IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 1022 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, NS, CQ, NV
(Joint)
2023-11-21
13:15
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Security Evaluation of Low-latency Cipher based on Improved Simon against Deep Learning Analysis using Profiled Power Consumption
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2023-114
Society 5.0 aims to solve problems in social systems through the intercommunication of small devices. On the other hand,... [more] NS2023-114
pp.20-25
ICM, NS, CQ, NV
(Joint)
2023-11-22
12:30
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Invited Talk] Secure Middlebox Communication over TLS against Middlebox Compromise
Toru Hasegawa, Kentaro Kita, Junji Takemasa, Yuki Koizumi (Osaka Univ.) CQ2023-46
A large portion of Internet traffic passes through middleboxes that read or modify messages. However, such middleboxes a... [more] CQ2023-46
pp.50-53
ICM, NS, CQ, NV
(Joint)
2023-11-22
09:50
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
A survey on suitable hook points for outbound packet monitoring using eBPF
Masaya Okabe, Hiroshi Tsunoda (Tohtech) ICM2023-27
The use of VPNs and similar technologies has made it difficult to define network boundaries, and traditional boundary se... [more] ICM2023-27
pp.26-31
ICSS 2023-11-16
13:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2023-51
pp.1-6
ICSS 2023-11-16
15:20
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Attack Verification and Evaluation of Incremental Fault Analysis against AES Encryption Processing Device
Miran Tamagawa, Yuichi Futa (TUT), Takehiko Mieno (AVASYS), Hiroyuki Okazaki (Shinshu University) ICSS2023-56
In recent years,there has been a growing concern about the impact of fault analysis attack,which use hardware failures a... [more] ICSS2023-56
pp.35-41
ICSS 2023-11-17
11:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Investigation of Technical Support Scams Targeting Japan
Hiroyuki Ito (NICT), Kosuke Kajimoto, Tetsuya Kageyama, Taichi Aoki (JC3), Takahiro Kasama, Daisuke Inoue (NICT) ICSS2023-63
(To be available after the conference date) [more] ICSS2023-63
pp.85-92
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
09:55
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
MTJ-PUF with Input Decoder and Evaluation of Machine Learning Resistance
Takumi Kikuchi, Kimiyoshi Usami (SIT) VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47
Physically Unclonable Function (PUF), one of the LSI individual authentication techniques, is vulnerable to machine lear... [more] VLD2023-44 ICD2023-52 DC2023-51 RECONF2023-47
pp.82-87
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2023-11-16
13:20
Kumamoto Civic Auditorium Sears Home Yume Hall
(Primary: On-site, Secondary: Online)
Tamper Resistance Evaluation on FPGA for Low-Latency Cipher Sonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
Industry 5.0 promotes smart factories for system optimization by utilizing IoT and AI in the industrial field. The smart... [more] VLD2023-49 ICD2023-57 DC2023-56 RECONF2023-52
pp.101-105
LOIS, SITE, ISEC 2023-11-09
10:50
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technologies to Improve Content-Distribution and Broadcasting Services
Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more]
ISEC2023-54 SITE2023-48 LOIS2023-12
p.1
LOIS, SITE, ISEC 2023-11-10
10:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] ISEC2023-64 SITE2023-58 LOIS2023-22
pp.66-71
MW, EMCJ, EST, IEE-EMC [detail] 2023-10-19
13:10
Yamagata Yamagata University
(Primary: On-site, Secondary: Online)
An Application of Genetic Algorithms for XSS Attack Payload Generation and WAF Evaluation
Yu Funahashi, Hideaki Kimura (Chubu Univ) EMCJ2023-43 MW2023-97 EST2023-70
We propose a method of generating and evolving malicious scripts (payloads) used in cross-site scripting (XSS) attacks b... [more] EMCJ2023-43 MW2023-97 EST2023-70
pp.42-45
IN, ICTSSL, IEE-SMF 2023-10-20
14:40
Fukuoka Fukuoka University A Study on Applying Digital Twin-Assisted Security Platform for Cyber-Physical Systems to Supply Chain
Keizo Sugiyama (KDDI Research) ICTSSL2023-32
The convergence of cyberspace and physical space is becoming more significant towards Beyond 5G. The impact of attacks, ... [more] ICTSSL2023-32
pp.42-46
BioX 2023-10-12
14:45
Okinawa Nobumoto Ohama Memorial Hall A Study on Federated Learning System for Highly Accurate Biometric Authentication
Yusei Suzuki, Yosuke Kaga (Hitachi) BioX2023-58
With the development of machine learning on large-scale datasets, the accuracy of biometric authentication has significa... [more] BioX2023-58
pp.2-7
IA 2023-09-22
15:00
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Signing key management in cryptocurrency custodians learned from DNSSEC
Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] IA2023-30
pp.115-122
CPSY, DC, IPSJ-ARC [detail] 2023-08-04
13:40
Hokkaido Hakodate Arena
(Primary: On-site, Secondary: Online)
A Classification of Security Threats and Countermeasure Directions for Cloud-based Railway Signalling Systems Using COTS Components
Takashi Toyama, Akihiro Gion (RTRI)
Research and development of cloud-based railway signaling systems, which remotely control signalling devices or trains f... [more]
CPSY, DC, IPSJ-ARC [detail] 2023-08-04
18:45
Hokkaido Hakodate Arena
(Primary: On-site, Secondary: Online)
CPSY2023-26 DC2023-26 (To be available after the conference date) [more] CPSY2023-26 DC2023-26
pp.106-111
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
13:20
Hokkaido Hokkaido Jichiro Kaikan ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35 The Hardware Security Technical Committee invited the author to give a presentation about his recent elevation to IEEE F... [more] ISEC2023-35 SITE2023-29 BioX2023-38 HWS2023-35 ICSS2023-32 EMM2023-35
pp.141-146
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:00
Hokkaido Hokkaido Jichiro Kaikan An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication
Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
pp.165-170
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:00
Hokkaido Hokkaido Jichiro Kaikan Is Copying for Information Security Research ‘Fair Use’? -- Apple Inc. v. Corellium, Inc., No. 21-12835 (11th Cir. 2023) --
Yusuke Tachibana (FIT) ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
The replication of third-party software in the realm of information security research has the potential to encroach upon... [more] ISEC2023-49 SITE2023-43 BioX2023-52 HWS2023-49 ICSS2023-46 EMM2023-49
pp.229-231
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
pp.232-238
 Results 21 - 40 of 1022 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan