IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 29 of 29 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICTSSL 2017-07-14
10:50
Kagawa Kagawa Univ. A Proposal for Disaster Adult Victims Care by Portable Emergency Call Service -- Provision to the Designated Temporary Housing System in Mashiki Town at 2016 Kumamoto Earthquake --
Yasuhiro Komatsubara (SECOM) ICTSSL2017-26
The designated temporary housings were provided in the Great East Japan Earthquake. The temporary housing system is priv... [more] ICTSSL2017-26
pp.51-54
VLD 2014-03-03
16:25
Okinawa Okinawa Seinen Kaikan Secure scan design using improved random order scans and its evaluations
Masaru Oya, Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-141
Scan test using scan chains is one of the most important DFT techniques.
On the other hand, scan-based attacks are repo... [more]
VLD2013-141
pp.43-48
RECONF 2011-05-12
15:50
Hokkaido Hokkaido Univ. (Faculty of Eng., B3 Bldg.) A Virus Scanning Engine Using a 4IGU Emulator and an MPU
Hiroki Nakahara, Tsutomu Sasao, Munehiro Matsuura (KIT) RECONF2011-10
This paper shows a virus scanning system using two-stage matching.
In the first stage, a hardware filter quickly detect... [more]
RECONF2011-10
pp.55-60
VLD 2011-03-03
10:20
Okinawa Okinawaken-Danjo-Kyodo-Sankaku Center Implementation and Security Evaluation of DPA-Resistant DES Circuit utilizing Domino-RSL technique
Katsuhiko Iwai, Kenji Kojima, Mitsuru Shiozaki, Syunsuke Asagawa, Takeshi Fujino (Ritsumeikan Univ.) VLD2010-126
Some secure DPA-resistant techniques to protect from Side-Channel Attack such as Differential Power Analysis (DPA) have ... [more] VLD2010-126
pp.57-62
DC 2009-02-16
16:10
Tokyo   A Secure Scan Design Approach using Extended de Bruijn Graph
Hideo Fujiwara, Marie Engelene J. Obien (NAIST) DC2008-78
Scan design makes digital circuits easily testable, however, it can also be exploited to be used for hacking the chip. T... [more] DC2008-78
pp.61-66
IN 2007-07-19
15:35
Hyogo Kobe University Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts
Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] IN2007-29
pp.13-18
IA 2006-07-20
10:30
Kanagawa Kanagawa University (Minatomirai, KU Port-Square) [Invited Talk] Measuring Biometric System's Power to Reject Fake Objects
Tsutomu Matsumoto (Yokohama National Univ.) IA2006-11
(To be available after the conference date) [more] IA2006-11
pp.1-6
ISEC 2005-12-16
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. On Effectiveness of Clock Control in a Clock-Controlled Stream Cipher
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs), Kouichi Sakurai (Kyushu Univ.)
In this paper, we examine effectiveness for clock control in stream ciphers with the aim of protecting against distingui... [more] ISEC2005-112
pp.11-16
ISEC, IPSJ-CSEC, SITE 2005-07-21
17:50
Iwate Iwate Prefectural University A Case Study of Gordon-Loeb Model on Optimal Security Investiments
Kimio Kuramitsu (Yokohama National Univ.)
Gordon and Loeb (2002) presented an economic model of characterizing an optimal investment in information security. The ... [more] ISEC2005-42 SITE2005-40
pp.243-248
 Results 21 - 29 of 29 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan