Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2024-04-19 17:15 |
Tokyo |
(Primary: On-site, Secondary: Online) |
Supply chain security of semiconductor chips and countermeasure design technologies Makoto Nagata (Kobe Univ.), Kazuki Monta (Secafy Co., Ltd.), Yuichi Hayashi (NAIST), Naofumi Homma (Tohoku Univ.) HWS2024-7 |
This report is dedicated to the threats and countermeasures of semiconductor supply chain security, regarding the authen... [more] |
HWS2024-7 pp.30-33 |
NS, NWS (Joint) |
2024-01-25 14:15 |
Hiroshima |
Higashisenda Campus, HiroshimaUniversity + Online (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
Access Control Method to Prevent Session Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-162 |
In recent years, the adoption of Single Sign-On (SSO) has been increasing in web services to reduce the burden of user a... [more] |
NS2023-162 pp.19-24 |
NS |
2023-10-04 17:55 |
Hokkaido |
Hokkaidou University + Online (Primary: On-site, Secondary: Online) |
Access Control Method to Prevent ID Token Abuse on OpenID Connect Junki Yuasa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2023-81 |
In recent years, there has been a rapid increase in web services that require authentication, leading to the widespread ... [more] |
NS2023-81 pp.53-58 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
ET |
2022-12-10 09:50 |
Ishikawa |
JAIST Kanazawa Satellite and Online (Primary: On-site, Secondary: Online) |
The Influence of Environmental Factors on Judgments of Web Information Credibility Hidenori Tachi (Tokyo University of Social Welfare), Yuuki Kato (Sagami Women's University), Shogo Kato (Tokyo Woman's Christian University), Toshihiko Takeuchi (SURUGADAI University) ET2022-42 |
The results suggest that, although environmental factors in childhood do not influence the criteria for judging the cred... [more] |
ET2022-42 pp.13-16 |
SC |
2022-05-27 09:55 |
Online |
Online |
Considerations for Identifying Machine Learning Models Naoto Kiribuchi, Ryohei Suzuki, Nami Ashizawa (NTT), Tetsushi Ohki, Hiroshi Mineno, Masakatsu Nishigaki (Shizuoka Univ.) SC2022-2 |
As a part of considerations for identifying machine learning models, we experimented whether we can identify multiple di... [more] |
SC2022-2 pp.7-12 |
ICSS |
2021-11-29 13:25 |
Kochi |
KOCHIJYO HALL (Primary: On-site, Secondary: Online) |
A Study on Tamper Resistance of Trusted Execution Environment Kazuomi Oishi (SIST) ICSS2021-47 |
A Trusted Execution Environment (TEE) provides isolated execution inside a TEE from the outside. The outside environment... [more] |
ICSS2021-47 pp.7-12 |
CQ, ICM, NS, NV (Joint) |
2021-11-26 16:15 |
Fukuoka |
JR Hakata Stn. Hakata EkiHigashi Rental Room (Primary: On-site, Secondary: Online) |
Design and prototyping of a Zero-Trust Access Control Mechanism to Verify User Authenticity Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Youki Kadobayashi, Doudou Fall (NAIST) NS2021-95 |
As telework becomes more widespread, there will be more opportunities to remotely access data required for business from... [more] |
NS2021-95 pp.56-61 |
EA, ASJ-H, EMM |
2020-11-20 13:30 |
Online |
Online |
[Poster Presentation]
Improved accuracy of QR code authenticity judgment algorithm Kengo Sato (TUS), Kitahiro Kaneda (OPU), Keiichi Iwamura (TUS) EA2020-43 EMM2020-58 |
E-mail: †{sato_kengo, kaneda}@sec.ee.kagu.tus.ac.jp, ‡iwamura@ee.kagu.tus.ac.jp
Abstract Currently, the distribution... [more] |
EA2020-43 EMM2020-58 pp.117-122 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 12:10 |
Kochi |
Kochi University of Technology |
Recording device identification based on audio distortion depending on system-on-chip Akira Nishimura (Tokyo Univ. Info. Sci.) ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51 |
This study addresses device-specific distortion observed in recorded
audio, to identify a built-in system-on-a-chip (... [more] |
ISEC2019-48 SITE2019-42 BioX2019-40 HWS2019-43 ICSS2019-46 EMM2019-51 pp.311-316 |
ISEC, LOIS, SITE |
2016-11-08 10:25 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
An Evaluation of the System to Identify the Measured Person using Bio-Signal Haruka Suzuki, Gen Takahashi, Kaori Fujimura, Toru Nakamura, Yukiyoshi Ota (NTT) ISEC2016-61 SITE2016-51 LOIS2016-39 |
Volumes and varieties of personal data obtained from PCs, smart phones and IoT devices are increasing. In order to provi... [more] |
ISEC2016-61 SITE2016-51 LOIS2016-39 pp.63-68 |
RCS, IN (Joint) |
2013-05-16 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of Power Saving Method for Geocast Communication in Ad-hoc Network Based on Target Problem Ryo Hamamoto, Chisa Takano (Hiroshima City Univ.), Masaki Aida (Tokyo Metropolitan Univ.), Kenji Ishida (Hiroshima City Univ.) IN2013-12 |
In recent years, positioning devices represented by the GPS receivers are loaded in many terminals. Therefore, routing p... [more] |
IN2013-12 pp.1-6 |
IA |
2012-10-19 14:30 |
Overseas |
Phuket |
Design and Implementation of File Authentication System using Timestamp Mechanism for a Distributed File System Tetsuya Ogaki (Univ. of Electro-Comm./NICT), Hidenobu Watanabe, Tsukasa Iwama, Mitsue Den, Ken T. Murata (NICT) IA2012-47 |
Gfarm, a distributed file system for a petabyte scale data intensive computing or a shared storage for big data, is grad... [more] |
IA2012-47 pp.79-84 |