Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM |
2013-03-14 09:40 |
Kagoshima |
Yakushima Environmental Culture Village Center |
Updating Group Encryption Key for Removing Multiple Members Satoshi Horiike (Hyogo Univ.) ICM2012-59 |
The contents of group communication must be encrypted to prevent access by nodes outside the group. The keys used for th... [more] |
ICM2012-59 pp.1-6 |
NS |
2011-05-19 15:00 |
Tokyo |
Sophia University |
AMSO : Unified Key Management Mechanism for Smart Meters Yasuyuki Tanaka, Yoshihiro Ohba, Mitsuru Kanda (Toshiba) NS2011-28 |
Security functions are indispensable to smart meters. However, it is hard to apply the conventional security mechanisms ... [more] |
NS2011-28 pp.65-68 |
ICSS |
2011-03-25 13:50 |
Tokyo |
Suspended |
Authentication and Certificate Managements of Unauthorized Intrusion in Ad-Hoc Networks, Problems and Solutions Norihito Yosaka, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-61 |
The development of today's wireless technology with its sophisticated devices and applications has attracted many users ... [more] |
ICSS2010-61 pp.29-34 |
ICSS |
2011-03-25 14:15 |
Tokyo |
Suspended |
Secure Clustering for Building Certificate Management Nodes in Ad-Hoc Networks Iichiro Nishimura, Tomoyuki Nagase (Hirosaki Unv.) ICSS2010-62 |
Ad hoc networks have emerged from wireless technology, which consist of wireless nodes with absence of a stationary infr... [more] |
ICSS2010-62 pp.35-40 |
CS, SIP, CAS |
2011-03-03 14:30 |
Okinawa |
Ohhamanobumoto memorial hall (Ishigaki)( |
An efficient access control method for hierarchical multimedia content Shoko Imaizumi (IRI Niigata), Masaaki Fujiyoshi, Hitoshi Kiya (Tokyo Metropolitan Univ.) CAS2010-136 SIP2010-152 CS2010-106 |
This paper proposes an efficient method of access control for multimedia content. The proposed method controls access to... [more] |
CAS2010-136 SIP2010-152 CS2010-106 pp.203-208 |
ICSS |
2010-11-05 11:20 |
Hiroshima |
Hiroshima City University |
Proposal of Time-limited Key Management Scheme Using One-way Functions Ryoichi Isawa (Kobe Univ./CRYPTO), Minoru Kuribayashi, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO) ICSS2010-46 |
Some time-limited key management schemes have been proposed. The existed methods have to decide the number of leaves bef... [more] |
ICSS2010-46 pp.11-15 |
AN, USN, SR, RCS (Joint) |
2010-10-28 09:30 |
Osaka |
Osaka University |
Spatially Distributed Ciphering Function Using Private Wireless Distributed Networks for Secure Wireless Communication Shinichi Miyamoto, Satoshi Hirai (Osaka Univ.), Masaaki Yamanaka (Hiroshima International Univ.), Seiichi Sampei (Osaka Univ.) RCS2010-116 SR2010-49 AN2010-26 USN2010-22 |
Private wireless network has to establish determinate wireless channel in the limited area that user intends in the priv... [more] |
RCS2010-116 SR2010-49 AN2010-26 USN2010-22 pp.55-62(RCS), pp.65-72(SR), pp.1-8(AN), pp.1-8(USN) |
HPB (2nd) |
2010-09-09 13:25 |
Nara |
Nara Women's Univ. |
A Preliminary Study of Scalable Accumulation of Sensing Data Tatsunori Ushikubo, Tatsuya Morita, Shin'ichi Konomi, Yoshito Tobe (Tokyo Denki Univ) |
Sensor data management is an important issue in human-probe environments, which allows users to exploit small, inexpensi... [more] |
|
IN |
2009-12-11 11:15 |
Hyogo |
KOBE UNIVERSITY |
Proposal of Trust and Public Key Management over MANET Hideaki Kawabata (Tokai Univ.), Yoshiko Sueda (NTT), Osamu Mizuno (Kogakuin Univ.), Hiroshi Ishii (Tokai Univ.) IN2009-102 |
There have been a number of proposals for self-organizing key management frameworks using web-of-trust defined in Pretty... [more] |
IN2009-102 pp.87-92 |
SR, AN, USN (Joint) |
2009-10-22 13:40 |
Miyagi |
Tohoku Univ. |
Proposal and Evaluation of a Group Key Management Scheme for Ad-hoc Sensor Networks Jun Noda (NEC), Yuichi Kaji (Nara Inst. of Science and Tech.), Toshiyasu Nakao (NEC) USN2009-28 |
We propose a new group key management scheme for ad-hoc sensor networks. In ad-hoc sensor networks, we need an appropria... [more] |
USN2009-28 pp.1-6 |
IN, NS, CS (Joint) |
2009-09-11 13:25 |
Miyagi |
Tohoku University (Miyagi) |
A Design of Adaptive Overlay Network for Public Key Management Seiya Nakayama (Tohoku Univ.), Atsushi Takeda (Tohoku Bunka Gakuen Univ./Tohoku Univ.), Gen Kitagata, Debasish Chakraborty, Norio Shiratori (Tohoku Univ.) IN2009-56 |
In ubiquitous computing environments, a lot of private data is sent through computer networks. Therefore, we need a secu... [more] |
IN2009-56 pp.99-104 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 13:00 |
Akita |
Akita University |
Distributed Key Management Scheme without Any Trusted Third Party in Mobile Ad-hoc Networks Masakuni Ishii, Takeshi Yatagai, Iwao Sasase (Keio Univ.) ISEC2009-31 SITE2009-23 ICSS2009-45 |
In MANETs (Mobile Ad-hoc Networks), distributed key managements are effective because of the infrastructureless feature.... [more] |
ISEC2009-31 SITE2009-23 ICSS2009-45 pp.169-174 |
WBS, IT, ISEC |
2009-03-09 17:10 |
Hokkaido |
Hakodate Mirai Univ. |
Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68 |
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] |
IT2008-55 ISEC2008-113 WBS2008-68 pp.71-78 |
WBS, IT, ISEC |
2009-03-10 15:40 |
Hokkaido |
Hakodate Mirai Univ. |
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104 |
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] |
IT2008-91 ISEC2008-149 WBS2008-104 pp.307-314 |
LOIS, IPSJ-DC |
2008-07-25 13:40 |
Hokkaido |
Conference Hall Hokkaido University |
A study of communication management method in multi-line function of key telephone system Shuichii Chiaki, Yasuyuki Kiyosue, Kiyoshi Nakamaha, Hiroshi Jinzenji, Masanobu Abe (NTT) OIS2008-25 |
A key telephone system and a so-called business phone in a Japanese market are commercialized in 1969, and have arrived ... [more] |
OIS2008-25 pp.55-60 |
NS, IN (Joint) |
2008-03-07 09:35 |
Okinawa |
Bankoku Shinryokan |
Self-organized Public Key Management by using a List of Trust Relationship over Mobile Ad Hoc Networks Hideaki Kawabata, Hiroshi Ishii (Tokai Univ.) IN2007-235 |
Several self-organized public key management methods have been already proposed as a certification technology in mobile ... [more] |
IN2007-235 pp.455-459 |
ICM |
2007-07-13 11:45 |
Hokkaido |
|
Designing High Performance Encryption Systems based on Restricting Encrypted Target Data Kiyoshi Yanagimoto, Chikage Tanaka, Takaaki Hasegawa (NTT West) TM2007-33 |
As security is very important for Web-based application systems, encryption is essential to the management of networks a... [more] |
TM2007-33 pp.67-72 |
CW (2nd) |
2007-06-08 |
Kanagawa |
|
Secure Key Management for Home Sensor Networks Taketsugu Yao, Ryohei Konuma (OKI) |
Wireless LANs have become widely deployed in recent years, and in the next step, we expect that home information applian... [more] |
|
IT, ISEC, WBS |
2007-03-16 09:45 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Key Update by Broadcast Encryption for Wireless Sensor Networks Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI) |
We propose the key update scheme for multi-hop tree topology networks, which effectively update the network key by assig... [more] |
IT2006-96 ISEC2006-151 WBS2006-93 pp.65-70 |
IT, ISEC, WBS |
2007-03-16 14:50 |
Gunma |
Gunma Univ. (Kiryu Campus) |
A technique for making PKI robust Masaki Yoshida, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Manabu Maeda (Matsushita) |
We study a strategy for recovering a PKI system without reconstructing the whole one when the trust anchor has been brok... [more] |
IT2006-105 ISEC2006-160 WBS2006-102 pp.119-124 |