IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 177 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2020-05-20
16:05
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
ET 2020-03-07
13:50
Kagawa National Institute of Technology, Kagawa Collage
(Cancelled but technical report was issued)
Redefining Risk Assessment Based on Interpretation of Viewpoints and Researching Validity by Visualization System
Kazuya Nitta, Naka Gotoda, Yusuke Kometani, Shigemi Ono, Rihito Yaegashi, Toshihiro Hayashi, Giro Imai, Koji Kida, Keizo Saisho (Kagawa Univ) ET2019-92
While information security threats become more sophisticated and complicated, an increasing number of organizations have... [more] ET2019-92
pp.93-98
PN 2020-03-03
09:50
Kagoshima
(Cancelled but technical report was issued)
DDoS defense method by logically isolating attackers
Yutaka Nasu, Naoto Sumita, Masaki Murakami, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2019-63
In recent years, the number of DDoS occurrences and the traffic volume have increased, and attacks have resulted in the ... [more] PN2019-63
pp.65-71
SITE 2019-12-06
15:40
Kanagawa   "To be there" as an existence in logical space and an existence in probability measure space -- "Shared logos (partage) on language games" as a necessary condition of physicality --
Tetsuya Morizumi (KU) SITE2019-86
How should the AI relate to the information security? The AI performs Bayesian estimation of a probability distribution ... [more] SITE2019-86
pp.41-46
NS, ICM, CQ, NV
(Joint)
2019-11-21
11:20
Hyogo Rokkodai 2nd Campus, Kobe Univ. Experiment of DDoS Attack Detection with UTM Log Analysis Using Decision Tree
Aoshi Fujioka, Hiroyuki Okazaki, Hikofumi Suzuki (Shinshu Univ.) NS2019-123
In recent years, AI technology such as machine learning has been developed and the number of application examples are in... [more] NS2019-123
pp.19-25
QIT
(2nd)
2019-11-19
14:50
Tokyo Gakushuin University Capacity of Quantum Private Information Retrieval with Collusion of All But One of Servers
Seunghoan Song, Masahito Hayashi (Nagoya Univ.)
Quantum private information retrieval (QPIR) is the problem to retrieve one of f classical files by downloading quantum ... [more]
ISEC, SITE, LOIS 2019-11-02
10:00
Osaka Osaka Univ. Evolving Secret Sharing: Hierarchical Access Structure with Polynomial Share Size
Sabyasachi Dutta (Univ. of Calgary), Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto (KDDI Research), Kouichi Sakurai (Kyushu Univ.) ISEC2019-76 SITE2019-70 LOIS2019-35
Secret sharing allows storing secret information in a distributed manner among several participants.
The original setti... [more]
ISEC2019-76 SITE2019-70 LOIS2019-35
pp.93-98
ISEC 2019-05-17
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. A secure method of provisioning IoT devices with few operations
Dai Yamamoto, Hirotaka Kokubo, Takanori Machida, Ikuya Morikawa (FUJITSU LABORATORIES LTD.), Akira Kanaoka (Toho Univ.) ISEC2019-8
Recently, most IoT devices have been connected to cloud servers, which provide users with useful services such as remote... [more] ISEC2019-8
pp.37-44
HCS, HIP, HI-SIGCOASTER [detail] 2019-05-16
13:10
Okinawa Okinawa Industry Support Center The Message to Effectively Promote Information Security Measurements
Toshihide Saito, Asuka Ono, Asuka Miyake, Ai Nakane (NTT), Yutaro Kiyomura, Kazuhiro Matsuzaki, Tatsuya Ishihara (NTT WEST) HCS2019-8 HIP2019-8
The risk of security incidents is increasing year by year, and it is becoming more important for individual users to tak... [more] HCS2019-8 HIP2019-8
pp.39-44
HWS, VLD 2019-03-01
15:45
Okinawa Okinawa Ken Seinen Kaikan On Machine Learning Attack Tolerance for PUF-based Device Authentication System
Tomoki Iizuka (UTokyo), Yasuhiro Ogasahara, Toshihiro Katashita, Yohei Hori (AIST), Hiromitsu Awano (Osaka Univ.), Makoto Ikeda (UTokyo) VLD2018-133 HWS2018-96
Double-Arbiter PUF (DAPUF) and PL-PUF are known to be highly resistant to machine learning attacks.
In this paper, we p... [more]
VLD2018-133 HWS2018-96
pp.237-242
ICSS 2018-11-21
13:25
Kagoshima   Investigation of Security-Related Factors of Satisfactions in Internet Services
Yukiko Sawaya, Akira Yamada, Ayumu Kubota (KDDI Research) ICSS2018-54
The number of services on the Internet and devices connected to the Internet has been increased. Under such circumstance... [more] ICSS2018-54
pp.7-12
RCS, AP
(Joint)
2018-11-20
11:15
Okinawa Okinawa Industry Support Center A Study on Space Selective Modulation in Land Mobile Communication
Daiki Fukushima, Hideiti Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2018-181
As a physical layer security technique, Directional Modulation with multiple antennas which forms desired modulated sign... [more] RCS2018-181
pp.19-24
ASN, SRW
(Joint)
2018-11-05
10:25
Tokyo Tokyo Denki University, Tokyo Senju Campus Study on obstacle avoidance in video surveillance system using a drone
Daiki Suzuki, Susumu Matsui (OIT) ASN2018-52
The needs of home security systems are increasing against the background of the solitary old people’s increase. As funct... [more] ASN2018-52
pp.1-5
CS 2018-11-02
10:30
Ehime The Shiki Museum False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANET
Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta, Iwao Sasase (Keio Univ) CS2018-66
In Vehicular Ad Hoc Network (VANET), it is important to detect false information. The previously published scheme detect... [more] CS2018-66
pp.63-66
HWS, ICD 2018-10-29
14:30
Osaka Kobe Univ. Umeda Intelligent Laboratory An Acceleration of Compressed Squaring for Pairing Implementation with Pipeline Modular Multiplier
Yota Okuaki, Junichi Sakamoto, Naoki Yoshida, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) HWS2018-50 ICD2018-42
One of the biggest problems of the emerging cyber-physical and cloud computing systems is how to ensure security with en... [more] HWS2018-50 ICD2018-42
pp.19-24
IN, NS, CS, NV
(Joint)
2018-09-07
10:45
Miyagi Research Institute of Electrical Communication, Tohoku Univ. A Study of Scanning Hosts Classification Mechanism in IP Backbone Networks
Yukihiro Togari, Hisashi Kojima, Takeshi Kuwahara (NTT) NS2018-102
We have researched a lightweight scan detection mechanism in the IP backbone networks. However, the existing mechanism c... [more] NS2018-102
pp.83-88
IA 2018-09-03
14:10
Hokkaido Hokkaido Univ. Conference Hall Collecting a large number of active IPv6 addresses
Yudai Aratsu (Tokyo Univ.), Satoru Kobayashi, Kensuke Fukuda (NII), Hiroshi Esaki (Tokyo Univ.) IA2018-16
Due to wide deployment of IPv6, security issues in IPv6 network is becoming more and more important. Scanning all IP add... [more] IA2018-16
pp.1-8
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
09:55
Hokkaido Sapporo Convention Center Truly Efficient Robust Secret Sharing for the Real World
Yohei Watanabe (UEC), Kazuma Ohara (UEC/NEC), Mitsugu Iwamoto, Kazuo Ohta (UEC) ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
Robust secret sharing is secret sharing with the following robustness property: An original message can be recovered eve... [more] ISEC2018-13 SITE2018-5 HWS2018-10 ICSS2018-16 EMM2018-12
pp.1-8
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:20
Hokkaido Sapporo Convention Center Construction of Revocable HIBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
pp.9-16
ISEC 2018-05-16
14:25
Tokyo Ookayama Campus, Tokyo Institute of Technology Survey on Tracking of Leaked NEM by Coincheck Incident
Teppei Sato (Univ. of Tsukuba), Mitsuyoshi Imamura (Univ. of Tsukuba/NomuraAM), Kazumasa Omote (Univ. of Tsukuba) ISEC2018-7
Some volunteers had performed tracking a huge amount of NEM leaked from CoinCheck by sending specific mosaics which no o... [more] ISEC2018-7
pp.35-41
 Results 41 - 60 of 177 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan