IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ITS, WBS, RCC 2017-12-14
10:00
Okinawa Tiruru/Okinawa Jichikaikan [Poster Presentation] GPS spoofing implementation using USRP
Tomokazu Fukuda, Koji Ishii (Kagawa Univ.) WBS2017-43 ITS2017-20 RCC2017-59
Position information and time information based on GNSS (Global Navigation Satellite System) including GPS ( Globa Posit... [more] WBS2017-43 ITS2017-20 RCC2017-59
pp.45-49
IA, IN
(Joint)
2017-12-14
16:45
Hiroshima Hiroshima City Univ. Anomaly Detection for Smart Home IoT based on Users' Behavior
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) IN2017-58
Many devices such as air conditioners and refrigerator have become connected to the Internet, and become a target of the... [more] IN2017-58
pp.73-78
BioX 2017-10-12
15:00
Okinawa Nobumoto Ohama Memorial Hall A Study of a Liveness Detection Method Using Fully Convolutional Network for Face Recognition Systems
Koichi Ito, Takehisa Okano, Takafumi Aoki (Tohoku Univ.) BioX2017-27
A face recognition system may accept a malicious person by presenting a printed photo of a user. To address this problem... [more] BioX2017-27
pp.11-15
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-05
11:00
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) [Fellow Memorial Lecture] Controlling the information at border between cyber and physical worlds -- Future outlook on security and privacy research for multimedia --
Isao Echizen (NII) LOIS2017-21 IE2017-42 EMM2017-50
Due to developments of the Internet of Things, computers, sensors and their networks are located in all places, and usef... [more] LOIS2017-21 IE2017-42 EMM2017-50
pp.63-64
MBE, BioX 2017-07-29
17:25
Tokushima Tokushima University Security Evaluation of USB-Based Fingerprint Authentication Products under Spoofing Attacks using a Forged Fingerprint with Conductive Ink
Takeshi Okamoto, Kaito Tanimoto (Kanagawa Inst. of Tech.) BioX2017-23 MBE2017-32
This paper presents tolerance and security evaluations of 22 USB-based fingerprint authentication products using a finge... [more] BioX2017-23 MBE2017-32
pp.73-76
SANE 2017-05-22
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. Measurement deception and its countermeasure in a navigation satellite system
Takashi Iwamoto (Mitsubishi Electric Corp.) SANE2017-4
Broadened applications of navigation satellite systems as social bases have been revealing vulnerabilities of being inte... [more] SANE2017-4
pp.19-22
SP 2017-01-21
11:00
Tokyo The University of Tokyo [Poster Presentation] Evaluation of DNN-Based Voice Conversion Deceiving Anti-spoofing Verification
Yuki Saito, Shinnosuke Takamichi, Hiroshi Saruwatari (UT) SP2016-69
This paper proposes a novel training algorithm for high-quality Deep Neural Network (DNN)-based voice conversion. To imp... [more] SP2016-69
pp.29-34
CPSY, DC, IPSJ-ARC
(Joint) [detail]
2016-08-09
12:15
Nagano Kissei-Bunka-Hall (Matsumoto) Formulating Attack Condition on Received Signal Strength Indicator based Device Authentication
Tatsuya Fujii, Takatsugu Ono, Haruichi Kanaya, Koji Inoue (Kyushu Univ.) CPSY2016-22 DC2016-19
Spoofing attack in wireless communications is a critical issue, in which a malicious transmitter attempts to pretend to ... [more] CPSY2016-22 DC2016-19
pp.139-146(CPSY), pp.15-22(DC)
IA, SITE, IPSJ-IOT [detail] 2016-03-03
13:00
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) Collaborative Spoofing Detection and Mitigation - SDN based looping authentication for DNS services
Nor Masri bin Sahri, Koji Okamura (Kyushu University) SITE2015-58 IA2015-90
As DNS packet are mostly UDP-based, make it as a perfect platform for hackers to launch a well-known type of distributed... [more] SITE2015-58 IA2015-90
pp.55-60
RCC, ITS, WBS 2015-12-18
14:50
Okinawa Okinawa Industry Support Center Secure Personal Attribute Message Authentication for Pedestrian-Friendly Intelligent Transport Systems
Seiichiro Mizoguchi (KDDI R&D LABS), Daisuke Oshida, Hisataka Takagi (Renesas Electronics), Hideaki Kawabata, Keisuke Takemori, Ayumu Kubota (KDDI R&D LABS) WBS2015-78 ITS2015-50 RCC2015-80
In the case of providing safety services to pedestrians in the intelligent transport system (ITS), considering pedestria... [more] WBS2015-78 ITS2015-50 RCC2015-80
pp.221-226
IN, NS, CS, NV
(Joint)
2015-09-04
17:05
Iwate Iwate-ken Kokaido A Study of Dynamic Private View SandBox Network to prevent DoS attack, IP spoofing and IP based-gathering
Takeshi Ogawa, Yuta Kobayashi, Noriharu Miyaho (Tokyo Denki Univ.) NS2015-84
Dos attacks, IP address spoofing and name-based aggregation are important issues to be solved in the Internet. In this p... [more] NS2015-84
pp.77-82
IN, NS, CS, NV
(Joint)
2015-09-04
17:30
Iwate Iwate-ken Kokaido A study on solutions against caller identity spoofing over IMS networks
Kenjiro Arai, Koji Tanida, Tsuyoshi Jocha (NTT) NS2015-85
The IMS networks defined in the 3rd Generation Partnership Project (3GPP) provides a reliable caller’s identity presenta... [more] NS2015-85
pp.83-88
CS 2015-07-03
11:40
Okinawa Eef Information Plaza (Kumejima Is.) Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information
Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] CS2015-28
pp.103-108
IA, IN
(Joint)
2014-12-18
15:00
Hiroshima Hiroshima City University A Study on the Attack and Protection Mechanisms for an In-vehicle Network Connected with the Internet
Takaya Ezaki, Tomohiro Date, Hiroyuki Inoue (Hiroshima City Univ.) IA2014-71
With advanced features and the diversification of services for an automobile, various problems of the information securi... [more] IA2014-71
pp.13-18
BioX 2014-10-17
11:25
Okinawa Nobumoto Ohama Memorial Hall (Ishigaki) Evaluation of Liveness Detection Methods against Flat Panel-based Presentation Attack
Tatsuya Takehisa (Nissin), Tetsushi Ohki, Akira Otsuka (AIST), Manabu Inuma (Josai Univ.) BioX2014-38
Recently, The presentation attack spoofing to the biometrics authentication system that use fake biometric samples are ... [more] BioX2014-38
pp.55-59
NS, IN
(Joint)
2014-03-07
13:40
Miyazaki Miyazaki Seagia A study on ID Spoofing solution of IETF STIR appliying to IMS
Shunsuke Kanegae, Kenjiro Arai, Satoru Furukawa (NTT) NS2013-254
The trouble caused by caller ID spoofing (impersonate or obscure calling party number) are increasing in USA VoIP networ... [more] NS2013-254
pp.451-455
SANE 2013-06-21
16:50
Ibaraki Tsukuba Space Center, JAXA The development of decrease of vulnerabilities of Civilian GNSS in targeting of spoofing
Koichi Chino, Dinesh Manandhar, Ryosuke Shibasaki (Univ. of Tokyo) SANE2013-34
We address the current situation of the potential vulnerabilities (Spoofing and Meaconing) of Global Positioning System ... [more] SANE2013-34
pp.109-116
NS, IN
(Joint)
2013-03-08
15:30
Okinawa Okinawa Zanpamisaki Royal Hotel A Study of a Trust-aware Routing Protocol in Wireless Multi-hop Networks
Kazuya Kohara (Osaka Univ.), Hirotake Abe (Univ. of Tsukuba), Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) NS2012-223
In wireless multihop networks, conventional trust based routing protocols are vulnerable to Spoofing ACK Attack.Maliciou... [more] NS2012-223
pp.337-342
NS, IN
(Joint)
2013-03-08
15:30
Okinawa Okinawa Zanpamisaki Royal Hotel Prototype implementation and evaluation of DHCP enhancement method to prevent IP address spoofing attacks using released address
Masao Oishi, Takuya Omizo, Katsuyoshi Iida (Tokyo Inst. of Tech.) NS2012-289
Currently, many researchers are focussing to eliminate the 3--way~handshake protocol to improve the TCP performance.
A ... [more]
NS2012-289
pp.723-728
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM
(Joint) [detail]
2012-07-20
11:00
Ibaraki University Hall, University of Tsukuba Location Proof by GPS and WLAN Information
Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] MoMuC2012-18 IE2012-43
pp.43-48
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan