IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 61 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
KBSE 2015-01-27
11:15
Tokyo Kikai-Shinko-Kaikan Bldg. Case base of secure web application development using software security knowledge base
Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] KBSE2014-47
pp.49-54
IA, IN
(Joint)
2014-12-19
14:45
Hiroshima Hiroshima City University A new method for constructing Dynamic VPN using PKI certificate authentication and OpenFlow control
Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) IN2014-97
With increasing demand for the protection of personal information on the network, high level security measures is requir... [more] IN2014-97
pp.35-39
ICM, CQ, NS, NV
(Joint)
2014-11-13
09:25
Kochi Kochi-City-Culture-Plaza CUL-PORT A Suggestion of a secure network implementation based on the Healthcare PKI and OpenFlow control Technology.
Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) ICM2014-17
In dealing with medical information of patients through the network, high-level security is required. The Security Guide... [more] ICM2014-17
pp.7-11
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:40
Hokkaido San-Refure Hakodate A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals
Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
Act on Electronic Signatures and Certification Business was revised and duties of Public Certification Service for Indiv... [more] ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
pp.9-16
ICSS, IA 2014-06-06
14:25
Hyogo Takikawa Memorial Hall, Kobe University Shared Nothing Secure Programming in Erlang/OTP
Kenji Rikitake IA2014-11 ICSS2014-11
Shared nothing architecture (SN) is a standard design method for distributed systems. In this paper, the author presents... [more] IA2014-11 ICSS2014-11
pp.55-60
ASN 2014-05-29
14:30
Tokyo Convention Hall, RCAST, The University of Tokyo [Poster Presentation] An Adaptivity-Enhancing Multipath Routing Method to Ad Hoc Networks with Diversity on Node Density for Secure Dispersed Data Transfer
Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) ASN2014-27
In Ad hoc networks including multihop transmission functions, malicious relaying nodes can steal and leak their transfer... [more] ASN2014-27
pp.91-96
VLD 2014-03-03
16:25
Okinawa Okinawa Seinen Kaikan Secure scan design using improved random order scans and its evaluations
Masaru Oya, Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-141
Scan test using scan chains is one of the most important DFT techniques.
On the other hand, scan-based attacks are repo... [more]
VLD2013-141
pp.43-48
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2013-11-28
09:45
Kagoshima   An Area Constraint-Based Fault-Secure HLS Algorithm for RDR Architectures Considering Trade-Off between Reliability and Time Overhead
Kazushi Kawamura, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-79 DC2013-45
With process technology scaling, decreasing reliability caused by soft errors as well as increasing the average intercon... [more] VLD2013-79 DC2013-45
pp.129-134
VLD, IPSJ-SLDM 2013-05-16
16:00
Fukuoka Kitakyushu International Conference Center A Zero Time and Area Overhead Fault-Secure High-Level Synthesis Algorithm for RDR Architectures
Kazushi Kawamura, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-9
In this paper, we propose a zero time and area overhead fault-secure high-level synthesis algorithm for RDR architecture... [more] VLD2013-9
pp.67-72
KBSE 2013-03-14
12:00
Tokyo Shibaura Institute of Technology KBSSD: Proposal of a Software Security Knowledge Base for Web Application Development
Atsuo Hazeyama (Tokyo Gakugei Univ.) KBSE2012-72
Importance for software security technologies has been recognized according to increase of services on the internet.
A ... [more]
KBSE2012-72
pp.19-24
NS, IN
(Joint)
2013-03-07
10:00
Okinawa Okinawa Zanpamisaki Royal Hotel On multipath routing method to reduce the number of bottleneck nodes for secure dispersed data transfer in ad hoc networks
Anri Kimura, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) IN2012-162
Ad hoc networks are autonomous distributed networks without the fixed communication infrastructures such as base station... [more] IN2012-162
pp.47-52
NS, IN
(Joint)
2013-03-08
15:30
Okinawa Okinawa Zanpamisaki Royal Hotel A Study of a Trust-aware Routing Protocol in Wireless Multi-hop Networks
Kazuya Kohara (Osaka Univ.), Hirotake Abe (Univ. of Tsukuba), Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) NS2012-223
In wireless multihop networks, conventional trust based routing protocols are vulnerable to Spoofing ACK Attack.Maliciou... [more] NS2012-223
pp.337-342
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2012-11-26
16:00
Fukuoka Centennial Hall Kyushu University School of Medicine Secure Scan Architecture Using State Dependent Scan Flip Flop with Key-Based Configuration against Scan-Based Attack
Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2012-67 DC2012-33
Secure cryptographic LSIs is intensively used in order to perform confidential operation. Scan test has become the most ... [more] VLD2012-67 DC2012-33
pp.45-50
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2012-11-28
16:50
Fukuoka Centennial Hall Kyushu University School of Medicine A Design Method of Fault-Secure Parallel Prefix Adders by Carry-Bit Duplication
Nobutaka Kito (Chukyo Univ.), Naofumi Takagi (Kyoto Univ.) VLD2012-106 DC2012-72
We show a design method of fault-secure parallel prefix adders with various prefix structures.
Adders by the method gen... [more]
VLD2012-106 DC2012-72
pp.273-278
IE, SIP, ICD, VLD, IPSJ-SLDM [detail] 2012-10-19
16:00
Iwate Hotel Ruiz Secure Scan Architecture Using State Dependent Scan Flip-Flop with Key-Based Configuration on RSA Circuit  
Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2012-57 SIP2012-79 ICD2012-74 IE2012-81
Scan test is one of the useful design for testability techniques, which can detect circuit failure efficiently. However,... [more] VLD2012-57 SIP2012-79 ICD2012-74 IE2012-81
pp.95-100
DC, CPSY
(Joint)
2012-08-02
14:30
Tottori Torigin Bunka Kaikan Application Authentication System on Untrusted OS
Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] CPSY2012-11
pp.13-18
VLD, CAS, MSS, SIP 2012-07-03
11:40
Kyoto Kyoto Research Park Secure Scan Architecture on RSA Circuit Using State Dependent Scan Flip Flop against Scan-Based Side Channel Attack
Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) CAS2012-21 VLD2012-31 SIP2012-53 MSS2012-21
Scan test that is one of the useful design for testability tecniques, which can control and observe the FFs(Flip Flops) ... [more] CAS2012-21 VLD2012-31 SIP2012-53 MSS2012-21
pp.115-120
NS, IN
(Joint)
2012-03-09
13:30
Miyazaki Miyazaki Seagia Content Espresso: A Global Secure File Sharing System for Large Files
Kunitake Kaneko, Daisuke Ando, Fumio Teraoka (Keio Univ.) IN2011-192
Recently, it is common to handle large files over the world. However, large files make the system to store, share, and a... [more] IN2011-192
pp.329-334
NS 2012-01-27
13:20
Okinawa Ryukyu University A study on the efficient construction mechanism of overlay control channels in OpenFlow-based networks
Toshio Koide, Hideyuki Shimonishi (NEC) NS2011-168
A secure channel that connects a switch in OpenFlow-based network to a remote controller, allowing control information t... [more] NS2011-168
pp.133-138
NS, IN
(Joint)
2010-03-05
13:00
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) Communication Architecture Evolution that is enabled by Introducing Specific IP address for Each Session -- Unified Multiplex --
Hiroshi Kitamura (NEC Corp./Univ. of Electro-Comm.), Shingo Ata (Osaka City Univ.), Masayuki Murata (Osaka Univ.) IN2009-212
We have proposed a new communication architecture called “Unified Multiplex Communication Architecture.” Two new types o... [more] IN2009-212
pp.405-410
 Results 21 - 40 of 61 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan