IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1219  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICD 2024-04-11
10:45
Kanagawa
(Primary: On-site, Secondary: Online)
[Invited Lecture] An SPN Strong PUF with SRAM-based Entropy Source Featuring Both 100-Bit Output Space and Modeling Attack Resilience
Kunyang Liu (Kyoto Univ.), Yichen Tang (Lenovo), Shufan Xu, Kiichi Niitsu (Kyoto Univ.), Hirofumi Shinohara (Waseda Univ.) ICD2024-2
Strong physically unclonable function (Strong PUF) is a hardware-security circuit that generates response outputs corres... [more] ICD2024-2
p.7
CCS 2024-03-27
16:50
Hokkaido RUSUTSU RESORT JPEG Compression Quality Setting Considering Image Quality and Information Loss for Correlated Steganography
Mariiko Aikawa, Sumiko Miyata (SIT), Kaito Hosono, Hirotsugu Kinoshita (KU) CCS2023-50
As more and more confidential information, including personal information, is transmitted and received over the Internet... [more] CCS2023-50
pp.64-69
ICM 2024-03-22
09:10
Okinawa Okinawa Prefectural Museum and Art Museum
(Primary: On-site, Secondary: Online)
Proposal of an implication relationship estimation method for information security related regulatory documents
Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] ICM2023-51
pp.35-40
ICSS, IPSJ-SPT 2024-03-21
14:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
ICSS2023-75 With the proliferation of IoT devices, there has been an increase in security incidents targeting IoT devices. To active... [more] ICSS2023-75
pp.43-50
ICSS, IPSJ-SPT 2024-03-22
08:30
Okinawa OIST
(Primary: On-site, Secondary: Online)
Proposal of Moving Target Defense Approach on Reliability in Web Services
Mamoru Saita (Keio Univ.), Shunsuke Hashimoto (Univ. of Hyogo), Atsuo Inomata (Osaka Univ.), Hiroyuki Inoue (Kyoto Sangyo Univ.) ICSS2023-82
Although modern Web services are built on a high level of security and reliability, the static properties of networks re... [more] ICSS2023-82
pp.93-99
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Study of the Label-Flipping Poisoning Attack on Machine-Learning Based Malicious URL Query Detection.
Akira Matsunami (Nagoya Univ.), Hirokazu Hasegawa (NII), Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.) ICSS2023-90
In recent years, there have been a large increase of cyber attacks with increasing use of web applications. A method to... [more] ICSS2023-90
pp.153-159
RCC, ISEC, IT, WBS 2024-03-13
10:45
Osaka Osaka Univ. (Suita Campus) Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators
Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63
pp.38-43
RCC, ISEC, IT, WBS 2024-03-13
11:10
Osaka Osaka Univ. (Suita Campus) Revisiting the Soundness of 5-Pass Identification Scheme
Daigo Kuroki, Kaoru Takemure, Bagus Santoso (UEC) IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
We observe that mostly, the security of 5-pass identification schemes
have only been analyzed in a emph{rough} way as f... [more]
IT2023-82 ISEC2023-81 WBS2023-70 RCC2023-64
pp.44-51
RCC, ISEC, IT, WBS 2024-03-14
15:05
Osaka Osaka Univ. (Suita Campus) Secrity Oriented Design of Polar-Coded OFDM on Selective Fading Channels
Yuki Kuraya, Hideki Ochiai (YNU) IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
We introduce a physical layer security scheme based on a polar-coded OFDM system in wireless communication. Our approach... [more] IT2023-124 ISEC2023-123 WBS2023-112 RCC2023-106
pp.306-311
IA, SITE, IPSJ-IOT [detail] 2024-03-12
10:20
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Supporting Collaborative Learning through the Integration of Knowledge Constructive Jigsaw Method in a University Class on Network Security
Masaki Maruyama (Tsukuba Gakuin Univ.) SITE2023-71 IA2023-77
In this study, an approach to support collaborative learning was implemented in a class on computer systems, incorporati... [more] SITE2023-71 IA2023-77
pp.18-21
IA, SITE, IPSJ-IOT [detail] 2024-03-12
13:45
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Dynamic control of redundancy factor k in the byzantine-resilient structured overlay network ByzSkip
Toyokazu Akiyama (Kyoto Sangyo Univ.), Yuuichi Teranishi (NICT), Kota Abe (Osaka Metropolitan Univ.) SITE2023-74 IA2023-80
While key-order preserving structured overlay networks (KOPSONs) with Byzantine Fault Tolerance (BFT) are expected to ha... [more] SITE2023-74 IA2023-80
pp.36-42
IA, SITE, IPSJ-IOT [detail] 2024-03-13
11:35
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Law and Policy on the Cybersecurity Supply Chain in the European Union
Yusuke Tachibana (FIT) SITE2023-95 IA2023-101
This paper explores the legal policy concerning the cybersecurity supply chain in the EU. The term "cyber supply chain" ... [more] SITE2023-95 IA2023-101
pp.169-171
SS 2024-03-09
11:25
Okinawa
(Primary: On-site, Secondary: Online)
Developing Conversational Agents Using GPT-4 for Application in Information Security Education
Atsuya Tsuda, Kazutaka Matsuzaki (Chuo Univ.) SS2023-80
In this paper, we report on the development of an interactive agent using a large language model, aimed at being introdu... [more] SS2023-80
pp.186-189
PRMU, IBISML, IPSJ-CVIM 2024-03-04
09:36
Hiroshima Hiroshima Univ. Higashi-Hiroshima campus
(Primary: On-site, Secondary: Online)
Disabling Adversarial Examples through Color Information Processing
Ryo Soeda, Masato Uchida (Waseda Univ.) PRMU2023-67
Image classification using neural networks is expected to have a wide range of applications, including automated driving... [more] PRMU2023-67
pp.94-99
ET 2024-03-03
12:40
Miyazaki Miyazaki University Development of a Wireless LAN Visualization System with a Focus on Information Security for Secondary Education
Kazuaki Yoshihara (Kindai Univ.) ET2023-68
In junior high technology classes and high school information classes, learning about information security is a compulso... [more] ET2023-68
pp.100-103
VLD, HWS, ICD 2024-03-01
12:05
Okinawa
(Primary: On-site, Secondary: Online)
Security Evaluation of Fault Analysis for SuperSonic
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2023-126 HWS2023-86 ICD2023-115
SuperSonic, a low-latency lightweight block cipher, is suitable for securing edge devices with high real-time performanc... [more] VLD2023-126 HWS2023-86 ICD2023-115
pp.141-144
VLD, HWS, ICD 2024-03-02
09:45
Okinawa
(Primary: On-site, Secondary: Online)
Demonstrating a Real Car Covered with Infra-red-cut Films to Hide itself from LiDAR
Yuki Fukatsu, Akira Iwahashi, Naoki Yoshida, Tsutomu Matsumoto (YNU) VLD2023-135 HWS2023-95 ICD2023-124
In recent years, various technologies have been developed toward the practical application of fully automated driving. A... [more] VLD2023-135 HWS2023-95 ICD2023-124
pp.190-195
ITS, IE, ITE-MMS, ITE-ME, ITE-AIT [detail] 2024-02-19
10:45
Hokkaido Hokkaido Univ. Brightness Adjustment based Countermeasure against Adversarial Examples
Takumi Tojo, Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2023-47 IE2023-36
Recently, image classification using deep learning AI has been used for in-vehicle AI, and its accuracy and response spe... [more] ITS2023-47 IE2023-36
pp.7-12
SAT, SANE
(Joint)
2024-02-09
13:20
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Secure Firmware Updates for Nano-Satellites: Design Considerations and PoC Implementation
Yuta Nakagawa, Keika Mori, Ryoya Furukawa, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-111
With the increase in the number of satellite launches in recent years, cyber attacks on satellites have become a serious... [more] SANE2023-111
pp.43-48
SAT, SANE
(Joint)
2024-02-09
13:45
Kagoshima AmaHome PLAZA (Amami City Shimin Koryu Center)
(Primary: On-site, Secondary: Online)
Cyber Threat Analysis for Nano-Satellites
Keika Mori, Ryoya Furukawa, Yuta Nakagawa, Kotaro Saito, Yusuke Yamamoto, FajardoTapia Isai, Shogo Suzuki, Hiroshi Kumagai, Masaki Kamizono (DTCY) SANE2023-112
The number of launches of nano-satellites is increasing due to more frequent launch opportunities and lower development ... [more] SANE2023-112
pp.49-54
 Results 1 - 20 of 1219  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan