Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:40 |
Online |
Online |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 |
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] |
ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 pp.131-138 |
RCC, WBS, SAT, MICT |
2022-05-25 13:00 |
Online |
Online |
Comparing approaches to reduce screen luminance for smartphone uplink screen camera communication Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) WBS2022-1 RCC2022-1 SAT2022-1 MICT2022-1 |
In uplink screen camera communication using a smartphone screen as a transmitter and an indoor camera as a receiver, in ... [more] |
WBS2022-1 RCC2022-1 SAT2022-1 MICT2022-1 pp.1-6 |
IT, ISEC, RCC, WBS |
2022-03-10 09:40 |
Online |
Online |
Construction GKW Transformation for Arithmetic Circuits Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 |
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] |
IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 pp.31-37 |
WBS, RCC, ITS |
2021-12-13 09:00 |
Online |
Online |
[Poster Presentation]
Red/blue wavelength division multiplexing transmission characteristics for space-division multiplexing, low-luminance uplink optical camera communication Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) WBS2021-40 ITS2021-14 RCC2021-47 |
Red/blue wavelength division multiplexing was combined with space division multiplexing to increase symbol rate and impr... [more] |
WBS2021-40 ITS2021-14 RCC2021-47 pp.34-39 |
IA |
2021-09-08 14:50 |
Online |
Online |
Cross-Protocol Performance Investigation between HTTP/3 and HTTP/2: An Experiment with Adaptive Streaming Chanh Minh Tran, Tho Nguyen Duc, Phan Xuan Tan, Eiji Kamioka IA2021-23 |
The HTTP/3 promises important enhancements for network and web applications thanks to the novel transport QUIC in replac... [more] |
IA2021-23 pp.54-58 |
WBS, MICT |
2021-07-30 13:00 |
Online |
Online |
[Poster Presentation]
Space division multiplexing, low-luminance uplink optical camera communication by reducing white light cell size Alisa Kawade, Wataru Chujo, Kentaro Kobayashi (Meijo Univ.) WBS2021-26 MICT2021-19 |
To increase data rate and security at the physical layer of space division multiplexing uplink optical camera communicat... [more] |
WBS2021-26 MICT2021-19 pp.24-29 |
NS, ICM, CQ, NV (Joint) |
2020-11-27 11:45 |
Online |
Online |
A Proposal of Framework for Authentication Systems and Verification Method Motoshi Horii, Toshihiro Shimizu (Fujitsu Lab.), Satoshi Imai (Fujitsu) CQ2020-58 |
With the digitization of various procedures, various security incidents have been occurring frequently. To prevent the o... [more] |
CQ2020-58 pp.62-65 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 16:10 |
Ishikawa |
Hotel Koshuen |
[Invited Talk]
Audio Information-Hiding Techniques based on Human Auditory Characteristics Masashi Unoki (JAIST) EA2018-78 EMM2018-78 |
For the audio content security such like the audio content protection as well as speech tampering detection, audio infor... [more] |
EA2018-78 EMM2018-78 pp.153-156 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:20 |
Hokkaido |
Sapporo Convention Center |
Construction of Revocable HIBE with Adaptive Security Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 |
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] |
ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 pp.9-16 |
NS, IN (Joint) |
2017-03-03 14:50 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Attack Blocking Method on Autonomous and Distributed Security Infrastructure for the Internet Hiroyuki Kimiyama, Ken Eguchi, Tomoaki Tsutsumi, Kaori Sano, Hirohumi Yamaki, Yoichiro Ueno, Naoki Yonesaki, Ryoichi Sasaki, Hiroshi Kobayashi (Tokyo Denki Univ.) NS2016-251 |
Cyber attacks on network connected equipment, such as servers, PCs, IoTs and so on, will never be ended. Over 600Gbit/s ... [more] |
NS2016-251 pp.541-546 |
OPE, EST, LQE, EMT, PN, MWP, IEE-EMT [detail] |
2017-01-18 15:35 |
Mie |
Iseshi Kanko Bunka Kaikan |
Tracking multiple pedestrians using an ultra-wideband Doppler radar with time-domain adaptive signal processing Shigeaki Okumura (Kyoto Univ.), Takuya Sakamoto (Univ. of Hyogo/Kyoto Univ.), Toru Sato (Kyoto Univ.) PN2016-61 EMT2016-90 OPE2016-136 LQE2016-125 EST2016-100 MWP2016-74 |
Ultra-wideband Doppler radar with a high range resolution is promising tool for security and monitoring applications. To... [more] |
PN2016-61 EMT2016-90 OPE2016-136 LQE2016-125 EST2016-100 MWP2016-74 pp.115-120 |
ISEC |
2016-09-02 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Adaptively Secure Identity-Based Encryption Scheme from Lattices with Asymptotically Shorter Public Parameters Shota Yamada (AIST) ISEC2016-48 |
In this paper, we present two new adaptively secure identity-based encryption schemes from lattices. The size of the pub... [more] |
ISEC2016-48 p.59 |
LOIS, ISEC, SITE |
2015-11-06 16:20 |
Kanagawa |
Kanagawa Univ. |
A Feasibility Study of Autonomous Security Infrastructure in the Internet Hiroshi KobayashiI, Hirofumi Yamaki, Yoichiro Ueno, Kaoru Sano, Ryoichi Sasaki (TDU) ISEC2015-46 SITE2015-33 LOIS2015-40 |
Cyber-attacks have become increasingly radicalized and sophisticated in recent years. There is a limit to the security a... [more] |
ISEC2015-46 SITE2015-33 LOIS2015-40 pp.67-74 |
RCS, SIP |
2012-01-26 09:00 |
Fukuoka |
Fukuoka Univ. |
The Secrecy Capacity maximized by Adaptive Modulation and Transmission Power Control Satoru Shimosaka, Kenta Umebayashi, Yasuo Suzuki (Tokyo Univ. of Agr and Tech.) SIP2011-78 RCS2011-267 |
In recent wireless communication, security is one of main issues and secret key sharing based on information theoretic s... [more] |
SIP2011-78 RCS2011-267 pp.1-6 |
IN |
2007-06-22 15:25 |
Hokkaido |
Future University-Hakodate |
Adaptive Timer-Based Defense Mechanisms against TCP SYN Flood Attack Hirofumi Akaike, Masaki Aida (Tokyo Metropolitan Univ.), Masayuki Murata, Makoto Imase (Osaka Univ.) IN2007-26 |
Through the rapid development of the Internet in recent years, the security in networks becomes urgent
issues. Distribu... [more] |
IN2007-26 pp.91-96 |