IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 71 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, COMP 2017-12-22
10:40
Kochi Eikokuji Campus, Kochi University of Technology A Note on Security Notions of Anonymity in Identity-Based Encryption -- Relationship between LOR security and SW security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] ISEC2017-85 COMP2017-39
pp.89-94
IA, IN
(Joint)
2017-12-15
15:00
Hiroshima Hiroshima City Univ. A Study on Location Privacy for Multicast-Based Services
Kentaro Kita, Kai Ryu, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2017-63
Since Internet of Things (IoT) data generally correlates with its location where it is sensed, location-based forwarding... [more] IN2017-63
pp.103-108
EMM 2017-11-06
17:05
Kagoshima Kagoshima Univ. (Inamori Academy) An algorithm to reduce information loss by swapping data in k-anonymous partitions
Kodai Shigeoka (Osaka Univ.), Hiroko Akiyama (NIT,Nagano College), Masaaki Wada (Osaka Univ.) EMM2017-60
Given a dataset consisting of multidimensional numerical vectors, we consider $k$-anonymization by first dividing the da... [more] EMM2017-60
pp.27-31
VLD, DC, CPSY, RECONF, CPM, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2017-11-08
12:30
Kumamoto Kumamoto-Kenminkouryukan Parea Application of blind watermarking method for secondary use on smart community
Yuta Ohno, Akira Niwa, Hiroaki Nishi (Keio Univ.) VLD2017-58 DC2017-64
The smart community aims to enrich people's livelihood by secondary use of personal data such as home electric power and... [more] VLD2017-58 DC2017-64
pp.191-196
COMP, ISEC 2016-12-21
09:50
Hiroshima Hiroshima University A note on security notions of anonymity in Identity-based encryption
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] ISEC2016-71 COMP2016-32
pp.9-13
IA, IN
(Joint)
2016-12-15
17:10
Hiroshima Hiroshima city university Nodes anonymous and hiding of locator on ZNP, one of ID/Locator Separation Protocol
Yusuke Ikeda, Takao Kondo, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IA2016-71
ID/Locator Separation Protocol (LISP) is watched due to the revolution of usage of internet. However, LISP has a privacy... [more] IA2016-71
pp.47-52
IN, MoNA, CNR
(Joint)
2016-11-17
11:20
Kagoshima Kirishima-kanko Hotel Name-based Geograhical Forwarding Support for Location-based IoT Services
Kai Ryu, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2016-61
Internet of Things (IoT) devices deployed everywhere are expected as potential data sources for various applications suc... [more] IN2016-61
pp.7-12
IT, ISEC, WBS 2016-03-11
11:40
Tokyo The University of Electro-Communications k-Anonymization Techinque for Encrypted Data
Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) IT2015-135 ISEC2015-94 WBS2015-118
This paper proposes k-anonymizaiton technique for encrypted data stored on cloud environment. The proposed method utiliz... [more] IT2015-135 ISEC2015-94 WBS2015-118
pp.211-217
LOIS, ISEC, SITE 2015-11-06
17:10
Kanagawa Kanagawa Univ. Postpaid electronic money to keep privacy and its implementation
Tatshuhiko Sukegawa, Mashu Sakai, Hikaru Morita (Kanagawa Univ.) ISEC2015-48 SITE2015-35 LOIS2015-42
Postpaid electronic money schemes are provided by credit-card companies.
In these schemes, after electronic money is us... [more]
ISEC2015-48 SITE2015-35 LOIS2015-42
pp.81-86
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
10:40
Aichi NAGOYA TRADE & INDUSTRY CENTER On the Security of SAPAKE
SeongHan Shin, Kazukuni Kobara (AIST) ISEC2015-10 SITE2015-8 ICSS2015-20 EMM2015-18
In this paper, we discuss about the security of SAPAKE [14] which was proposed by Qian et al., as a simple anonymous pas... [more] ISEC2015-10 SITE2015-8 ICSS2015-20 EMM2015-18
pp.9-14
SS 2015-05-11
14:25
Kumamoto Kumamoto University [Invited Lecture] Quantitative Information Flow and Differential Privacy
Hiroyuki Seki (Nagoya Univ.) SS2015-4
Recently, quantitative modellings for security and privacy have been paid much attention. Among them are quantitative in... [more] SS2015-4
pp.17-22
LOIS 2015-03-05
13:00
Okinawa   A Study on Web-Based Questionnaire of Class-Assessment
Yasuhiko Higaki (Chiba Univ.) LOIS2014-68
I picked up following 7 requirements for web-based questionnaire from related studies; keeping
anonymity of the respond... [more]
LOIS2014-68
pp.43-48
IT 2014-12-09
15:50
Toyama Unazuki New Otani Hotel [Invited Talk] On Quantitative Notions for Security and Privacy
Hiroyuki Seki (Nagoya Univ.) IT2014-52
Recently, quantitative modellings for security and privacy have been paid much attention. Among them are quantitative i... [more] IT2014-52
pp.13-18
IA 2014-11-27
09:50
Tottori Green-Squalle Sekigane (Tottori) A Self-Governed P2P Anonymous Publish/Subscribe System
Naoki Tsujio, Yasuo Okabe (Kyoto Univ.) IA2014-63
There have been many researches to protect the freedom of expression in the internet, but complete anonymity sometimes l... [more] IA2014-63
pp.13-17
ISEC 2014-09-05
14:45
Tokyo Kikai-Shinko-Kaikan Bldg. Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction in Anonymous Credential System
Shahidatul Sadiah (Okayama Univ.), Toru Nakanishi (Hiroshima Univ.), Nobuo Funabiki (Okayama Univ.) ISEC2014-50
An anonymous credential system on attributes allows a user to convince a service provider anonymously that he/she owns t... [more] ISEC2014-50
pp.21-26
IN 2014-04-18
13:25
Kyoto Kyotofu-Chusho-Kigyo-Kaikan A Secure Route Selection Method for Smart Meters
Yuya Takii, Yuji Ikema, Osamu Mizuno (Kogakuin Univ) IN2014-5
Smart grid provide efficiency electricity usage situation balanced for supply and demands of electricity power and using... [more] IN2014-5
pp.55-60
ICSS, IPSJ-SPT 2014-03-28
09:00
Okinawa Meio Univiersity A Study on the Formulation of Re-identification of Anonymized Personal Information
Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) ICSS2013-86
Anonymizing personal information is one way to preserve human's privacy.
But combination of anonymized information mig... [more]
ICSS2013-86
pp.167-172
TL 2014-02-21
16:20
Chiba Chiba Univ. Shy users' self-disclosure on Twitter
Ryosuke Kohita, Edson T. Miyamoto (Univ. of Tsukuba) TL2013-62
According to previous literature, CMC (Computer-mediated Communication) facilitates self-disclosure (i.e., to talk truth... [more] TL2013-62
pp.7-12
IN, IA
(Joint)
2013-12-19
13:00
Hiroshima Hiroshima City Univ. Improving Anonymity in an ID/Locator Split Network Architecture
Yuki Kobayashi, Kunitake Kaneko, Fumio Teraoka (Keio Univ.) IA2013-57
Recently, ID/Locator split architectures have attracted considerable attention to solve several problems in current Inte... [more] IA2013-57
pp.1-6
ISEC 2013-09-13
15:05
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal of Extended Anonymous Credential Scheme with Ecient Proof of Age Inequality
Shahidatul Sadiah, Toru Nakanishi, Kan Watanabe, Nobuo Funabiki (Okayama Univ.) ISEC2013-54
An anonymous credential system on attributes allows a user to convince a service provider anonymously that he/she owns a... [more] ISEC2013-54
pp.21-28
 Results 21 - 40 of 71 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan