IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 38 of 38 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS 2011-03-04
09:10
Okinawa Ishigaki IT business support center A Consideration of Security Risk in Compromising Hash Function -- An Exposure of Vulnerability against Information Storage System --
Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] LOIS2010-81
pp.95-100
ISEC, IT, WBS 2011-03-04
10:50
Osaka Osaka University Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.) IT2010-96 ISEC2010-100 WBS2010-75
It is preferable for authentication and key exchange protocols to be verified automatically and rapidly in accordance wi... [more] IT2010-96 ISEC2010-100 WBS2010-75
pp.177-184
ISEC, IT, WBS 2011-03-04
15:45
Osaka Osaka University Symbolic Criterion for EUC Secure Authentication against Static Adversary
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) IT2010-129 ISEC2010-133 WBS2010-108
EUC secure protocol maintains its security even when it is composed and shares public information with arbitrary protoco... [more] IT2010-129 ISEC2010-133 WBS2010-108
pp.403-410
ISEC, LOIS 2010-11-18
09:30
Ibaraki Tsukuba Univ. A Proposal of a method to Check Cryptographic Algorithms in Security Protocols -- A Countermeasure against Compromising of Cryptosystems in SSL --
Ryota Sato, Yoshiaki Seki, Katsuhiko Yoshida, Shigeru Kayaguchi, Shinichi Hirata (NTT) ISEC2010-60 LOIS2010-39
Cryptographic communication is essential for the services on the Internet. Cryptographic algorithms which are used in se... [more] ISEC2010-60 LOIS2010-39
pp.73-80
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
10:30
Aomori Hirosaki University On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2010-26 SITE2010-22 ICSS2010-32
pp.123-132
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Network Usage Control Based on Evaluation of User Security
Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] IT2008-45 ISEC2008-103 WBS2008-58
pp.15-22
MoNA, IPSJ-MBL 2008-05-23
14:50
Okinawa Okinawa-seinen-kaikan Node-Disjoint Multipath Construction Method on Hop by Hop Routing Protocols and its Evaluation
Takumi Mori, Osamu Takahashi (FUN)
Multipath routing protocols aim at improvement in the data arrival rate and shortening the delay time is studied in MANE... [more] MoMuC2008-25
pp.141-146
NS, IN
(Joint)
2008-03-07
14:30
Okinawa Bankoku Shinryokan Defense Method against Black Hole Attack with Adaptive Blacklist
Ken Sajo, Takumi Miyoshi (Shibaura Inst. Tech.) NS2007-197
A black hole attack is a serious problem in ad hoc networks.
In this attack, a malicious node camouflages a route reply... [more]
NS2007-197
pp.365-368
IN 2008-01-17
13:40
Aichi Nagoya Institute of Technology Sub-Marine Attack and its Defense in Ad Hoc Network Routing Protocols
XiaoYang Zhang, Yasushi Wakahara (Univ. of Tokyo) IN2007-120
Recently, significant attention has been devoted to developing secure routing protocols for an Ad hoc network. In this p... [more] IN2007-120
pp.7-12
NS, ICM, CQ
(Joint)
2007-11-15
15:50
Fukuoka Institute of System LSI Design Industry, Fukuoka Defense Method to Black Hole Attack on Ad Hoc Network
Ken Sajo (Shibaura Inst. Tech.), Takumi Miyoshi (Shibaura Inst.) CQ2007-75
A black hole attack is a serious problem in ad hoc networks. In this attack, a malicious node camouflages
a route reply... [more]
CQ2007-75
pp.21-24
ISEC, SITE, IPSJ-CSEC 2007-07-19
17:25
Hokkaido Future University-Hakodate On the Standardization of Information Security -- Report on the Moscow Meeting in May, 2007 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (Mitsubishi Electric/IPA), Toshio Tatsuta (IISEC), Hajime Watanabe (AIST), Kenji Ohkuma (Toshiba Corporation/IPA) ISEC2007-39 SITE2007-33
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2007-39 SITE2007-33
pp.159-169
IN, NS, CS
(Joint)
2006-09-14
11:20
Miyagi   A Study of a Routing Attack in OLSR MANET
Hidehisa Nakayama, Bounpadith Kannhavong, Nei Kato (Tohoku Univ.), Abbas Jamalipour (Univ. of Sydney) NS2006-74
Recent advances in wireless networking technologies have made it possible to construct a Mobile Ad hoc Network (MANET) w... [more] NS2006-74
pp.21-26
ISEC, SITE, IPSJ-CSEC 2006-07-21
14:15
Okayama Okayama Univ. Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds
Jeong Ok Kwon (Korea Univ./Kyushu Univ.), Kouichi Sakurai (Kyushu Univ.), Dong Hoon Lee (Korea Univ.)
Password-authenticated key exchange (PAKE) for multi-party with different passwords
allows group users with different p... [more]
ISEC2006-55
pp.115-122
IT, WBS, ISEC 2005-03-18
15:55
Kyoto Kyoto Univ. Implementation of a Security Protocol Analyzer based on Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] IT2004-54 ISEC2004-110 WBS2004-169
pp.25-30
ISEC, LOIS 2004-11-09
09:50
Osaka Osaka Univ. A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] ISEC2004-87 OIS2004-54
pp.15-22
ICM 2004-10-01
11:20
Gifu Hida District Local Industry Promotion Center Secure Remote Access System based on Dynamic Secure Terminal Setting
Hiroyuki Taniguchi, Izuru Sato (Fujitsu Lab.), Takeshi Ohnishi (FNT), Markus Schneider (FhG-SIT)
We propose “DSTS: Dynamic Secure Terminal Setting”, which is secure and dynamic terminal information setting technology ... [more] TM2004-47
pp.31-36
ISEC 2004-09-17
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Study of Security Protocol Analyzer Considering Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more]
ISEC2004-67
pp.1-8
SS 2004-08-02
16:15
Hokkaido Future University Hakodate Specification of a Security Protocol based on a State Machine Model
Goichi Itabashi (Tohoku Univ.), Kaoru Takahashi, Yasushi Kato (SNCT), Takuo Suganuma, Norio Shiratori (Tohoku Univ.)
Formal methods such as the spi calculus have been proposed in order to validate security protocols. In this paper, we pr... [more] SS2004-12
pp.37-39
 Results 21 - 38 of 38 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan