sakuraba (Hitachi), Kouichi Sakurai (Kyushu Univ.)
An information flow policy is defined as a set of information flow rules among security-classes. Implementations of such... [more] ISEC2008-41
pp.45-52
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:00
Fukuoka Fukuoka Institute of System LSI Design Industry Invalidation of a Mailing-list Address against Spam
Kenichi Takahashi (ISIT), Akihiro Sakai, Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2008-50
pp.109-116
 77件中 21~40件目 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (No. 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan