IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 72 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
09:35
Hokkaido   Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
Daisuke Moriyama (NICT) ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38
Radio Frequency IDenti cations (RFID) are useful low-cost devices for identi cation or authentication systems through wi... [more] ISEC2013-36 SITE2013-31 ICSS2013-41 EMM2013-38
pp.255-261
EMM 2013-05-24
13:00
Kochi Kochijyo Hall [Tutorial Lecture] Novel approach of information hiding for enriched media -- Cutting-edge applications of information hiding --
Isao Echizen (NII) EMM2013-1
Thanks to an earnest attempt to Cyber Physical System (CPS), information hiding has a crucial role to convey information... [more] EMM2013-1
pp.1-5
ICSS 2013-03-25
10:20
Kanagawa Yokohama National University A Method to Identify the Writer's Birthday on a Blog article
Masataka Kawahara, Atsushi Kanai (Hosei Univ.) ICSS2012-57
In recent years, personal information is unconsciously written in many cases because of the opportunity for an individua... [more] ICSS2012-57
pp.1-6
ITS, IEE-ITS 2013-03-11
13:40
Kyoto   Location Tracking Prevention with Dummy Packet for Vehicular Communications
Tsubasa Teramoto, Satoru Noguchi, Masatoshi Kakiuchi, Atsuo Inomata, Kazutoshi Fujikawa (NAIST) ITS2012-64
In emerging vehicular communication systems, each vehicle periodically broadcasts Safety Messages, which contains vehicl... [more] ITS2012-64
pp.49-54
LOIS 2013-03-07
14:10
Okinawa   A Secure Personal Information Management Method Using Linkable Anonymizing and Hybrid Cipher for Information Sharing Systems in Home Medical Care and Nursing
Taichi Tatsuda, Wataru Mizoguchi, Yoshiaki Shiraishi, Takaaki Yaguchi, Akira Iwata (Nagoya Inst. of Tech.) LOIS2012-80
There is a demand for collaborative approach to provide efficient services with various profession in the home medical c... [more] LOIS2012-80
pp.65-70
IT, ISEC, WBS 2013-03-07
16:35
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus [Invited Talk] Road of IT security standard -- From cryptography to cloud and M2M security --
Kazuo Takaragi (AIST) IT2012-88 ISEC2012-106 WBS2012-74
In 1977, security standardization activities began with encryption algorithm, followed by development of a number of imp... [more] IT2012-88 ISEC2012-106 WBS2012-74
p.167
SITE 2012-12-12
14:00
Osaka   Trend and ethical problem of the honeypot
Chao Li, Sumiko Miyata, Hirotsugu Kinoshita (Kanagawa Univ.) SITE2012-45
With the development of the information technology, the security problem in many aspects become more and
more serious. ... [more]
SITE2012-45
pp.13-18
SITE 2012-10-10
16:00
Tokyo   [Invited Talk] The Ethics of Privacy in IT Services -- Current Situations and Issues --
Hiromitsu Takagi (AIST) SITE2012-42
(To be available after the conference date) [more] SITE2012-42
p.21
LOIS 2011-03-04
09:35
Okinawa Ishigaki IT business support center Cinsideration about Lifelog in Cyberspace -- Aspects of Privacy Protection --
Tomoya Takasuka, Shiro Uesugi (Matsuyama Univ.) LOIS2010-82
It is highly expected to utilize Virtual Reality such as Second Life in order to revitalize local economy. Especially, ... [more] LOIS2010-82
pp.101-106
IN 2011-01-20
15:10
Osaka Osaka Univ. [Invited Talk] Data Masking and Traceability for Inter-Cloud Data Security
Kouichi Itoh, Yoshinori Katayama, Mebae Ushida, Gao Jie, Fumihiko Kozakura, Hiroshi Tsuda (Fujitsu Laboratories) IN2010-129
The use of cloud computing in business is expanding at a rapid clip in recent years. However, security of the data store... [more] IN2010-129
pp.65-70
SITE 2010-10-15
13:50
Tokyo Nihon Univ. (Surugadai) Smart Grid and Privacy -- Examination of Privacy Impact Assessment --
Hideyuki Fujii (NTT Data), Kensuke Yamaguchi (Univ. of Tokyo) SITE2010-40
This paper focus on the problem of privacy in Smart Grid and introduce Privacy Impact Assessment (PIA) approach to solve... [more] SITE2010-40
pp.35-40
SITE, IPSJ-CE 2009-12-11
15:45
Hiroshima Hiroshima Univ. Anonymity as Privacy in Public Space -- Is ethical surveillance possible? --
Takushi Otani (KIBI International Univ.) SITE2009-40
Anonymity as Privacy in Public Space:
Is Ethical Surveillance Possible?

Abstract The costs of sensors and of access... [more]
SITE2009-40
pp.49-54
ICSS 2009-05-15
16:40
Hyogo Kobe University Private List Matching Protocol and its Application
Hiroaki Kikuchi, Daisuke Kagawa (Tokai Univ.) ICSS2009-7
We may collaborate with someone with common preference in particular fields, e.g.,
sharing, exchange useful information... [more]
ICSS2009-7
pp.33-36
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] IT2008-56 ISEC2008-114 WBS2008-69
pp.79-84
WBS, IT, ISEC 2009-03-10
13:00
Hokkaido Hakodate Mirai Univ. Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code
Shun Watanabe, Tsuki Saitou, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-103 ISEC2008-161 WBS2008-116
The privacy amplification is a technique to distill
a secret key from a random variable by a function
so that the dist... [more]
IT2008-103 ISEC2008-161 WBS2008-116
pp.395-400
RCS, AN, MoNA, SR
(Joint)
2009-03-06
10:35
Kanagawa YRP The Two-Way MIMO Wire-Tap Channel
Oussama Souihli, Tomoaki Ohtsuki (Keio Univ.) RCS2008-273
We consider the popular security problem of ensuring the communication privacy of two users, Alice and Bob, in the a pri... [more] RCS2008-273
pp.361-366
DE 2008-09-21
17:00
Fukushima   [Poster Presentation] Securing Social Information in Outsourced Databases
Junpei Kawamoto, Masatoshi Yoshikawa (Kyoto Univ.) DE2008-36
Nowadays, outsourced databases services are in widespread use. In these services, security is more
important than ever ... [more]
DE2008-36
pp.13-14
LOIS 2008-03-07
13:00
Tokyo Kikai-Shinko-Kaikan Bldg.(pending) On the Security of Publicly Verifiable Electronic Voting
Masahiro Mambo, Eiji Okamoto (Univ. Tsukuba) OIS2007-97
So far, publicly verifiable voting schemes have been proposed where voters can verify
the correctness of tallying of al... [more]
OIS2007-97
pp.1-4
SIS 2007-12-10
16:40
Hyogo   Developing Security Method of UHF RFID to Realize Privacy Protection
Masaaki Yamamoto, Takanori Yamazoe (Hitachi) SIS2007-56
Recently, the UHF radio frequency identification (RFID) is widely used in a number of applications including logistics, ... [more] SIS2007-56
pp.57-61
SWIM 2007-08-24
15:55
Tokyo Kikai-Shinko-Kaikan Bldg. Research Results in Health and Welfare Project in SCOPE -- A Research Project of Advanced Agent and Information Network Technologies on Health and Welfare --
Atsushi Togashi (Miyagi Univ.), Shoich Noguchi (SFAIS) SWIM2007-11
The objective of this project is to establish advanced agent and information network technologies on health and welfare ... [more] SWIM2007-11
pp.21-24
 Results 41 - 60 of 72 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan