Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PN |
2023-08-29 15:40 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
A Jitter-Constrained High-Speed Multilayer Combined-Path Design Algorithm for Center-Based Security Analysis Ryuta Murakami, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2023-24 |
In order to realize a highly reliable network infrastructure in the Beyond 5G era, we have proposed the“Reconfigurable I... [more] |
PN2023-24 pp.40-46 |
PN |
2023-03-02 12:00 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Conceptual Demonstration of the Reconfigurable Probe over US-Japan Experimantal Network in SC22 Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2022-59 |
Towards the realization of a secure Beyond 5G infrastructure network, we have proposed the "Reconfigurable In-network Se... [more] |
PN2022-59 pp.90-95 |
IT, EMM |
2022-05-17 16:40 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Codes with List Decoding Yujie Gu (Kyudai) IT2022-8 EMM2022-8 |
In this paper, we consider secure codes for protecting the copyright of multimedia content against collusion attacks. We... [more] |
IT2022-8 EMM2022-8 pp.41-43 |
DC |
2021-12-10 14:00 |
Kagawa |
(Primary: On-site, Secondary: Online) |
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57 |
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] |
DC2021-57 pp.13-18 |
CPSY, DC, IPSJ-ARC [detail] |
2019-07-26 17:00 |
Hokkaido |
Kitami Civic Hall |
Secure Distributed Computing using Blockchain Yoshiaki Iwashita, Hidetsugu Irie, Shuichi Sakai (UT) CPSY2019-37 DC2019-37 |
We describe the development of a smart contract that can run programs on a blockchain, and a distributed computing platf... [more] |
CPSY2019-37 DC2019-37 pp.223-227 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-11 10:40 |
Osaka |
I-Site Nanba(Osaka) |
[Poster Presentation]
A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 |
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] |
RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI) |
ISEC |
2019-05-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018) Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10 |
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] |
ISEC2019-10 p.47 |
KBSE |
2019-03-02 09:00 |
Kyoto |
Doshisha University Kambaikan |
Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62 |
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] |
KBSE2018-62 pp.51-56 |
CPSY, DC, IPSJ-ARC (Joint) [detail] |
2018-07-30 18:30 |
Kumamoto |
Kumamoto City International Center |
DC2018-18 |
Wireless sensor networks (hereinafter, referred to as WSNs) are susceptible to eavesdrop, since a sensor node utilizes w... [more] |
DC2018-18 pp.27-32 |
KBSE |
2018-03-01 15:50 |
Okinawa |
|
Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50 |
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] |
KBSE2017-50 pp.67-72 |
ICD, CPSY, CAS |
2017-12-14 15:10 |
Okinawa |
Art Hotel Ishigakijima |
A proposal for Improving Security of Adiabatic Reversible Logic Based on PADDL Tomotaka Nishiwaki, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) CAS2017-88 ICD2017-76 CPSY2017-85 |
An adiabatic logic is one of the low power consumption performance improvement by circuit technology for integrated circ... [more] |
CAS2017-88 ICD2017-76 CPSY2017-85 pp.113-117 |
SS |
2017-03-10 14:45 |
Okinawa |
|
Evaluation of a Security Requirement Analysis Support System using Software Security Knowledge Base Atsuo Hazeyama, Shunichi Tanaka (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Seiji Munetoh (IBM Japan), Takao Okubo (IISEC) SS2016-83 |
In recent years, following upon increase of services on the Internet, the needs for secure software development increase... [more] |
SS2016-83 pp.139-144 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-09 15:30 |
Okinawa |
Kumejima Island |
Approach to Direct Memory Access for Tamper Resistant System using Secure Processor Rihito Suzuki, Takuya Kajiwara, Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2016-138 DC2016-84 |
In an environment using secure processor to support secure program execution, because of its integrity check mechanism, ... [more] |
CPSY2016-138 DC2016-84 pp.39-44 |
CPSY, IPSJ-ARC |
2016-10-06 10:00 |
Chiba |
Makuhari-messe |
[Poster Presentation]
Multi-Processor System Design with Secure Processors Takuya Kajiwara, Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai (UTokyo) CPSY2016-43 |
A secure processor enables secure computing
by protecting data from malicious users by encryption
of data and integri... [more] |
CPSY2016-43 pp.7-10 |
ICSS, IPSJ-SPT |
2016-03-04 11:00 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Towards Non-Encryption-Based RFID Private Tag Authentication Kazuya Sakai (TMU) ICSS2015-64 |
In this paper, we present the summary of our research project on RFID security and privacy. To be specific, we will pres... [more] |
ICSS2015-64 pp.101-104 |
KBSE |
2016-03-03 13:10 |
Oita |
|
Development of a Modeling Tool for Secure Software Development with Software Security Knowledge Base Shunichi Tanaka, Takafumi Tanaka, Shu Kutsuzawa (Tokyo Gakugei Univ.), Hiroaki Hashiura (NIT), Atsuo Hazeyama (Tokyo Gakugei Univ.), Seiji Munetoh (IBM Japan) KBSE2015-53 |
In recent years, following upon increase of services on the Internet, the needs for secure software development increase... [more] |
KBSE2015-53 pp.31-36 |
RCC, ITS, WBS |
2015-12-18 14:50 |
Okinawa |
Okinawa Industry Support Center |
Secure Personal Attribute Message Authentication for Pedestrian-Friendly Intelligent Transport Systems Seiichiro Mizoguchi (KDDI R&D LABS), Daisuke Oshida, Hisataka Takagi (Renesas Electronics), Hideaki Kawabata, Keisuke Takemori, Ayumu Kubota (KDDI R&D LABS) WBS2015-78 ITS2015-50 RCC2015-80 |
In the case of providing safety services to pedestrians in the intelligent transport system (ITS), considering pedestria... [more] |
WBS2015-78 ITS2015-50 RCC2015-80 pp.221-226 |
ITS, IEE-ITS |
2015-03-09 17:10 |
Kyoto |
Kyoto Univ. |
[Invited Talk]
In-vehicle Network Security Using Secure Elements
-- Discussion of Security Technologies -- Keisuke Takemori (KDDI Labs) ITS2014-69 |
Many researchers try to attack the controller area network (CAN) by sending faked packets. Since many countermeasures, e... [more] |
ITS2014-69 pp.73-78 |
KBSE |
2015-03-05 15:25 |
Tokyo |
The University of Electro-Communications |
A Case-based Management System for Secure Software Development Using Software Security Knowledge Masahito Saito, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-57 |
In recent years, importance on software security technologies has been recognized and various types of the technologies ... [more] |
KBSE2014-57 pp.31-36 |
NS, IN (Joint) |
2015-03-02 09:30 |
Okinawa |
Okinawa Convention Center |
A Multipath Routing Method for Secure Dispersed Data Transfer Method to Consider Varying Node Density in Ad Hoc Networks Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) NS2014-177 |
In ad hoc networks utilizing wireless multi-hop communication functions, two or more nodes can communicate with each oth... [more] |
NS2014-177 pp.7-12 |