Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
CNR, BioX |
2024-02-29 13:30 |
Tokyo |
NHK Science & Technology Research Laboratories (Primary: On-site, Secondary: Online) |
Design of Aerial dialing PIN code input authentication system using deep learning hand shape authentication Jun Wang, Bo Wu, Kiminori Sato (TUT) BioX2023-70 CNR2023-37 |
With the continuous development of modern technology, the demand for contactless authentication is increasing, and a sim... [more] |
BioX2023-70 CNR2023-37 pp.1-6 |
WIT |
2023-06-17 10:00 |
Okinawa |
Okinawa Industry Support Center (Primary: On-site, Secondary: Online) |
AI-Utilized E-Learning Support System for Special Needs Children Taiga Haruta, Mariko Oda (KIT), Kohei Arai (Saga Univ./KIT), Taiki Ishigai (KIT) WIT2023-8 |
In recent years, the number of mentally challenged children has been increasing, and the spread of the new coronavirus i... [more] |
WIT2023-8 pp.40-45 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-19 15:40 |
Online |
Online |
Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 |
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] |
ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21 pp.35-39 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 11:05 |
Online |
Online |
A Study on Biometric Modality for Continuous Authentication of Smart Devices Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.) ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28 |
In recent years, with the rapid spread of smart devices, biometric authentication technology has been widely used as a u... [more] |
ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28 pp.70-75 |
SIP, BioX, IE, MI, ITE-IST, ITE-ME [detail] |
2022-05-20 15:00 |
Kumamoto |
Kumamoto University Kurokami Campus (Primary: On-site, Secondary: Online) |
Person Verification Based on Finger-Writing of a Simple Symbol on a Smartphone
-- Finger contact direction feature extraction by frequency distribution -- Takahiro Horiuchi, Masaya yamazaki, Isao Nakanishi (Tottori Univ.) SIP2022-25 BioX2022-25 IE2022-25 MI2022-25 |
We have studied on a technology to verify an individual by drawing a simple symbol that everyone are familiar and never ... [more] |
SIP2022-25 BioX2022-25 IE2022-25 MI2022-25 pp.126-131 |
NS, IN (Joint) |
2022-03-10 11:20 |
Online |
Online |
A Study on Telephone System with User Authentication Hiromu Aoshima (NTT) NS2021-132 |
I propose a telephone system with a function to authenticate individual users. In this system, if callees register calle... [more] |
NS2021-132 pp.59-63 |
CNR, BioX |
2022-03-04 14:50 |
Online |
Online |
Countermeasure against Various Attacks on Detection Method of Attacker's Touch to Fingerprint Authenticating User Using Intra-Body Propagation Characteristics for Anti-Spoofing Yuuki Asakawa, Takahiro Yoshida (Tokyo Univ. of Science) BioX2021-54 CNR2021-35 |
In previous study in our laboratory, we have proposed the detection method of attacker’s touch to a finger/wrist of a fi... [more] |
BioX2021-54 CNR2021-35 pp.39-44 |
ICTSSL, IEE-SMF, IN |
2021-10-21 09:50 |
Online |
Online |
Proposal and Evaluation of Cryptographic Communication Method that Separates Components Related to Coding and Decoding in IoT Environment Reita Suzuki (Niigata Univ.), Takafumi Hayashi (Nihon Univ.), Keisuke Nakano (Niigata Univ.) ICTSSL2021-20 |
MQTT is one of the lightweight messaging protocols currently used in the IoT environment, but there is no clear rule reg... [more] |
ICTSSL2021-20 pp.12-17 |
BioX |
2021-10-14 14:45 |
Online |
Online |
Writer Verification Based on Finger-writing of a Simple Symbol
-- Introduction of Finger-derived Features -- Takahiro Horiuchi, Tomoyuki Inoue, Isao Nakanishi (Tottori Univ.) BioX2021-44 |
We have studied on a technology to verify an individual by drawing asimple symbol that everyone are familiar and never f... [more] |
BioX2021-44 pp.7-11 |
ET |
2020-12-12 12:50 |
Online |
Online |
Development of a Gaze Information Collecting System in e-Testing for Examinee Authentication and Its Evaluation Toru Tokunaga, Toru Kano, Takako Akakura (TUS) ET2020-38 |
Today, with the development of communication technology, distance learning has improved to a point where it is comparabl... [more] |
ET2020-38 pp.23-28 |
MI, IE, SIP, BioX, ITE-IST, ITE-ME [detail] |
2020-05-29 11:20 |
Online |
Online |
Multimodal personal ear authentication using multiple sensor information Shunji Itani (Kansai Univ.), Shunsuke KIta (ORIST), Yoshinobu Kajikawa (Kansai Univ.) SIP2020-11 BioX2020-11 IE2020-11 MI2020-11 |
In this paper, we consider personal authentication technology using individual differences of acoustic transfer function... [more] |
SIP2020-11 BioX2020-11 IE2020-11 MI2020-11 pp.53-54 |
BioX, CNR |
2020-03-04 18:00 |
Tokyo |
(Cancelled but technical report was issued) |
Studies on Biometrics Authentication by Behavioral Features at Flick Input Wataru motoyama, Shinnya Fukumoto, Masayuki Kashima (Kagoshima Univ.), Kiminori Sato (TUT), Mutsumi Watanabe (Kagoshima Univ.) BioX2019-68 CNR2019-51 |
As the penetration rate of smartphones increases, the importance of secrecy in personal authentication is increasing. In... [more] |
BioX2019-68 CNR2019-51 pp.35-40 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 15:25 |
Kochi |
Kochi University of Technology |
Possibility of Identifying USB Device by Voltage Changing Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 |
In recent years, illegal USB devices have become problematic, such as malware infection by USB memory, incorrect key inp... [more] |
ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64 pp.391-396 |
IN, NS (Joint) |
2019-03-05 10:50 |
Okinawa |
Okinawa Convention Center |
A Study on Transferring Authorization Privilege for Granting Permission to Use Services to Multiple Users Omori Yoshihiko, Yamashita Takao (NTT) IN2018-126 |
Recently, it is becoming more popular to share a variety of resources such as facilities used in the sharing economy, ac... [more] |
IN2018-126 pp.253-258 |
SITE, ISEC, LOIS |
2018-11-04 10:00 |
Fukuoka |
|
Introduction of PKI Electronic Authentication for Important IoT Devices
-- For Establishment of Secure IoT Platform -- Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32 |
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] |
ISEC2018-72 SITE2018-50 LOIS2018-32 pp.45-50 |
SRW |
2018-08-20 12:45 |
Okayama |
Okayama Univ. |
Implementations of System Software Update and User Authentication Functions in Elastic Wireless Local-Area Network System Md. Manowarul Islam, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Kwenga Ismael Munene (Okayama Univ.) SRW2018-14 |
Nowadays, the wireless local-area network (WLAN) has become common for the Internet access due to a low-cost solution us... [more] |
SRW2018-14 pp.31-36 |
NS |
2018-05-17 10:00 |
Kanagawa |
Yokohama City Education Center |
Hierarchical Role-based Network Access Control using Software-Defined Networking Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15 |
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] |
NS2018-15 pp.1-6 |
PRMU, BioX |
2018-03-18 14:20 |
Tokyo |
|
A study on multi-factor authentication with usage environment recognition function Tomoaki Higashi, Yasushi Yamazaki (Univ. of Kitakyushu), Tetsushi Ohki (Shizuoka Univ.) BioX2017-45 PRMU2017-181 |
In recent years, with the rapid spread of smart devices, such as smart-phones and tablet PCs, biometric authentication u... [more] |
BioX2017-45 PRMU2017-181 pp.55-60 |
NS, IN (Joint) |
2018-03-02 15:40 |
Miyazaki |
Phoenix Seagaia Resort |
Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239 |
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] |
NS2017-239 pp.403-408 |
BioX |
2017-10-12 14:10 |
Okinawa |
Nobumoto Ohama Memorial Hall |
A study on continuous user authentication for smart devices considering resource consumption Toi Agawa, Tomoaki Higashi, Yasushi Yamazaki (Kitakyushu Univ.), Tetsushi Ohki (Shizuoka Univ.) BioX2017-25 |
In smart devices such as smartphones and tablet PCs that are rapidly spreading, more secure and convenient user authenti... [more] |
BioX2017-25 pp.1-6 |