Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM |
2024-01-16 14:25 |
Miyagi |
Tohoku Univ. (Primary: On-site, Secondary: Online) |
Comparison of multi-factor authentication and improved authentication methods for increased security Kazuki Takeda, Youichi Takashima (Kaishi Professional Univ) EMM2023-81 |
Password authentication is used as an authentication method for various services, and while ID+password authentication i... [more] |
EMM2023-81 pp.7-12 |
LOIS, SITE, ISEC |
2023-11-09 10:50 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
[Invited Talk]
Security Technologies to Improve Content-Distribution and Broadcasting Services Kazuto Ogawa (NICT) ISEC2023-54 SITE2023-48 LOIS2023-12 |
Nowadays, technologies for information security have become essential in the world cyber-space.
PC users know their val... [more] |
ISEC2023-54 SITE2023-48 LOIS2023-12 p.1 |
MWPTHz, EST, MW, EMT, OPE, IEE-EMT [detail] |
2022-07-19 09:20 |
Hokkaido |
Asahikawa Civic Culture Hall (Primary: On-site, Secondary: Online) |
Proposal for 3D vein authentication Tomoatsu Hasegawa, Hideaki Kimura (Chubu Univ.) EMT2022-7 MW2022-31 OPE2022-10 EST2022-8 MWPTHz2022-5 |
Today, digital security devices are used in a variety of locations.However, some digital authentication devices have cri... [more] |
EMT2022-7 MW2022-31 OPE2022-10 EST2022-8 MWPTHz2022-5 pp.1-4 |
ISEC |
2019-05-17 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A secure method of provisioning IoT devices with few operations Dai Yamamoto, Hirotaka Kokubo, Takanori Machida, Ikuya Morikawa (FUJITSU LABORATORIES LTD.), Akira Kanaoka (Toho Univ.) ISEC2019-8 |
Recently, most IoT devices have been connected to cloud servers, which provide users with useful services such as remote... [more] |
ISEC2019-8 pp.37-44 |
SSS |
2019-03-26 13:55 |
Tokyo |
|
Improvements of the convenience and safety for road traffic
-- -Field study of turn on-off interval of traffic control signal- -- Matsuoka Takeshi (Utsunomiya Univ.), Horino Sadao (kanagawa Univ.), Mineo Yoshiyuki (Promotion of Recycling society), Ikeda Takahisa (Hitachi) SSS2018-33 |
(To be available after the conference date) [more] |
SSS2018-33 pp.7-10 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-14 13:00 |
Yamaguchi |
|
Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing Motoi Tanaka, Hiroyuki Inaba (KIT) ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 |
A personal authentication system using PIN or password is widely used in various information terminals. However these au... [more] |
ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26 pp.29-32 |
IN |
2015-10-15 15:20 |
Osaka |
Osaka University |
A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
IN2015-55 pp.13-18 |
MSS, CAS |
2012-11-02 14:20 |
Iwate |
Iwate University |
Group Control of 2 Shaft Elevator for Peak Power Cut and Service Performance Kentaro Nakayama, Koji Takahashi (Tokyo Tech.) CAS2012-64 MSS2012-44 |
Discontinuing the use of one of two elevators for power saving worsens their service performance.
The authors proposed ... [more] |
CAS2012-64 MSS2012-44 pp.81-86 |
PRMU, MVE, CQ, IPSJ-CVIM [detail] |
2012-01-20 16:30 |
Osaka |
|
Constitution Method of Higher-order Crystal-growth Voronoi Diagram and Its Application Seiya Watanabe, Kohki Ninomiya, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) PRMU2011-179 MVE2011-88 |
Voronoi Diagram are used to find out territories in many fields of layout problems,such as hospital location and post of... [more] |
PRMU2011-179 MVE2011-88 pp.341-346 |
MoNA |
2007-01-26 15:00 |
Hiroshima |
|
[Panel Discussion]
mobile multimedia and society Hitoshi Okada (NII) MoMuC2006-78 |
Mobile Multimedia technology will enhance the usability of our life. However, it enables them to control our whole life.... [more] |
MoMuC2006-78 pp.95-100 |