IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 72 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IN, ICTSSL, NWS
(Joint)
2016-10-21
09:30
Osaka Osaka Uinv. The Management Method for Publisher's Right Protection on Content Centric Network
Shouhei Nagai, Osamu Mizuno (Kogakuin Univ.) IN2016-56
We can get contents by smartphone and tablet PC in anywhere and anytime. Network traffic for content delivery has been i... [more] IN2016-56
pp.43-48
CPSY, DC, IPSJ-ARC [detail] 2016-05-09
13:10
Toyama Unaduki Suginoi Hotel A Study of Randomized Skip Graph-Based Authentication for Large-Scale RFID Systems
Yudai Komori, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2016-1 DC2016-1
The performance of key and the degree of privacy in large-scale RFID systems are considered by many researches as tradeo... [more] CPSY2016-1 DC2016-1
pp.1-6
CPSY, DC, IPSJ-ARC [detail] 2016-05-09
14:10
Toyama Unaduki Suginoi Hotel A Study of Contact Avoidance Routing in Delay Tolerant Networks
Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2016-3 DC2016-3
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connectivity. While cryptogra... [more] CPSY2016-3 DC2016-3
pp.11-14
IA, SITE, IPSJ-IOT [detail] 2016-03-03
17:05
Saga Nijino-Matsubara Hotel (Karatsu-shi, Saga-prefecture) A study of trustworthy information for Internet users
Shinji Ishii, Takaaki Hasegawa (Saitama Univ.) SITE2015-67 IA2015-99
In recent years, Smartphone smartphone becomes widespread, and also the number of SNS users is increasing rapidly. In sp... [more] SITE2015-67 IA2015-99
pp.139-144
LOIS 2016-03-04
11:20
Okinawa Central Community Center, Miyakojima-City A study on data protection requirements for an authentication system using personal data
Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] LOIS2015-87
pp.139-144
EMM 2016-03-02
14:30
Kagoshima Yakushima Environ. and Cultural Vill. Center [Poster Presentation] A Study of Anonymity Index with Probability of Re-Identification
Hiroko Akiyama (nnct), Akira Kato, Hideki Sunahara (Keio Univ.) EMM2015-76
For making valuable information or better services for individuals and society, Bigdata is very effective.
Bigdata has ... [more]
EMM2015-76
pp.1-5
NS, RCS
(Joint)
2015-12-17
11:25
Ehime Matsuyama Community Center An Online Storage System Based on RAID
Takamasa Fujiwara, Jiahong Wang, Eiichiro Kodama, Toyoo Takata (Iwate Prefectural Univ.) NS2015-132
In recent years, with the wide spread of computers and smart phones (called terminals), it has become a general case tha... [more] NS2015-132
pp.31-36
IN, IA
(Joint)
2015-12-18
15:35
Hiroshima Hiroshima City University The Content Request Method Against Privacy Leakage in Content Centric Network
Shohei Nagai, Takahiro Kaida, Osamu Mizuno (Kogakuin Univ) IN2015-93
Internet traffic is increasing annually by appearing high performance mobile network, smart phones and tablet PCs. This ... [more] IN2015-93
pp.131-136
IA 2015-11-12
14:10
Chiba NARITA VIEW HOTEL An Investigation of Security, Privacy, and Usability Issues of Personal Health Record Systems
Phuwanai Thummavet, Sangsuree Vasupongayya, Sinchai Kamolphiwong (Prince of Songkla Univ.) IA2015-48
Personal Health Record (PHR) was recently introduced as an alternative approach to storing and sharing personal health i... [more] IA2015-48
pp.59-64
IN 2015-10-16
12:40
Osaka Osaka University Contact Avoidance Routing in Delay Tolerant Networks
Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (TMU), Masayuki Arai (Nihon Univ.) IN2015-57
In this paper, we address a secure routing in delay tolerant networks(DTNs) that lack continuous network connectivity. W... [more] IN2015-57
pp.25-28
CS 2015-07-02
13:50
Okinawa Eef Information Plaza (Kumejima Is.) [Invited Talk] Illegal Interrogation Detectable Products Distribution Scheme in RFID-enabled Supply Chains
Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-17
An EPC contains sensitive information and protecting it is necessary in the RFID-enabled supply chains. However, no sche... [more] CS2015-17
pp.45-50
EMM 2015-03-13
10:55
Okinawa   Implementation and Evaluation of a Facial Image Retrieval System with Privacy Protection
Yoshitaka Morimura (Kyoto Univ.), Takuya Funatomi (NAIST), Tetsutaro Uehara (Ritsumeikan Univ.), Michihiko Minoh (Kyoto Univ.) EMM2014-98
In our previous research, we have proposed the method that generates the cryptographic key from facial feature in order ... [more] EMM2014-98
pp.125-129
LOIS 2015-03-06
10:30
Okinawa   The Relation on Sense of Security, Consent and Use Intention for an Information System and Service by Degree of Use Intention
Kaori Okumura (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.), Akira Iwata (Nagoya Inst. of Tech.) LOIS2014-82
The online service that utilized the privacy information of user spreads out, and the further development is expected. F... [more] LOIS2014-82
pp.123-128
SC, IPSJ-CLE 2014-10-25
15:10
Miyagi Tohoku Univ. Considering Architecture for Managing House Log in Cloud-Based Home Network System
Junho Lee, Satoshi Takatori, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) SC2014-13
We have been developing a novel home network system, called Cloud-HNS, which manages home servers and all the services w... [more] SC2014-13
pp.55-60
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
11:05
Hokkaido San-Refure Hakodate A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack
Daisuke Moriyama (NICT) ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12
Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneous... [more] ISEC2014-12 SITE2014-7 ICSS2014-16 EMM2014-12
pp.17-24
PRMU, MI, IE, SIP 2014-05-23
13:40
Aichi   [Special Talk] Privacy Protection in Data Analytics -- Towards Application Development for Complex Event Sensing and Healthcare Services --
Jun Sakuma (Univ. of Tsukuba) SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18
Advanced integration of big data are expected to bring about innovative services.
Along with the ICT services that pene... [more]
SIP2014-18 IE2014-18 PRMU2014-18 MI2014-18
p.97
CW
(2nd)
2014-03-17 Tokyo Seikei Univ. The future efforts to popularize cloud services
Yuki Iwase, Jun Iio (Chuo Univ)
In recent years, cloud services, especially in areas like Web applications and network games, have become popular among ... [more]
LOIS 2014-03-08
15:55
Okinawa   Security and Usability of "Smilenet" (Information Sharing System for Home Medical Care and Nursing)
Masayuki Sassa, Jun Takeo, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2013-78
There is a demand for collaborative approach to provide efficient services with various profession in the home medical c... [more] LOIS2013-78
pp.143-148
LOIS 2014-03-08
16:20
Okinawa   Linkable System Using Encrypted Personal Identification Information for Clinical Research
Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] LOIS2013-79
pp.149-154
NS 2014-01-24
09:50
Okinawa Univ. of the Ryukyus A Secure Online Storage System Based on RAID
Takamasa Fuziwara, Jiahong Wang, Eiichiro Kodama, Toyoo Takata (Iwate Prefectural Univ.) NS2013-172
Recently, PC and mobile terminals are commonly available, multiple terminals per person become a very common case, and m... [more] NS2013-172
pp.53-58
 Results 21 - 40 of 72 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan