IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 75 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS, AP
(Joint)
2018-11-20
11:55
Okinawa Okinawa Industry Support Center Problem and countermeasures for group secret key agreement using RSSI information
Keita Kuroyanagi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2018-183
As a physical layer security, a secret key agreement method based on radio wave propagation characteristics attracts att... [more] RCS2018-183
pp.31-36
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:50
Hokkaido Sapporo Convention Center Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device
Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST) ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20
A threat of leakage of sound information via electromagnetic field from a smart device having an audio output function h... [more] ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20
pp.83-88
IT 2018-07-19
15:55
Nara Yamato Kaigishitsu On the Minimum Cost of Information Erasure for Stationary Memoryless Sources
Naruaki Amada, Hideki Yagi (Univ. of Electro-Comm.) IT2018-17
In order to erase data including confidential information stored in the storage device, overwriting an unrelated and ran... [more] IT2018-17
pp.25-29
QIT
(2nd)
2018-06-04
17:50
Hiroshima ICCH Ran Performance improvement of RRDPS protocol by refined security analysis
Takaya Matsuura, Toshihiko Sasaki, Masato Koashi (UT)
In recent years, quantum key distribution (QKD) protocols which use weak coherent pulses have been attracting much atten... [more]
PN 2017-08-29
09:55
Hokkaido Toya Kanko Hotel Emergency Packet Transport Network Planning Scheme for Disaster Recovery with Multi-Carrier Interconnection
Sugang Xu (NICT), Noboru Yoshikane (KDDI Research, Inc.), Masaki Shiraiwa (NICT), Takehiro Tsuritani (KDDI Research, Inc.), Hiroaki Harai, Yoshinari Awaji, Naoya Wada (NICT) PN2017-21
In this report, we introduce an indirect approach for enabling multi-carrier interconnection in disaster recovery. A com... [more] PN2017-21
pp.39-46
EMCJ 2017-04-14
14:55
Tokyo NTT Musashino R&D Center An analytical study on the novel design method of small size frequency selective EM shield for mobile devices to prevent EM information leakage
Go Itami, Yohei Toriumi, Yoshiharu Akiyama (NTT) EMCJ2017-3
Recently, a risk of information leakage, such as eavesdropping on display screens and typing characters of mobile device... [more] EMCJ2017-3
pp.13-18
ICSS, IPSJ-SPT 2017-03-14
12:45
Nagasaki University of Nagasaki A system architecture that prevents fraud issue using third parties to issue authentication information
Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT) ICSS2016-72
Nowadays, the leakages of authentication information such as password from web service are happened frequently. MILAGRO-... [more] ICSS2016-72
pp.195-200
NS, IN
(Joint)
2017-03-02
09:30
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL User-Driven Privacy Management Framework for Content Access
Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL) NS2016-158
The current Internet has a social problem that content providers collect the large scale of personal information and use... [more] NS2016-158
pp.7-12
EMCJ 2017-01-20
09:25
Fukuoka Kyushu Institute of Technology An analytical study on the advanced EM shielding for mobile devices to provide sufficient transparency in frequency bands used for wireless communications and attenuation in other frequencies
Go Itami, Yohei Toriumi, Kazuhiro Takaya (NTT) EMCJ2016-117
There is a concern about a risk of information leakage, such as eavesdropping on display screens and typing characters o... [more] EMCJ2016-117
pp.45-50
ISEC, LOIS, SITE 2016-11-08
11:30
Fukui Community Hall & AOSSA Mall, Fukui [Invited Talk] Threat of Electromagnetic Information Leakage and Countermeasures
Yu-ichi Hayashi (Tohoku Gakuin Univ.) ISEC2016-63 SITE2016-53 LOIS2016-41
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] ISEC2016-63 SITE2016-53 LOIS2016-41
p.75
EMCJ, IEE-EMC, MW, EST [detail] 2016-10-21
09:00
Miyagi Tohoku Univ. Attempt for Determining Cryptographic Circuit Blocks Leaking Side-Channel Information Based on Internal Current Source -- Examination with FPGA Implementation of AES Circuits --
Kengo Iokibe, Naoki Kawata, Yusuke Yano, Hiroto Kagotani, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-74 MW2016-106 EST2016-70
For efficient security enhancement of cryptographic ICs against side-channel attacks (SCAs), it is important to identify... [more] EMCJ2016-74 MW2016-106 EST2016-70
pp.79-84
EMCJ, IEE-EMC, IEE-MAG 2016-06-02
13:36
Overseas NTU, Taiwan [Poster Presentation] Investigation of Relationship between Signal-to-Noise Ratio of EM Information Leakage and Side-Channel Attacking Cost.
Yusuke Yano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-25
Attacking cost of side-channel attack (SCA) can increase by application of various countermeasures to electromagnetic (E... [more] EMCJ2016-25
pp.23-24
EMCJ, IEE-EMC, IEE-MAG 2016-06-03
10:55
Overseas NTU, Taiwan [Invited Talk] EM Information Security of Tablet PCs in Public Space
Yu-ichi Hayashi (Tohoku Gakuin Univ.) EMCJ2016-41
This presentation shows a threat of EM display stealing from tablet PCs by a portable setup. We first show that a series... [more] EMCJ2016-41
p.79
EA, SP, SIP 2016-03-28
13:15
Oita Beppu International Convention Center B-ConPlaza [Poster Presentation] An Investigation into the Attenuation Depending on the Distance in the Watching System Using an Electromagnetic Wave
Takuya Ukai (NBU), Hiroki Funabashi (CIT), Manabu Fukushima (NBU), Syun'ichi Kawano (artnet), Yoshitaka Kondo (J-TEC), Mitsuo Matsumoto, Hirofumi Yanagawa (CIT) EA2015-79 SIP2015-128 SP2015-107
This paper describes the relationship between the attenuation and the distance measured with an doppler sensor using ele... [more] EA2015-79 SIP2015-128 SP2015-107
pp.75-80
EMCJ 2016-03-11
11:05
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on the risk evaluation of countermeasure technique for preventing electromagnetic information leakage
Ryo Ishikawa, Toshinori Mori, Kimihiro Tajima (NTT-AT), Yasunao Suzuki, Kazuhiro Takaya (NTT NT Labs.) EMCJ2015-124
A telecommunication equipment and information technical equipment usually produce unintentional electromagnetic fields. ... [more] EMCJ2015-124
pp.1-4
ICM, LOIS 2016-01-21
16:45
Fukuoka Fukuoka Institute of Technology [Invited Talk] Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications
Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] ICM2015-33 LOIS2015-55
pp.41-46
SRW 2015-12-21
13:30
Kanagawa Toshiba Intersystem Cochannel Interference Detection Method with Signal Leakage in 60-GHz Proximity Wireless Communication Systems
Tsuyoshi Kogawa, Tomoya Tandai, Hideo kasami (Toshiba) SRW2015-63
This paper proposes an intersystem cochannel interference detection method in 60-GHz proximity wireless communication sy... [more] SRW2015-63
pp.31-36
EMCJ 2015-11-13
10:35
Kanagawa Mitsubishi Electric Corporation A Gasket-Free Electromagnetic Shielding Structure for 2.4 GHz band Using Folded-Quarterwavelength SIW Resonators
Satoshi Yoneda, Yasuhiro Shiraki, Yuichi Sasaki, Naoto Oka, Hideyuki Oh-hashi (Mitsubishi Electric) EMCJ2015-81
As wireless local area network (LAN) devices have been widely spread in past few years, a shielded room realizing shield... [more] EMCJ2015-81
pp.1-6
LOIS, IE, EMM, IEE-CMN, ITE-ME [detail] 2015-09-11
12:40
Aichi Nagoya University, Higashiyama Campus Relationship between User's Will of Photo Sharing and Level of Photo Retouch
Yasuhiro Tanaka (Senshu Univ.), Akihisa Kodate (Tsuda College), Yu Ichifuji, Noboru Sonehara (NII) LOIS2015-25 IE2015-57 EMM2015-40
While expectations of personal Information and life log accumulation and utilization have been rapidly growing for more ... [more] LOIS2015-25 IE2015-57 EMM2015-40
pp.55-60
BioX, ITE-ME, ITE-IST 2015-06-29
14:00
Ishikawa Kanazawa University, Kakuma Campus Security Evaluation for Leakage of a Fingerprint Image from USB-Based Fingerprint Authentication Systems
Daigo Sato, Takeshi Okamoto, Naoto Umehara (KAIT) BioX2015-6
The growing availability of fingerprint authentication systems has resulted in a drop in their price, and their increase... [more] BioX2015-6
pp.39-44
 Results 21 - 40 of 75 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan