IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-14
11:00
Osaka Osaka Univ. (Suita Campus) [Invited Talk] Cryptographic Research Based on Algebraic Curve Computation
Katsuyuki Takashima (Waseda Univ.) IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
We have a wide range of cryptographic primitives based on elliptic curves, i.e., widely deployed public key cryptosystem... [more] IT2023-116 ISEC2023-115 WBS2023-104 RCC2023-98
p.265
ICSS 2023-11-16
14:30
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Formal Verification of an Edge Computing Platform based on Modular Architecture using Intel SGX
Yuma Nishihira (Tokai Univ.), Hayato Kimura (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-54
The proliferation of IoT devices requires an edge computing infrastructure that can process large amounts of data in a f... [more] ICSS2023-54
pp.22-29
ICSS, IPSJ-SPT 2020-03-03
11:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Realization of Privacy Policy with Attribute-Based Encryption and Its Applications
Motoi Hayashi, Atsuko Miyaji (Osaka Univ.) ICSS2019-103
In recent years, online shopping is getting more and more popular and has been used by many users all over the world. On... [more] ICSS2019-103
pp.301-306
IA, SITE, IPSJ-IOT [detail] 2019-03-07
10:50
Tokushima Grand XIV Naruto Development of a Cloud Application Sharing Platform with Authorization Mechanism using CP-ABE
Yoshinori Kamori, Kaori Maeda (Hiroshima City Univ.), Tohru Kondo, Reiji Aibara (Hiroshima Univ.) SITE2018-69 IA2018-61
In recent years, collaborative work using cloud applications has become common. In that case, the user experience degrad... [more] SITE2018-69 IA2018-61
pp.15-21
EA, ASJ-H, EMM, IPSJ-MUS [detail] 2018-11-21
13:30
Ishikawa Hotel Koshuen Implementation and Evaluation of Fingerprinting System for Preventing Internal Leakage of Sensitive Data
Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EA2018-70 EMM2018-70
Due to the development of electrical system in organizations such as companies, the sensitive data should be managed sec... [more] EA2018-70 EMM2018-70
pp.43-48
LOIS, ISEC, SITE 2017-11-10
15:40
Kyoto   An Implementation of Mutual Authentication Using Attribute-based Encryption for IoT
Yusuke Tsubaki, Toru Nakanishi (Hiroshima Univ.) ISEC2017-70 SITE2017-52 LOIS2017-47
Recently, services using IoT have been widespread. The IoT system is a bidirectional communication model between the dev... [more] ISEC2017-70 SITE2017-52 LOIS2017-47
pp.123-128
EMM, IT 2017-05-22
14:30
Yamagata Yamagata University(Yonezawa Campus) A Proposal of Fingerprinting System for Protection of Sensitive Data from Internal Leakage
Takahiro Ueda, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) IT2017-4 EMM2017-4
Due to the development of electrical system in organizations such as companies and government, the sensitive data such ... [more] IT2017-4 EMM2017-4
pp.19-24
ISEC, WBS, IT 2017-03-10
14:35
Tokyo TOKAI University Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) IT2016-129 ISEC2016-119 WBS2016-105
A public-key encryption scheme with access control and keyword search functionalities enables multiple service providers... [more] IT2016-129 ISEC2016-119 WBS2016-105
pp.195-202
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
10:45
Yamaguchi   Implementation and Evaluation of Outsourcing Scheme of Attribute-Based Encryption
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.) ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and ... [more] ISEC2016-30 SITE2016-24 ICSS2016-30 EMM2016-38
pp.129-136
ISEC 2016-05-19
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Conversion among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada (AIST) ISEC2016-3
Predicate encryption is an extension of public key encryption that enables much flexibility. There are many kinds of pre... [more] ISEC2016-3
p.13
IT, ISEC, WBS 2016-03-11
10:25
Tokyo The University of Electro-Communications Expressive Attribute-Based Encryption with Fast Decryption
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-132 ISEC2015-91 WBS2015-115
In recent years, cloud computing has property of cost savings and flexibility, but it does not seem to supply security. ... [more] IT2015-132 ISEC2015-91 WBS2015-115
pp.189-195
IT, ISEC, WBS 2016-03-11
10:50
Tokyo The University of Electro-Communications Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) IT2015-133 ISEC2015-92 WBS2015-116
In recent years, Attribute-Based Encryption (ABE) is the cryptosystem that is studied actively. Especially, an ABE syste... [more] IT2015-133 ISEC2015-92 WBS2015-116
pp.197-204
ICSS 2012-11-22
15:35
Hiroshima Miyajima Mori-no-Yado Implementation and Evaluation of a File Sharing Service with File Name Encryption using CP-ABE
Megumi Goto, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) ICSS2012-53
Online storage services, e.g. Dropbox, have a weakness, which the storage administrator can obtain contents of user's fi... [more] ICSS2012-53
pp.49-54
LOIS, ICM 2012-01-20
15:10
Kumamoto Sojo Univ. Implementation and Evaluation of a Client Application using Attribute Based Encryption for an Online Storage Service
Yoshinori Matsumoto (Univ. of Hyogo), Daisuke Nigaki, Megumi Uchida, Nobuaki Kondo (Kobe Digital Lab.), Takuho Mitsunaga (Kyoto Univ.), Yutaka Igarashi (College of Engineering, Kanazawa Institute of Technology), Yukio Rikiso (Univ. of Hyogo) ICM2011-44 LOIS2011-69
Although Cloud Computing has attracted a great deal of attention for years, it also raises a lot of se- curity concerns.... [more] ICM2011-44 LOIS2011-69
pp.73-78
ISEC, IT, WBS 2011-03-03
10:50
Osaka Osaka University Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] IT2010-70 ISEC2010-74 WBS2010-49
pp.15-22
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
13:25
Aomori Hirosaki University Attribute-based encryption with arbitrary number of authorities
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] ISEC2010-30 SITE2010-26 ICSS2010-36
pp.153-158
ISEC 2010-05-21
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. An Improvement of Attribute-based Encryption
Hiroki Kunitake, Masahiro Mambo, Eiji Okamoto (Tsukuba Univ.) ISEC2010-6
Attribute-Based Encryption(ABE) allows only entities having a specified set of attributes can decrypt ciphertexts. ABE i... [more] ISEC2010-6
pp.33-39
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan