IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 105 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2020-11-09
14:57
Hokkaido
(Primary: On-site, Secondary: Online)
Development and evaluation of efficient vulnerability scanning system for IoT networks
Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] IA2020-19
pp.7-12
CS 2020-07-17
13:30
Hokkaido Ripura(Rishiri Fuji)
(Primary: On-site, Secondary: Online)
Device identification based on RF circuit imperfections
Taisei Nakada, Ryota Shinoda, Yuichi Miyaji, Hideyuki Uehara (TUT) CS2020-31
In this report we introduce device identification based on physical information specific to wireless devices, which is a... [more] CS2020-31
pp.61-66
SR, NS, SeMI, RCC, RCS
(Joint)
2020-07-09
14:15
Online Online Study on Chaos-based Multi-user Interleave Division Multiple Access Scheme
Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCC2020-7 NS2020-36 RCS2020-70 SR2020-15 SeMI2020-7
In the fifth-generation mobile communications system (5G), massive machine-type communications (mMTC), which accommodate... [more] RCC2020-7 NS2020-36 RCS2020-70 SR2020-15 SeMI2020-7
pp.31-36(RCC), pp.31-36(NS), pp.73-78(RCS), pp.37-42(SR), pp.25-30(SeMI)
CQ, CS
(Joint)
2020-06-26
11:40
Online Online Intrusion detection system for IoT networks
Ginga Katsurai, Hiroaki Mukai (KIT) CS2020-12
In recent years, while IoT technology has been introduced into various fields, cyber-attacks targeting the IoT devices a... [more] CS2020-12
pp.49-52
RCS 2020-06-24
16:10
Online Online Study on Applying Radio -Wave Encryption to Interleave Division Multiple Access Scheme
Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2020-30
One of the main use cases of the fifth-generation mobile communications system (5G) is massive machine-type communicatio... [more] RCS2020-30
pp.43-48
ISEC 2020-05-20
16:05
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
NS, IN
(Joint)
2020-03-06
09:50
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Framework to Utilize Others' Behavior without Sharing Privacy Information
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) IN2019-114
A cyberattack to operate home IoT devices by attackers is a serious problem, which may damage the users. We have propose... [more] IN2019-114
pp.213-218
NS, IN
(Joint)
2020-03-06
10:10
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
Anomaly Detection in Smart Home Networks using Situation Estimation in-Home Activities
Masahiro Tanaka, Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (mitsubishi) IN2019-115
In this paper, we propose a method to detect the anomalous operation of home IoT devices focusing on the condition.
Our... [more]
IN2019-115
pp.219-224
CS, CAS 2020-02-27
15:20
Kumamoto   IoT devices management for outdoor wireless sensor networks
Kazuki Shigemori, Kazuma Asou, Wataru Maruyama, Hiroaki Mukai, Tesuya Yokotani (KIT) CAS2019-109 CS2019-109
In recent years, deployment of IoT technology is expected in various fields such as environmental monitoring, disaster p... [more] CAS2019-109 CS2019-109
pp.67-72
MWP, PN, EMT, PEM, IEE-EMT [detail] 2020-01-31
10:00
Kyoto Dosisha Univ. [Invited Talk] A research on data collection, analysis, and exploitation platform -- Dataflow processing platform for IoT, DevOps, and Security --
Toyokazu Akiyama (Kyoto Sangyo Univ.) PN2019-47 EMT2019-87 MWP2019-61
Building a prototype IoT application for an experiment requires a certain amount of development cost. The authors have b... [more] PN2019-47 EMT2019-87 MWP2019-61
pp.79-85
KBSE 2020-01-25
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. CC-CASE: SAFETY& SECURITY ENGINEERING METHODOLOGY FOR AI/IOT
Tomoko Kaneko, Nobukazu Yoshioka (NII) KBSE2019-42
We aim to develop a safe and secure development methodology for complex systems in the AI / IoT era. We will show a new ... [more] KBSE2019-42
pp.25-30
RISING
(2nd)
2019-11-26
14:10
Tokyo Fukutake Learning Theater, Hongo Campus, Univ. Tokyo [Poster Presentation] A method of improving device identification based on multiple identification methods
Yuki Imamura (Osaka City Univ.), Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ.)
With recent development in communication technology, the number of devices connected to a network is increasing, and sec... [more]
IA 2019-11-15
13:40
Tokyo Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring
Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] IA2019-42
pp.85-90
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
09:40
Ehime Ehime Prefecture Gender Equality Center Modeling attacks against device authentication using CMOS image sensor PUF
Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] ICD2019-34 IE2019-40
pp.31-36
HWS, ICD [detail] 2019-11-01
13:25
Osaka DNP Namba SS Bld. An Implementation of Tate and Ate Pairing of Embedding Degree 14
Zihao Song, Rikuya Matsumura, Yuki Nanjo, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ.) HWS2019-58 ICD2019-19
Following a coming new age of IoT (Internet of Things) and tremendous growth of processing power of a personal
computer... [more]
HWS2019-58 ICD2019-19
pp.7-12
ICTSSL, IN 2019-10-17
16:10
Oita   [Invited Talk] Buildings and Cyber Security in the IoT X AI era
Takeshi Watanabe (NTT FACILITIES CHUO), Shingo Kashima (NTT Communications) ICTSSL2019-27 IN2019-41
(To be available after the conference date) [more] ICTSSL2019-27 IN2019-41
pp.63-67
IA 2019-10-04
16:25
Tokyo Tokyo Univ., Hongo Campus, Takeda Hall Device management method for IoT security by network equipment
Yoshifumi Atarashi (Alaxala), Ray Atarashi (IIJ-II), Yutaka Oiwa (AIST) IA2019-21
The security of industrial system (i.e. factories, hospitals) are important. So we developed security management systems... [more] IA2019-21
pp.7-14
MIKA
(2nd)
2019-10-04
10:15
Hokkaido Hokkaido Univ. [Poster Presentation] Study for an advanced secure PDS service
Yuka Miyagi, Hiroki Yanagisawa, Noriharu Miyaho (TDU)
In recent years, personal information management technology called PDS (Personal Data Store) has been devel... [more]
MIKA
(2nd)
2019-10-04
10:15
Hokkaido Hokkaido Univ. [Poster Presentation] Estimating of congestion level in wireless network using the result of network scan
Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR)
As a part of countermeasure against cyber attacks targeting vulnerabilities of IoT devices without enough security level... [more]
NS, IN, CS, NV
(Joint)
2019-09-06
13:30
Miyagi Research Institute of Electrical Communication, Tohoku Univ. Improvement of Device Identification by using Multiple Monitoring Methods
Yuki Imamura (Osaka City Univ.), Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ.) IN2019-28
With recent development in communication technology, security in communication devices especially in IoT devices becomes... [more] IN2019-28
pp.29-34
 Results 41 - 60 of 105 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan