IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 1023 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
11:20
Hokkaido Hokkaido Jichiro Kaikan A Study on the Application of Nudge to Improve Cybersecurity
Hideyuki Fujii (NRI Secure) ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
One possible measure to improve cybersecurity is the use of "Nudge". Nudge is designed (choice architectures) that chang... [more] ISEC2023-50 SITE2023-44 BioX2023-53 HWS2023-50 ICSS2023-47 EMM2023-50
pp.232-238
IA, ICSS 2023-06-20
16:00
Saga Saga Univ.
(Primary: On-site, Secondary: Online)
[Invited Talk] Cybersecurity education and the role of universities
Hiroshi Koide (Kyushu Univ.) IA2023-6 ICSS2023-6
In this presentation, the speaker will first discuss his experiences in the cybersecurity human resource development pro... [more] IA2023-6 ICSS2023-6
p.31
HWS 2023-04-15
09:15
Oita
(Primary: On-site, Secondary: Online)
An AES Cryptographic Processor with Partial Re-Keying Scheme Utilizing Physical Attack Sensor
Ryuki Ikemoto, Soichiro Fujii (Osaka Univ.), Yuki Yamashita, Makoto Nagata (Kobe Univ.), Jun Shiomi, Yoshihiro Midoh, Noriyuki Miura (Osaka Univ.) HWS2023-9
We propose a partial secret key update method for AES cryptography using sensors that can detect physical attacks on cry... [more] HWS2023-9
pp.34-36
DC, CPSY, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2023-03-24
09:00
Kagoshima Amagi Town Disaster Prevention Center (Tokunoshima)
(Primary: On-site, Secondary: Online)
A preliminary study on time-dependency of cyber security vulnerability assessment
Takashi Minohara, Naohiro Kubota (Takushoku Univ.) CPSY2022-42 DC2022-101
Information system administrators must pay attention to system vulnerability information and take appropriate measures a... [more] CPSY2022-42 DC2022-101
pp.49-54
IA, SITE, IPSJ-IOT [detail] 2023-03-17
10:25
Gunma Maebashi Institute of Technology
(Primary: On-site, Secondary: Online)
[Invited Talk] Dual-Use of Cybersecurity -- From the Threat Landscape in Cyberspace with a Focus on IoT Security --
Tsukasa Ogino (CCDS) SITE2022-62 IA2022-85
The Internet of Things (IoT), in which automobiles, drones, home appliances, and other devices are connected via the Int... [more] SITE2022-62 IA2022-85
pp.45-52
RCC, ISEC, IT, WBS 2023-03-14
09:25
Yamaguchi
(Primary: On-site, Secondary: Online)
A Study on Secure Coded Communications Using Discrete Fourier Transform over Finite Fields
Shoichiro Yamasaki (Hiroshima City Univ), Tomoko K. Matsushima (Yokohama College of Commerce), Hirokazu Tanaka (Hiroshima City Univ) IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
The authors have proposed a security enhancement scheme using a shortened non-systematic
Reed-Solomon codes construc... [more]
IT2022-79 ISEC2022-58 WBS2022-76 RCC2022-76
pp.74-79
RCC, ISEC, IT, WBS 2023-03-14
13:50
Yamaguchi
(Primary: On-site, Secondary: Online)
Secure communication based on high precision space-time synchronization
Kouki Yonaga, Nobuyasu Shiga, Satoshi Yasuda, Kenichi Takizawa, Maki Yoshida (NICT) IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
This research aims to establish a new technology to realize secure communication based on space-time synchro- nization c... [more] IT2022-83 ISEC2022-62 WBS2022-80 RCC2022-80
pp.97-102
RCC, ISEC, IT, WBS 2023-03-14
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Enhancing physical-layer security by 4PPM space division multiplexing for smartphone screen to camera uplink communication
Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83
In indoor 3.5-m uplink screen camera communication using a smartphone screen and a video camera, it has been shown that ... [more] IT2022-86 ISEC2022-65 WBS2022-83 RCC2022-83
pp.114-119
ICSS, IPSJ-SPT 2023-03-13
13:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Basic Study on IoT Security Using Robot Arm
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] ICSS2022-51
pp.19-24
ICSS, IPSJ-SPT 2023-03-13
14:40
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Consideration of a Packet Level Anomaly Communication Classification Model Using Word Embedding and LSTM
Yoshikatsu Kashiwabara, Kohei Miyamoto, Iida Masazumi, Shota Kawanaka (Kyushu Univ), Han Chansu, Ban Tao, Kenshi Takahashi (NICT), Jun'ichi Takeuchi (Kyushu Univ) ICSS2022-53
In recent years, network-based intrusion detection systems (NIDS), which are systems for detecting unauthorized access o... [more] ICSS2022-53
pp.31-36
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] ICSS2022-62
pp.85-90
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2022-68
pp.121-126
ICSS, IPSJ-SPT 2023-03-14
10:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Port-aware IPv6 Scanning and Large-scale Security Surveys
Tatsuya Takemura, Takuya Watanabe, Eitaro Shioji, Mitsuaki Akiyama (NTT) ICSS2022-73
(To be available after the conference date) [more] ICSS2022-73
pp.151-156
HWS, VLD 2023-03-01
13:50
Okinawa
(Primary: On-site, Secondary: Online)
Circuit Optimization and Simulation Evaluation for Ultra-Low Voltage of LRPUF Using Manufacturing Variability of Leakage Current
Shunkichi Hata, Kimiyoshi Usami (SIT) VLD2022-77 HWS2022-48
Low power consumption and low-voltage operation become critical issues to be addressed when PUF (Physically Unclonable F... [more] VLD2022-77 HWS2022-48
pp.25-30
HWS, VLD 2023-03-02
15:20
Okinawa
(Primary: On-site, Secondary: Online)
Secure Cache System against On-Chip Threats
Keisuke Kamahori, Shinya Takamaeda (UTokyo) VLD2022-95 HWS2022-66
In this paper, we propose a new threat model for secure processor design that considers on-chip threats.
Also, we desi... [more]
VLD2022-95 HWS2022-66
pp.113-118
HWS, VLD 2023-03-02
15:45
Okinawa
(Primary: On-site, Secondary: Online)
Hiding Memory Structure for IP Protection
Sun Tanaka, Shinya Takamaeda (UTokyo) VLD2022-96 HWS2022-67
This paper proposes a concept and a method of hiding memory structure for IP protection. [more] VLD2022-96 HWS2022-67
pp.119-124
HWS, VLD 2023-03-02
17:15
Okinawa
(Primary: On-site, Secondary: Online)
Communication-Efficient Federated Learning with Gradient Boosting Decision Trees
Kotaro Shimamura, Shinya Takamaeda (UTokyo) VLD2022-99 HWS2022-70
Federated learning (FL) is a machine learning method in which clients learn cooperatively without disclosing private dat... [more] VLD2022-99 HWS2022-70
pp.137-142
HWS, VLD 2023-03-03
13:25
Okinawa
(Primary: On-site, Secondary: Online)
High-Performance and Programmer-Friendly Secure Non-Volatile Memory using Temporal Memory-Access Redirection
Ryo Koike, Shinya Takamaeda (UTokyo) VLD2022-106 HWS2022-77
Byte-addressable non-volatile memory (NVM) has two challenges, performance degradation due to high-latency integrity tre... [more] VLD2022-106 HWS2022-77
pp.179-184
HWS, VLD 2023-03-04
10:25
Okinawa
(Primary: On-site, Secondary: Online)
Fundamental study of distance spoofing attack against dToF lidar with interference mitigation function
Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2022-116 HWS2022-87
In order to avoid interference with the spread of LiDAR, a simple mitigation method that changes the irradiation interva... [more] VLD2022-116 HWS2022-87
pp.239-244
HWS, VLD 2023-03-04
13:30
Okinawa
(Primary: On-site, Secondary: Online)
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures
Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] VLD2022-120 HWS2022-91
pp.261-266
 Results 41 - 60 of 1023 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan