Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, AP (Joint) |
2018-11-20 11:55 |
Okinawa |
Okinawa Industry Support Center |
Problem and countermeasures for group secret key agreement using RSSI information Keita Kuroyanagi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2018-183 |
As a physical layer security, a secret key agreement method based on radio wave propagation characteristics attracts att... [more] |
RCS2018-183 pp.31-36 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 14:50 |
Hokkaido |
Sapporo Convention Center |
Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST) ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20 |
A threat of leakage of sound information via electromagnetic field from a smart device having an audio output function h... [more] |
ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20 pp.83-88 |
IT |
2018-07-19 15:55 |
Nara |
Yamato Kaigishitsu |
On the Minimum Cost of Information Erasure for Stationary Memoryless Sources Naruaki Amada, Hideki Yagi (Univ. of Electro-Comm.) IT2018-17 |
In order to erase data including confidential information stored in the storage device, overwriting an unrelated and ran... [more] |
IT2018-17 pp.25-29 |
QIT (2nd) |
2018-06-04 17:50 |
Hiroshima |
ICCH Ran |
Performance improvement of RRDPS protocol by refined security analysis Takaya Matsuura, Toshihiko Sasaki, Masato Koashi (UT) |
In recent years, quantum key distribution (QKD) protocols which use weak coherent pulses have been attracting much atten... [more] |
|
PN |
2017-08-29 09:55 |
Hokkaido |
Toya Kanko Hotel |
Emergency Packet Transport Network Planning Scheme for Disaster Recovery with Multi-Carrier Interconnection Sugang Xu (NICT), Noboru Yoshikane (KDDI Research, Inc.), Masaki Shiraiwa (NICT), Takehiro Tsuritani (KDDI Research, Inc.), Hiroaki Harai, Yoshinari Awaji, Naoya Wada (NICT) PN2017-21 |
In this report, we introduce an indirect approach for enabling multi-carrier interconnection in disaster recovery. A com... [more] |
PN2017-21 pp.39-46 |
EMCJ |
2017-04-14 14:55 |
Tokyo |
NTT Musashino R&D Center |
An analytical study on the novel design method of small size frequency selective EM shield for mobile devices to prevent EM information leakage Go Itami, Yohei Toriumi, Yoshiharu Akiyama (NTT) EMCJ2017-3 |
Recently, a risk of information leakage, such as eavesdropping on display screens and typing characters of mobile device... [more] |
EMCJ2017-3 pp.13-18 |
ICSS, IPSJ-SPT |
2017-03-14 12:45 |
Nagasaki |
University of Nagasaki |
A system architecture that prevents fraud issue using third parties to issue authentication information Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT) ICSS2016-72 |
Nowadays, the leakages of authentication information such as password from web service are happened frequently. MILAGRO-... [more] |
ICSS2016-72 pp.195-200 |
NS, IN (Joint) |
2017-03-02 09:30 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
User-Driven Privacy Management Framework for Content Access Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL) NS2016-158 |
The current Internet has a social problem that content providers collect the large scale of personal information and use... [more] |
NS2016-158 pp.7-12 |
EMCJ |
2017-01-20 09:25 |
Fukuoka |
Kyushu Institute of Technology |
An analytical study on the advanced EM shielding for mobile devices to provide sufficient transparency in frequency bands used for wireless communications and attenuation in other frequencies Go Itami, Yohei Toriumi, Kazuhiro Takaya (NTT) EMCJ2016-117 |
There is a concern about a risk of information leakage, such as eavesdropping on display screens and typing characters o... [more] |
EMCJ2016-117 pp.45-50 |
ISEC, LOIS, SITE |
2016-11-08 11:30 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
[Invited Talk]
Threat of Electromagnetic Information Leakage and Countermeasures Yu-ichi Hayashi (Tohoku Gakuin Univ.) ISEC2016-63 SITE2016-53 LOIS2016-41 |
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] |
ISEC2016-63 SITE2016-53 LOIS2016-41 p.75 |
EMCJ, IEE-EMC, MW, EST [detail] |
2016-10-21 09:00 |
Miyagi |
Tohoku Univ. |
Attempt for Determining Cryptographic Circuit Blocks Leaking Side-Channel Information Based on Internal Current Source
-- Examination with FPGA Implementation of AES Circuits -- Kengo Iokibe, Naoki Kawata, Yusuke Yano, Hiroto Kagotani, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-74 MW2016-106 EST2016-70 |
For efficient security enhancement of cryptographic ICs against side-channel attacks (SCAs), it is important to identify... [more] |
EMCJ2016-74 MW2016-106 EST2016-70 pp.79-84 |
EMCJ, IEE-EMC, IEE-MAG |
2016-06-02 13:36 |
Overseas |
NTU, Taiwan |
[Poster Presentation]
Investigation of Relationship between Signal-to-Noise Ratio of EM Information Leakage and Side-Channel Attacking Cost. Yusuke Yano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.) EMCJ2016-25 |
Attacking cost of side-channel attack (SCA) can increase by application of various countermeasures to electromagnetic (E... [more] |
EMCJ2016-25 pp.23-24 |
EMCJ, IEE-EMC, IEE-MAG |
2016-06-03 10:55 |
Overseas |
NTU, Taiwan |
[Invited Talk]
EM Information Security of Tablet PCs in Public Space Yu-ichi Hayashi (Tohoku Gakuin Univ.) EMCJ2016-41 |
This presentation shows a threat of EM display stealing from tablet PCs by a portable setup. We first show that a series... [more] |
EMCJ2016-41 p.79 |
EA, SP, SIP |
2016-03-28 13:15 |
Oita |
Beppu International Convention Center B-ConPlaza |
[Poster Presentation]
An Investigation into the Attenuation Depending on the Distance in the Watching System Using an Electromagnetic Wave Takuya Ukai (NBU), Hiroki Funabashi (CIT), Manabu Fukushima (NBU), Syun'ichi Kawano (artnet), Yoshitaka Kondo (J-TEC), Mitsuo Matsumoto, Hirofumi Yanagawa (CIT) EA2015-79 SIP2015-128 SP2015-107 |
This paper describes the relationship between the attenuation and the distance measured with an doppler sensor using ele... [more] |
EA2015-79 SIP2015-128 SP2015-107 pp.75-80 |
EMCJ |
2016-03-11 11:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on the risk evaluation of countermeasure technique for preventing electromagnetic information leakage Ryo Ishikawa, Toshinori Mori, Kimihiro Tajima (NTT-AT), Yasunao Suzuki, Kazuhiro Takaya (NTT NT Labs.) EMCJ2015-124 |
A telecommunication equipment and information technical equipment usually produce unintentional electromagnetic fields. ... [more] |
EMCJ2015-124 pp.1-4 |
ICM, LOIS |
2016-01-21 16:45 |
Fukuoka |
Fukuoka Institute of Technology |
[Invited Talk]
Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55 |
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] |
ICM2015-33 LOIS2015-55 pp.41-46 |
SRW |
2015-12-21 13:30 |
Kanagawa |
Toshiba |
Intersystem Cochannel Interference Detection Method with Signal Leakage in 60-GHz Proximity Wireless Communication Systems Tsuyoshi Kogawa, Tomoya Tandai, Hideo kasami (Toshiba) SRW2015-63 |
This paper proposes an intersystem cochannel interference detection method in 60-GHz proximity wireless communication sy... [more] |
SRW2015-63 pp.31-36 |
EMCJ |
2015-11-13 10:35 |
Kanagawa |
Mitsubishi Electric Corporation |
A Gasket-Free Electromagnetic Shielding Structure for 2.4 GHz band Using Folded-Quarterwavelength SIW Resonators Satoshi Yoneda, Yasuhiro Shiraki, Yuichi Sasaki, Naoto Oka, Hideyuki Oh-hashi (Mitsubishi Electric) EMCJ2015-81 |
As wireless local area network (LAN) devices have been widely spread in past few years, a shielded room realizing shield... [more] |
EMCJ2015-81 pp.1-6 |
LOIS, IE, EMM, IEE-CMN, ITE-ME [detail] |
2015-09-11 12:40 |
Aichi |
Nagoya University, Higashiyama Campus |
Relationship between User's Will of Photo Sharing and Level of Photo Retouch Yasuhiro Tanaka (Senshu Univ.), Akihisa Kodate (Tsuda College), Yu Ichifuji, Noboru Sonehara (NII) LOIS2015-25 IE2015-57 EMM2015-40 |
While expectations of personal Information and life log accumulation and utilization have been rapidly growing for more ... [more] |
LOIS2015-25 IE2015-57 EMM2015-40 pp.55-60 |
BioX, ITE-ME, ITE-IST |
2015-06-29 14:00 |
Ishikawa |
Kanazawa University, Kakuma Campus |
Security Evaluation for Leakage of a Fingerprint Image from USB-Based Fingerprint Authentication Systems Daigo Sato, Takeshi Okamoto, Naoto Umehara (KAIT) BioX2015-6 |
The growing availability of fingerprint authentication systems has resulted in a drop in their price, and their increase... [more] |
BioX2015-6 pp.39-44 |