Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS, VLD |
2019-03-01 17:10 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Extended of Secure Remote Management Architecture for IoT-device Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99 |
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] |
VLD2018-136 HWS2018-99 pp.255-260 |
IN |
2019-01-21 15:10 |
Aichi |
WINC AICHI |
The Efforts for Improving Operation and Security of Educational Information Systems in Information Departments Yuta Tamaki, Daisuke Isa, Tomokazu Nagata, Yuji Taniguchi (Ryukyu Univ.) IN2018-76 |
The educational information system provided by the Intelligent Information Course of the University of the Ryukyus is op... [more] |
IN2018-76 pp.25-29 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 09:15 |
Ishikawa |
|
Development of System to Analyze Advanced Attacks Using Self-Organizing Map Akifumi Iwasa, Hikohmi Suzuki (Shinshu Univ.), Tetsuya Ui (NEC) NS2018-140 |
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] |
NS2018-140 pp.57-61 |
CQ, ICM, NS, NV (Joint) |
2018-11-16 13:45 |
Ishikawa |
|
[Encouragement Talk]
Unit-separete Network Access Control based on Hierarchical Network Architecture Yu Tamura (UEC), Takashi Naito (NII), Nattapong Kitsuwan (UEC) NS2018-148 |
This paper proposes a Hierarchical Role-based Network Access Control (HRNAC) approach to set the flexible rule for each ... [more] |
NS2018-148 pp.105-110 |
IN, ICTSSL, NWS (Joint) [detail] |
2018-10-19 11:35 |
Kagawa |
Takamatsu Shoko Kaigisyo Kaikan |
VANET (Vehicle Ad-hoc Network) Security and Blockchain Hirofumi Onishi (Alpine America Research) ICTSSL2018-31 IN2018-48 |
Broader connectivity between modern vehicles and the external IT world enlarges the social concern about cyber-risks on ... [more] |
ICTSSL2018-31 IN2018-48 pp.31-36 |
CS |
2018-07-12 17:00 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
[Special Invited Talk]
Cyber Security: Lessons Learned from Actual Cases
-- Recent Trends of Cyber Attacks and Effective Approaches -- Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34 |
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] |
CS2018-34 p.109 |
NS |
2018-05-17 10:00 |
Kanagawa |
Yokohama City Education Center |
Hierarchical Role-based Network Access Control using Software-Defined Networking Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15 |
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] |
NS2018-15 pp.1-6 |
ASN, ICTSSL |
2018-05-14 16:00 |
Hiroshima |
Hiroshima City Univ. |
[Special Talk]
Security check for campus-wide network using vulnerability diagnosis software Kenji Ishida, Susumu Idenoue (Hiroshima City Univ.) ICTSSL2018-6 ASN2018-6 |
Security management is important in operation and management of campus wide network. For this security management, it is... [more] |
ICTSSL2018-6 ASN2018-6 pp.29-33 |
SSS |
2018-04-24 15:05 |
Tokyo |
|
Study on equipment for mitigation of security damages in connected vehicles Midori Inaba (IISEC) SSS2018-4 |
Safety of connected and autonomous vehicles relies on security. Therefore, prevention of automotive networks from malici... [more] |
SSS2018-4 pp.13-16 |
HWS |
2018-04-13 11:35 |
Fukuoka |
|
Optical 3D Nano Artifact-metrics using White Light Interferometry Naoki Yoshida (YNU), Yosuke Ueba, Shumpei Nishio, Yasuyuki Ohyagi (DNP), Morihisa Hoga (Compass21), Naoya Tate (KU), Makoto Naruse (NICT), Tsutomu Matsumoto (YNU) HWS2018-3 |
We propose an artificial-metric system which authenticates nanostructures with random irregularities by means of an inte... [more] |
HWS2018-3 pp.11-16 |
ICSS, IPSJ-SPT |
2018-03-07 14:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
A study of decentralized IoT Security Controller Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58 |
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] |
ICSS2017-58 pp.43-48 |
IA, SITE, IPSJ-IOT [detail] |
2018-03-05 11:45 |
Tochigi |
Kinugawa Onsen Hotel |
Proposal of Risk Inspection Tool of Third Party Application for Smart Devices Takuma Horiuchi, Ohira Kenji, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) SITE2017-64 IA2017-75 |
It is reported that some third party applications for smart devices abusively acquire service-internal information and p... [more] |
SITE2017-64 IA2017-75 pp.73-78 |
LOIS, ISEC, SITE |
2017-11-09 09:30 |
Kyoto |
|
Consciousness Investigation of Passwords Management in University Students
-- Questionnaire Design based on Friend Relationships -- Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27 |
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] |
ISEC2017-50 SITE2017-32 LOIS2017-27 pp.7-12 |
ET |
2017-03-10 14:00 |
Ehime |
National Institute of Technology, Niihama College |
Open Events of Hacking Competition CTF as Introductory Educational Experience for Information Literacy and Security Learning
-- A Preliminary Experiment of a Prototype System of an Assistive Game with Quizzes and Adventure Style for High School Students -- Takayuki Abe, Makoto Nakaya, Motoki Kusume, Hiroyuki Tominaga (Kagawa Univ.) ET2016-115 |
We have proposed an easy CTF event, which is "Capture the Flag" as a hacking competition. It is for an introductory educ... [more] |
ET2016-115 pp.123-128 |
ITS, IEE-ITS |
2017-03-07 16:15 |
Kyoto |
Kyoto Univ. |
Server-based Secure Diagnostic and Reprogramming System Keisuke Takemori, Seiichiro Mizoguchi, Ayumu Kubota (KDDI Research) ITS2016-91 |
A electronic control units (ECU) is diagnosed and reprogramed by a maintenance staff who connects a diagnostic tool to a... [more] |
ITS2016-91 pp.87-92 |
LOIS |
2017-03-03 14:15 |
Okinawa |
N.Ohama Memorial Hall |
A study on availability of attribute on smart device management system with functional encryption Makiko Aoyagi, Sakurako Tamura, Sakae Chikara, Hiroaki Isaka (NTT) LOIS2016-96 |
The Smart Device Management System provides access control for applications and contents by attribute information specif... [more] |
LOIS2016-96 pp.189-194 |
IN, MoNA, CNR (Joint) |
2016-11-18 14:15 |
Kagoshima |
Kirishima-kanko Hotel |
Application of Dynamic IP-VPN to Communication Robot Yuka Kamizuru, Tomohiro Bouyashiki, Minoru Umegae (NTTcom) CNR2016-17 |
“Dynamic IP-VPN” is a software defined network, which provides end-to-end virtual network using IP-in-IP tunnel. API is ... [more] |
CNR2016-17 pp.19-23 |
ISEC, LOIS, SITE |
2016-11-08 10:50 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT) ISEC2016-62 SITE2016-52 LOIS2016-40 |
The Smart Device Management System provides access control for applications and contents by the specified parameters of ... [more] |
ISEC2016-62 SITE2016-52 LOIS2016-40 pp.69-74 |
IN, ICTSSL, NWS (Joint) |
2016-10-20 11:50 |
Osaka |
Osaka Uinv. |
Construction of Evaluation System in Crisis Management Contest Sakamoto Hirofumi (Wakayama Univ.) IN2016-50 |
Today the high reliability of the information security has been requested, the information security is the number of eng... [more] |
IN2016-50 pp.9-14 |
IN, ICTSSL, NWS (Joint) |
2016-10-21 09:30 |
Osaka |
Osaka Uinv. |
The Management Method for Publisher's Right Protection on Content Centric Network Shouhei Nagai, Osamu Mizuno (Kogakuin Univ.) IN2016-56 |
We can get contents by smartphone and tablet PC in anywhere and anytime. Network traffic for content delivery has been i... [more] |
IN2016-56 pp.43-48 |