IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 47 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM 2013-03-14
09:40
Kagoshima Yakushima Environmental Culture Village Center Updating Group Encryption Key for Removing Multiple Members
Satoshi Horiike (Hyogo Univ.) ICM2012-59
The contents of group communication must be encrypted to prevent access by nodes outside the group. The keys used for th... [more] ICM2012-59
pp.1-6
NS 2011-05-19
15:00
Tokyo Sophia University AMSO : Unified Key Management Mechanism for Smart Meters
Yasuyuki Tanaka, Yoshihiro Ohba, Mitsuru Kanda (Toshiba) NS2011-28
Security functions are indispensable to smart meters. However, it is hard to apply the conventional security mechanisms ... [more] NS2011-28
pp.65-68
ICSS 2011-03-25
13:50
Tokyo Suspended Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions
Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-61
The development of today's wireless technology with its sophisticated devices and applications has attracted many users ... [more] ICSS2010-61
pp.29-34
ICSS 2011-03-25
14:15
Tokyo Suspended Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Networks
Iichiro Nishimura, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-62
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infr... [more] ICSS2010-62
pp.35-40
CS, SIP, CAS 2011-03-03
14:30
Okinawa Ohhamanobumoto memorial hall (Ishigaki)( An efficient access control method for hierarchical multimedia content
Shoko Imaizumi (IRI Niigata), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2010-136 SIP2010-152 CS2010-106
This paper proposes an efficient method of access control for multimedia content. The proposed method controls access to... [more] CAS2010-136 SIP2010-152 CS2010-106
pp.203-208
ICSS 2010-11-05
11:20
Hiroshima Hiroshima City University Proposal of Time-limited Key Management Scheme Using One-way Functions
Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] ICSS2010-46
pp.11-15
AN, USN, SR, RCS
(Joint)
2010-10-28
09:30
Osaka Osaka University Spatially Distributed Ciphering Function Using Private Wireless Distributed Networks for Secure Wireless Communication
Shinichi Miyamoto, Satoshi Hirai (Osaka Univ.), Masaaki Yamanaka (Hiroshima International Univ.), Seiichi Sampei (Osaka Univ.) RCS2010-116 SR2010-49 AN2010-26 USN2010-22
Private wireless network has to establish determinate wireless channel in the limited area that user intends in the priv... [more] RCS2010-116 SR2010-49 AN2010-26 USN2010-22
pp.55-62(RCS), pp.65-72(SR), pp.1-8(AN), pp.1-8(USN)
HPB
(2nd)
2010-09-09
13:25
Nara Nara Women's Univ. A Preliminary Study of Scalable Accumulation of Sensing Data
Tatsunori Ushikubo, Tatsuya Morita, Shin'ichi Konomi, Yoshito Tobe (Tokyo Denki Univ)
Sensor data management is an important issue in human-probe environments, which allows users to exploit small, inexpensi... [more]
IN 2009-12-11
11:15
Hyogo KOBE UNIVERSITY Proposal of Trust and Public Key Management over MANET
Hideaki Kawabata (Tokai Univ.), Yoshiko Sueda (NTT), Osamu Mizuno (Kogakuin Univ.), Hiroshi Ishii (Tokai Univ.) IN2009-102
There have been a number of proposals for self-organizing key management frameworks using web-of-trust defined in Pretty... [more] IN2009-102
pp.87-92
SR, AN, USN
(Joint)
2009-10-22
13:40
Miyagi Tohoku Univ. Proposal and Evaluation of a Group Key Management Scheme for Ad-hoc Sensor Networks
Jun Noda (NEC), Yuichi Kaji (Nara Inst. of Science and Tech.), Toshiyasu Nakao (NEC) USN2009-28
We propose a new group key management scheme for ad-hoc sensor networks. In ad-hoc sensor networks, we need an appropria... [more] USN2009-28
pp.1-6
IN, NS, CS
(Joint)
2009-09-11
13:25
Miyagi Tohoku University (Miyagi) A Design of Adaptive Overlay Network for Public Key Management
Seiya Nakayama (Tohoku Univ.), Atsushi Takeda (Tohoku Bunka Gakuen Univ./Tohoku Univ.), Gen Kitagata, Debasish Chakraborty, Norio Shiratori (Tohoku Univ.) IN2009-56
In ubiquitous computing environments, a lot of private data is sent through computer networks. Therefore, we need a secu... [more] IN2009-56
pp.99-104
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
13:00
Akita Akita University Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks
Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) ISEC2009-31 SITE2009-23 ICSS2009-45
In MANETs (Mobile Ad-hoc Networks), distributed key managements are effective because of the infrastructureless feature.... [more] ISEC2009-31 SITE2009-23 ICSS2009-45
pp.169-174
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System
Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] IT2008-55 ISEC2008-113 WBS2008-68
pp.71-78
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement
Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] IT2008-91 ISEC2008-149 WBS2008-104
pp.307-314
LOIS, IPSJ-DC 2008-07-25
13:40
Hokkaido Conference Hall Hokkaido University A study of communication management method in multi-line function of key telephone system
Shuichii Chiaki, Yasuyuki Kiyosue, Kiyoshi Nakamaha, Hiroshi Jinzenji, Masanobu Abe (NTT) OIS2008-25
A key telephone system and a so-called business phone in a Japanese market are commercialized in 1969, and have arrived ... [more] OIS2008-25
pp.55-60
NS, IN
(Joint)
2008-03-07
09:35
Okinawa Bankoku Shinryokan Self-organized Public Key Management by using a List of Trust Relationship over Mobile Ad Hoc Networks
Hideaki Kawabata, Hiroshi Ishii (Tokai Univ.) IN2007-235
Several self-organized public key management methods have been already proposed as a certification technology in mobile ... [more] IN2007-235
pp.455-459
ICM 2007-07-13
11:45
Hokkaido   Designing High Performance Encryption Systems based on Restricting Encrypted Target Data
Kiyoshi Yanagimoto, Chikage Tanaka, Takaaki Hasegawa (NTT West) TM2007-33
As security is very important for Web-based application systems, encryption is essential to the management of networks a... [more] TM2007-33
pp.67-72
CW
(2nd)
2007-06-08 Kanagawa   Secure Key Management for Home Sensor Networks
Taketsugu Yao, Ryohei Konuma (OKI)
Wireless LANs have become widely deployed in recent years, and in the next step, we expect that home information applian... [more]
IT, ISEC, WBS 2007-03-16
09:45
Gunma Gunma Univ. (Kiryu Campus) Key Update by Broadcast Encryption for Wireless Sensor Networks
Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI)
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] IT2006-96 ISEC2006-151 WBS2006-93
pp.65-70
IT, ISEC, WBS 2007-03-16
14:50
Gunma Gunma Univ. (Kiryu Campus) A technique for making PKI robust
Masaki Yoshida, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Manabu Maeda (Matsushita)
We study a strategy for recovering a PKI system without reconstructing the whole one when the trust anchor has been brok... [more] IT2006-105 ISEC2006-160 WBS2006-102
pp.119-124
 Results 21 - 40 of 47 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan