|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-10 10:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
NTP Tunneling Threat Model Verification and Countermeasure Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22 |
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] |
ISEC2023-64 SITE2023-58 LOIS2023-22 pp.66-71 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47 |
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] |
IT2020-128 ISEC2020-58 WBS2020-47 pp.104-109 |
NC, MBE (Joint) |
2020-03-05 14:35 |
Tokyo |
University of Electro Communications (Cancelled but technical report was issued) |
Detection of covert-speech-related potentials Sho Tsukiyama, Toshimasa Yamazaki (KIT) MBE2019-87 |
Recently, Brain-Computer Interfaces (BCIs) using speeches for communications have been researched by electroencephalogra... [more] |
MBE2019-87 pp.35-40 |
IT, ISEC, WBS |
2019-03-08 14:20 |
Tokyo |
University of Electro-Communications |
On Wireless Steganography based on OFDM and DFT-Precoding for IoT Networks Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata (Yokohama Natl. Univ.) IT2018-124 ISEC2018-130 WBS2018-125 |
A method for improving security of IoT networks
by hiding secret
message against the risk of eavesdropping over wire... [more] |
IT2018-124 ISEC2018-130 WBS2018-125 pp.297-302 |
IA, SITE, IPSJ-IOT [detail] |
2012-03-16 09:20 |
Hokkaido |
Hokkaido Univ. |
Design and Implementation of Network Covert Channel Validation Framework Takashi Tomine (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) SITE2011-47 IA2011-97 |
Network covert channels are communication channels or information transfer methods in networks which are not intended fo... [more] |
SITE2011-47 IA2011-97 pp.185-190 |
ICSS |
2011-03-25 13:25 |
Tokyo |
Suspended |
Consideration on hidden-communication channel in the Internet communication device. Tomoki Murota (Univ. of Tokyo), Khin Thida Latt (JAIST), Katsuhiro Horiba (Keio Univ.), Hiroaki Hazeyama (NAIST), Akira Kato (Keio Univ.) ICSS2010-60 |
Since the Internet became the society infrastructure, it is necessary to verify the vulnerability of network equip-
men... [more] |
ICSS2010-60 pp.23-28 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-02 16:35 |
Akita |
Akita University |
Logical Structure of the Cloud Which Projects Various Values onto Oneself
-- From the Aspect of the Agent of Self-Referred Social Systems -- Tetsuya Morizumi (TNSi), Kazuhiro Suzuki, Hirotsugu Kinoshita (Kanagawa Univ.) ISEC2009-23 SITE2009-15 ICSS2009-37 |
The semantics cloud is a logical system that the relation of the object world is described by the predicate logic, and t... [more] |
ISEC2009-23 SITE2009-15 ICSS2009-37 pp.51-56 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|