IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 47  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CNR, BioX 2024-02-29
13:30
Tokyo NHK Science & Technology Research Laboratories
(Primary: On-site, Secondary: Online)
Design of Aerial dialing PIN code input authentication system using deep learning hand shape authentication
Jun Wang, Bo Wu, Kiminori Sato (TUT) BioX2023-70 CNR2023-37
With the continuous development of modern technology, the demand for contactless authentication is increasing, and a sim... [more] BioX2023-70 CNR2023-37
pp.1-6
WIT 2023-06-17
10:00
Okinawa Okinawa Industry Support Center
(Primary: On-site, Secondary: Online)
AI-Utilized E-Learning Support System for Special Needs Children
Taiga Haruta, Mariko Oda (KIT), Kohei Arai (Saga Univ./KIT), Taiki Ishigai (KIT) WIT2023-8
In recent years, the number of mentally challenged children has been increasing, and the spread of the new coronavirus i... [more] WIT2023-8
pp.40-45
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-19
15:40
Online Online Security of Systems that Automatically Authenticate a User's Credentials and Location using Wireless Technology
Kazuki Tachibana, Junichi Sakamoto, Tsutomu Matsumoto (YNU) ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21
To enhance user convenience, there is a movement to automate certain processes in systems by performing authentication v... [more] ISEC2022-13 SITE2022-17 BioX2022-38 HWS2022-13 ICSS2022-21 EMM2022-21
pp.35-39
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
11:05
Online Online A Study on Biometric Modality for Continuous Authentication of Smart Devices
Yuka Watanabe, Yasushi Yamazaki (Kitakyushu Univ.) ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28
In recent years, with the rapid spread of smart devices, biometric authentication technology has been widely used as a u... [more] ISEC2022-20 SITE2022-24 BioX2022-45 HWS2022-20 ICSS2022-28 EMM2022-28
pp.70-75
SIP, BioX, IE, MI, ITE-IST, ITE-ME [detail] 2022-05-20
15:00
Kumamoto Kumamoto University Kurokami Campus
(Primary: On-site, Secondary: Online)
Person Verification Based on Finger-Writing of a Simple Symbol on a Smartphone -- Finger contact direction feature extraction by frequency distribution --
Takahiro Horiuchi, Masaya yamazaki, Isao Nakanishi (Tottori Univ.) SIP2022-25 BioX2022-25 IE2022-25 MI2022-25
We have studied on a technology to verify an individual by drawing a simple symbol that everyone are familiar and never ... [more] SIP2022-25 BioX2022-25 IE2022-25 MI2022-25
pp.126-131
NS, IN
(Joint)
2022-03-10
11:20
Online Online A Study on Telephone System with User Authentication
Hiromu Aoshima (NTT) NS2021-132
I propose a telephone system with a function to authenticate individual users. In this system, if callees register calle... [more] NS2021-132
pp.59-63
CNR, BioX 2022-03-04
14:50
Online Online Countermeasure against Various Attacks on Detection Method of Attacker's Touch to Fingerprint Authenticating User Using Intra-Body Propagation Characteristics for Anti-Spoofing
Yuuki Asakawa, Takahiro Yoshida (Tokyo Univ. of Science) BioX2021-54 CNR2021-35
In previous study in our laboratory, we have proposed the detection method of attacker’s touch to a finger/wrist of a fi... [more] BioX2021-54 CNR2021-35
pp.39-44
ICTSSL, IEE-SMF, IN 2021-10-21
09:50
Online Online Proposal and Evaluation of Cryptographic Communication Method that Separates Components Related to Coding and Decoding in IoT Environment
Reita Suzuki (Niigata Univ.), Takafumi Hayashi (Nihon Univ.), Keisuke Nakano (Niigata Univ.) ICTSSL2021-20
MQTT is one of the lightweight messaging protocols currently used in the IoT environment, but there is no clear rule reg... [more] ICTSSL2021-20
pp.12-17
BioX 2021-10-14
14:45
Online Online Writer Verification Based on Finger-writing of a Simple Symbol -- Introduction of Finger-derived Features --
Takahiro Horiuchi, Tomoyuki Inoue, Isao Nakanishi (Tottori Univ.) BioX2021-44
We have studied on a technology to verify an individual by drawing asimple symbol that everyone are familiar and never f... [more] BioX2021-44
pp.7-11
ET 2020-12-12
12:50
Online Online Development of a Gaze Information Collecting System in e-Testing for Examinee Authentication and Its Evaluation
Toru Tokunaga, Toru Kano, Takako Akakura (TUS) ET2020-38
Today, with the development of communication technology, distance learning has improved to a point where it is comparabl... [more] ET2020-38
pp.23-28
MI, IE, SIP, BioX, ITE-IST, ITE-ME [detail] 2020-05-29
11:20
Online Online Multimodal personal ear authentication using multiple sensor information
Shunji Itani (Kansai Univ.), Shunsuke KIta (ORIST), Yoshinobu Kajikawa (Kansai Univ.) SIP2020-11 BioX2020-11 IE2020-11 MI2020-11
In this paper, we consider personal authentication technology using individual differences of acoustic transfer function... [more] SIP2020-11 BioX2020-11 IE2020-11 MI2020-11
pp.53-54
BioX, CNR 2020-03-04
18:00
Tokyo
(Cancelled but technical report was issued)
Studies on Biometrics Authentication by Behavioral Features at Flick Input
Wataru motoyama, Shinnya Fukumoto, Masayuki Kashima (Kagoshima Univ.), Kiminori Sato (TUT), Mutsumi Watanabe (Kagoshima Univ.) BioX2019-68 CNR2019-51
As the penetration rate of smartphones increases, the importance of secrecy in personal authentication is increasing. In... [more] BioX2019-68 CNR2019-51
pp.35-40
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
15:25
Kochi Kochi University of Technology Possibility of Identifying USB Device by Voltage Changing
Taku Toyama, Junichi Sakamoto, Naoki Yoshida, Tsutomu Matsumoto (YNU) ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64
In recent years, illegal USB devices have become problematic, such as malware infection by USB memory, incorrect key inp... [more] ISEC2019-61 SITE2019-55 BioX2019-53 HWS2019-56 ICSS2019-59 EMM2019-64
pp.391-396
IN, NS
(Joint)
2019-03-05
10:50
Okinawa Okinawa Convention Center A Study on Transferring Authorization Privilege for Granting Permission to Use Services to Multiple Users
Omori Yoshihiko, Yamashita Takao (NTT) IN2018-126
Recently, it is becoming more popular to share a variety of resources such as facilities used in the sharing economy, ac... [more] IN2018-126
pp.253-258
SITE, ISEC, LOIS 2018-11-04
10:00
Fukuoka   Introduction of PKI Electronic Authentication for Important IoT Devices -- For Establishment of Secure IoT Platform --
Yoshikazu Matsumoto (SIOTP), Shigeo Tsujii (Chuo Univ.), Kimiyasu Shirouzu, Kohei Sese (SIOTP) ISEC2018-72 SITE2018-50 LOIS2018-32
In order to cope with ubiquitous threats in the internet, such as malwares and cyberattacks, security functions required... [more] ISEC2018-72 SITE2018-50 LOIS2018-32
pp.45-50
SRW 2018-08-20
12:45
Okayama Okayama Univ. Implementations of System Software Update and User Authentication Functions in Elastic Wireless Local-Area Network System
Md. Manowarul Islam, Nobuo Funabiki, Minoru Kuribayashi, Rahardhita Widyatra Sudibyo, Kwenga Ismael Munene (Okayama Univ.) SRW2018-14
Nowadays, the wireless local-area network (WLAN) has become common for the Internet access due to a low-cost solution us... [more] SRW2018-14
pp.31-36
NS 2018-05-17
10:00
Kanagawa Yokohama City Education Center Hierarchical Role-based Network Access Control using Software-Defined Networking
Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] NS2018-15
pp.1-6
PRMU, BioX 2018-03-18
14:20
Tokyo   A study on multi-factor authentication with usage environment recognition function
Tomoaki Higashi, Yasushi Yamazaki (Univ. of Kitakyushu), Tetsushi Ohki (Shizuoka Univ.) BioX2017-45 PRMU2017-181
In recent years, with the rapid spread of smart devices, such as smart-phones and tablet PCs, biometric authentication u... [more] BioX2017-45 PRMU2017-181
pp.55-60
NS, IN
(Joint)
2018-03-02
15:40
Miyazaki Phoenix Seagaia Resort Inter-Device Digital Rights Sharing and Transfer Based on Device-Owner Verification Collaboratively Performed by ID Providers and User Devices
Yoshihiko Omori, Hideo Nishimura, Takao Yamashita (NTT) NS2017-239
The technology of FIDO Alliance improves both security and usability of user authentication for various services provide... [more] NS2017-239
pp.403-408
BioX 2017-10-12
14:10
Okinawa Nobumoto Ohama Memorial Hall A study on continuous user authentication for smart devices considering resource consumption
Toi Agawa, Tomoaki Higashi, Yasushi Yamazaki (Kitakyushu Univ.), Tetsushi Ohki (Shizuoka Univ.) BioX2017-25
In smart devices such as smartphones and tablet PCs that are rapidly spreading, more secure and convenient user authenti... [more] BioX2017-25
pp.1-6
 Results 1 - 20 of 47  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan