IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 61  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
PN 2023-08-29
15:40
Hokkaido
(Primary: On-site, Secondary: Online)
A Jitter-Constrained High-Speed Multilayer Combined-Path Design Algorithm for Center-Based Security Analysis
Ryuta Murakami, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2023-24
In order to realize a highly reliable network infrastructure in the Beyond 5G era, we have proposed the“Reconfigurable I... [more] PN2023-24
pp.40-46
PN 2023-03-02
12:00
Okinawa
(Primary: On-site, Secondary: Online)
Conceptual Demonstration of the Reconfigurable Probe over US-Japan Experimantal Network in SC22
Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2022-59
Towards the realization of a secure Beyond 5G infrastructure network, we have proposed the "Reconfigurable In-network Se... [more] PN2022-59
pp.90-95
IT, EMM 2022-05-17
16:40
Gifu Gifu University
(Primary: On-site, Secondary: Online)
[Invited Talk] Secure Codes with List Decoding
Yujie Gu (Kyudai) IT2022-8 EMM2022-8
In this paper, we consider secure codes for protecting the copyright of multimedia content against collusion attacks. We... [more] IT2022-8 EMM2022-8
pp.41-43
DC 2021-12-10
14:00
Kagawa
(Primary: On-site, Secondary: Online)
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] DC2021-57
pp.13-18
CPSY, DC, IPSJ-ARC [detail] 2019-07-26
17:00
Hokkaido Kitami Civic Hall Secure Distributed Computing using Blockchain
Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] CPSY2019-37 DC2019-37
pp.223-227
SeMI, RCS, NS, SR, RCC
(Joint)
2019-07-11
10:40
Osaka I-Site Nanba(Osaka) [Poster Presentation] A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks
Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40
pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI)
ISEC 2019-05-17
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018)
Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] ISEC2019-10
p.47
KBSE 2019-03-02
09:00
Kyoto Doshisha University Kambaikan Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study
Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] KBSE2018-62
pp.51-56
CPSY, DC, IPSJ-ARC
(Joint) [detail]
2018-07-30
18:30
Kumamoto Kumamoto City International Center DC2018-18 Wireless sensor networks (hereinafter, referred to as WSNs) are susceptible to eavesdrop, since a sensor node utilizes w... [more] DC2018-18
pp.27-32
KBSE 2018-03-01
15:50
Okinawa   Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base
Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] KBSE2017-50
pp.67-72
ICD, CPSY, CAS 2017-12-14
15:10
Okinawa Art Hotel Ishigakijima A proposal for Improving Security of Adiabatic Reversible Logic Based on PADDL
Tomotaka Nishiwaki, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) CAS2017-88 ICD2017-76 CPSY2017-85
An adiabatic logic is one of the low power consumption performance improvement by circuit technology for integrated circ... [more] CAS2017-88 ICD2017-76 CPSY2017-85
pp.113-117
SS 2017-03-10
14:45
Okinawa   Evaluation of a Security Requirement Analysis Support System using Software Security Knowledge Base
Atsuo Hazeyama, Shunichi Tanaka (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Seiji Munetoh (IBM Japan), Takao Okubo (IISEC) SS2016-83
In recent years, following upon increase of services on the Internet, the needs for secure software development increase... [more] SS2016-83
pp.139-144
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2017-03-09
15:30
Okinawa Kumejima Island Approach to Direct Memory Access for Tamper Resistant System using Secure Processor
Rihito Suzuki, Takuya Kajiwara, Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2016-138 DC2016-84
In an environment using secure processor to support secure program execution, because of its integrity check mechanism, ... [more] CPSY2016-138 DC2016-84
pp.39-44
CPSY, IPSJ-ARC 2016-10-06
10:00
Chiba Makuhari-messe [Poster Presentation] Multi-Processor System Design with Secure Processors
Takuya Kajiwara, Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2016-43
A secure processor enables secure computing
by protecting data from malicious users by encryption
of data and integri... [more]
CPSY2016-43
pp.7-10
ICSS, IPSJ-SPT 2016-03-04
11:00
Kyoto Academic Center for Computing and Media Studies, Kyoto University Towards Non-Encryption-Based RFID Private Tag Authentication
Kazuya Sakai (TMU) ICSS2015-64
In this paper, we present the summary of our research project on RFID security and privacy. To be specific, we will pres... [more] ICSS2015-64
pp.101-104
KBSE 2016-03-03
13:10
Oita   Development of a Modeling Tool for Secure Software Development with Software Security Knowledge Base
Shunichi Tanaka, Takafumi Tanaka, Shu Kutsuzawa (Tokyo Gakugei Univ.), Hiroaki Hashiura (NIT), Atsuo Hazeyama (Tokyo Gakugei Univ.), Seiji Munetoh (IBM Japan) KBSE2015-53
In recent years, following upon increase of services on the Internet, the needs for secure software development increase... [more] KBSE2015-53
pp.31-36
RCC, ITS, WBS 2015-12-18
14:50
Okinawa Okinawa Industry Support Center Secure Personal Attribute Message Authentication for Pedestrian-Friendly Intelligent Transport Systems
Seiichiro Mizoguchi (KDDI R&D LABS), Daisuke Oshida, Hisataka Takagi (Renesas Electronics), Hideaki Kawabata, Keisuke Takemori, Ayumu Kubota (KDDI R&D LABS) WBS2015-78 ITS2015-50 RCC2015-80
In the case of providing safety services to pedestrians in the intelligent transport system (ITS), considering pedestria... [more] WBS2015-78 ITS2015-50 RCC2015-80
pp.221-226
ITS, IEE-ITS 2015-03-09
17:10
Kyoto Kyoto Univ. [Invited Talk] In-vehicle Network Security Using Secure Elements -- Discussion of Security Technologies --
Keisuke Takemori (KDDI Labs) ITS2014-69
Many researchers try to attack the controller area network (CAN) by sending faked packets. Since many countermeasures, e... [more] ITS2014-69
pp.73-78
KBSE 2015-03-05
15:25
Tokyo The University of Electro-Communications A Case-based Management System for Secure Software Development Using Software Security Knowledge
Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] KBSE2014-57
pp.31-36
NS, IN
(Joint)
2015-03-02
09:30
Okinawa Okinawa Convention Center A Multipath Routing Method for Secure Dispersed Data Transfer Method to Consider Varying Node Density in Ad Hoc Networks
Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) NS2014-177
In ad hoc networks utilizing wireless multi-hop communication functions, two or more nodes can communicate with each oth... [more] NS2014-177
pp.7-12
 Results 1 - 20 of 61  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan