|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2007-01-19 14:30 |
Hiroshima |
International Conference Center Hiroshima |
Implementing Simple Single Sign-On with PKI for Legacy Web Applications Takeshi Nishimura, Hiroyuki Sato (The Univ. of Tokyo) IA2006-41 |
Today, because some contents are closely related to security and privacy, there is a requirement for a strict management... [more] |
IA2006-41 pp.61-65 |
IA |
2006-05-24 11:40 |
Kyoto |
Campus Plaza Kyoto |
Designing federation architecture of the UPKI interuniversity authentication and authorization platform Masaki Shimaoka, Shigeaki Tanimoto, Toshiyuki Kataoka, Shinichi Mineo, Noboru Sonehara (NII), Yuuichi Teranishi (Osaka Univ.), Katsuyoshi Iida (Titech), Yasuo Okabe (Kyoto Univ.) IA2006-3 |
(Advance abstract in Japanese is available) [more] |
IA2006-3 pp.13-18 |
IT |
2005-09-27 17:05 |
Fukushima |
Aizu Univ. |
Development of certificate verification system for mobile services Katsuyuki Umezawa, Aya Takahashi, Hiroki Uchiyama, Mitsuhiro Oikawa, Hisao Sakazaki, Mitsuhiro Oikawa, Seiichi Susaki (Hitachi, Ltd.), Shigeichi Hirasawa (Waseda Univ.) |
It is indispensable to verify a public key certificate strictly in order to check a communication partner's justificatio... [more] |
IT2005-59 pp.49-54 |
ISEC, IPSJ-CSEC, SITE |
2005-07-22 09:30 |
Iwate |
Iwate Prefectural University |
Development of a certificate path cache method for Certificate Validation Service Yoko Hashimoto, Takahiro Fujishiro, Tadashi Kaji, Shingo Hane, Satoru Tezuka (Hitachi,Ltd.) |
Recently, many certification authorities (CAs) have been built as the base of an electronic commerce and an electronic a... [more] |
ISEC2005-49 pp.47-52 |
RCS |
2005-06-17 13:00 |
Aichi |
名大 |
[Special Talk]
-
-- - -- Akira Iwata (agoya Institute of Technology) |
(To be available after the conference date) [more] |
|
SS |
2004-11-26 13:30 |
Yamanashi |
Univ. of Yamanashi, Kofu(Takeda) Campus |
An encrypted mailing list system with a certificate management function Yusuke Kume (Yamanashi Univ.) |
Aiming at promotion of wide deployment of encryption mailing lists, we discuss the problems of the existing systems and ... [more] |
SS2004-40 pp.37-41 |
ISEC, LOIS |
2004-11-09 10:55 |
Osaka |
Osaka Univ. |
One-Time Key Type Authentication Scheme for P2P Service Youji Fukuta (The Univ. of Tokushima), Takumi Hosoya, Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
In P2P service, there is the case a user would not like to register his/her secret information such as password, because... [more] |
ISEC2004-89 OIS2004-56 pp.29-36 |
ISEC |
2004-09-17 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Action Research for Timestamp Interoperability Yo Ishigaki, Yasushi Matsumoto (SECOM IS Lab.) |
The business trend about timestamp is currently active and various services areappearing. In the near future, RFC 3161 (... [more] |
ISEC2004-71 pp.27-32 |
NS, CS, IN |
2004-09-03 11:45 |
Miyagi |
Tohoku University |
-
-- - -- Guo Zheng, Tohru Okuyama, - (Asahi Univ.) |
The Internet appeared mostly fro dozens years, and rapid deployment is shown. The security problem on the e-government, ... [more] |
NS2004-114 IN2004-73 CS2004-69 pp.71-74 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|