IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 121 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, VLD 2019-03-01
17:10
Okinawa Okinawa Ken Seinen Kaikan An Extended of Secure Remote Management Architecture for IoT-device
Masahiro Shiraishi, Hiroki Ito, Keiichi Okabe (NTT) VLD2018-136 HWS2018-99
This paper provides a feasibility study of secure remote management architecture for IoT-device. IoT services exist in v... [more] VLD2018-136 HWS2018-99
pp.255-260
IN 2019-01-21
15:10
Aichi WINC AICHI The Efforts for Improving Operation and Security of Educational Information Systems in Information Departments
Yuta Tamaki, Daisuke Isa, Tomokazu Nagata, Yuji Taniguchi (Ryukyu Univ.) IN2018-76
The educational information system provided by the Intelligent Information Course of the University of the Ryukyus is op... [more] IN2018-76
pp.25-29
CQ, ICM, NS, NV
(Joint)
2018-11-16
09:15
Ishikawa   Development of System to Analyze Advanced Attacks Using Self-Organizing Map
Akifumi Iwasa, Hikohmi Suzuki (Shinshu Univ.), Tetsuya Ui (NEC) NS2018-140
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] NS2018-140
pp.57-61
CQ, ICM, NS, NV
(Joint)
2018-11-16
13:45
Ishikawa   [Encouragement Talk] Unit-separete Network Access Control based on Hierarchical Network Architecture
Yu Tamura (UEC), Takashi Naito (NII), Nattapong Kitsuwan (UEC) NS2018-148
This paper proposes a Hierarchical Role-based Network Access Control (HRNAC) approach to set the flexible rule for each ... [more] NS2018-148
pp.105-110
IN, ICTSSL, NWS
(Joint) [detail]
2018-10-19
11:35
Kagawa Takamatsu Shoko Kaigisyo Kaikan VANET (Vehicle Ad-hoc Network) Security and Blockchain
Hirofumi Onishi (Alpine America Research) ICTSSL2018-31 IN2018-48
Broader connectivity between modern vehicles and the external IT world enlarges the social concern about cyber-risks on ... [more] ICTSSL2018-31 IN2018-48
pp.31-36
CS 2018-07-12
17:00
Okinawa Eef Information Plaza (Kumejima Is.) [Special Invited Talk] Cyber Security: Lessons Learned from Actual Cases -- Recent Trends of Cyber Attacks and Effective Approaches --
Hiroo Suzuki, Tetsushi Morita (NTT) CS2018-34
In 5G/IoT era, cyber security is an indispensable element for the sound development of digital economy utilizing informa... [more] CS2018-34
p.109
NS 2018-05-17
10:00
Kanagawa Yokohama City Education Center Hierarchical Role-based Network Access Control using Software-Defined Networking
Yu Tamura, Takashi Naito, Nattapong Kitsuwan (UEC) NS2018-15
This paper proposes a Hierarchical Role-based Network Access Control in which the hierarchical structure in a general or... [more] NS2018-15
pp.1-6
ASN, ICTSSL 2018-05-14
16:00
Hiroshima Hiroshima City Univ. [Special Talk] Security check for campus-wide network using vulnerability diagnosis software
Kenji Ishida, Susumu Idenoue (Hiroshima City Univ.) ICTSSL2018-6 ASN2018-6
Security management is important in operation and management of campus wide network. For this security management, it is... [more] ICTSSL2018-6 ASN2018-6
pp.29-33
SSS 2018-04-24
15:05
Tokyo   Study on equipment for mitigation of security damages in connected vehicles
Midori Inaba (IISEC) SSS2018-4
Safety of connected and autonomous vehicles relies on security. Therefore, prevention of automotive networks from malici... [more] SSS2018-4
pp.13-16
HWS 2018-04-13
11:35
Fukuoka   Optical 3D Nano Artifact-metrics using White Light Interferometry
Naoki Yoshida (YNU), Yosuke Ueba, Shumpei Nishio, Yasuyuki Ohyagi (DNP), Morihisa Hoga (Compass21), Naoya Tate (KU), Makoto Naruse (NICT), Tsutomu Matsumoto (YNU) HWS2018-3
We propose an artificial-metric system which authenticates nanostructures with random irregularities by means of an inte... [more] HWS2018-3
pp.11-16
ICSS, IPSJ-SPT 2018-03-07
14:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center A study of decentralized IoT Security Controller
Iifan Tyou, Hiroki Nagayama, Takuya Saeki, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2017-58
With the spread of IoT devices, IoT security management has become important to network administrators. It is hard to im... [more] ICSS2017-58
pp.43-48
IA, SITE, IPSJ-IOT [detail] 2018-03-05
11:45
Tochigi Kinugawa Onsen Hotel Proposal of Risk Inspection Tool of Third Party Application for Smart Devices
Takuma Horiuchi, Ohira Kenji, Hiroki Tanioka, Masahiko Sano, Kenji Matsuura, Tetsushi Ueta (Tokushima Univ.) SITE2017-64 IA2017-75
It is reported that some third party applications for smart devices abusively acquire service-internal information and p... [more] SITE2017-64 IA2017-75
pp.73-78
LOIS, ISEC, SITE 2017-11-09
09:30
Kyoto   Consciousness Investigation of Passwords Management in University Students -- Questionnaire Design based on Friend Relationships --
Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] ISEC2017-50 SITE2017-32 LOIS2017-27
pp.7-12
ET 2017-03-10
14:00
Ehime National Institute of Technology, Niihama College Open Events of Hacking Competition CTF as Introductory Educational Experience for Information Literacy and Security Learning -- A Preliminary Experiment of a Prototype System of an Assistive Game with Quizzes and Adventure Style for High School Students --
Takayuki Abe, Makoto Nakaya, Motoki Kusume, Hiroyuki Tominaga (Kagawa Univ.) ET2016-115
We have proposed an easy CTF event, which is "Capture the Flag" as a hacking competition. It is for an introductory educ... [more] ET2016-115
pp.123-128
ITS, IEE-ITS 2017-03-07
16:15
Kyoto Kyoto Univ. Server-based Secure Diagnostic and Reprogramming System
Keisuke Takemori, Seiichiro Mizoguchi, Ayumu Kubota (KDDI Research) ITS2016-91
A electronic control units (ECU) is diagnosed and reprogramed by a maintenance staff who connects a diagnostic tool to a... [more] ITS2016-91
pp.87-92
LOIS 2017-03-03
14:15
Okinawa N.Ohama Memorial Hall A study on availability of attribute on smart device management system with functional encryption
Makiko Aoyagi, Sakurako Tamura, Sakae Chikara, Hiroaki Isaka (NTT) LOIS2016-96
The Smart Device Management System provides access control for applications and contents by attribute information specif... [more] LOIS2016-96
pp.189-194
IN, MoNA, CNR
(Joint)
2016-11-18
14:15
Kagoshima Kirishima-kanko Hotel Application of Dynamic IP-VPN to Communication Robot
Yuka Kamizuru, Tomohiro Bouyashiki, Minoru Umegae (NTTcom) CNR2016-17
“Dynamic IP-VPN” is a software defined network, which provides end-to-end virtual network using IP-in-IP tunnel. API is ... [more] CNR2016-17
pp.19-23
ISEC, LOIS, SITE 2016-11-08
10:50
Fukui Community Hall & AOSSA Mall, Fukui An Efficient Decryption Control Method for the Smart Device Manegement System with Functional Encryption
Sakurako Tamura, Makiko Aoyagi, Sakae Chikara, Hiroaki Isaka (NTT) ISEC2016-62 SITE2016-52 LOIS2016-40
The Smart Device Management System provides access control for applications and contents by the specified parameters of ... [more] ISEC2016-62 SITE2016-52 LOIS2016-40
pp.69-74
IN, ICTSSL, NWS
(Joint)
2016-10-20
11:50
Osaka Osaka Uinv. Construction of Evaluation System in Crisis Management Contest
Sakamoto Hirofumi (Wakayama Univ.) IN2016-50
Today the high reliability of the information security has been requested, the information security is the number of eng... [more] IN2016-50
pp.9-14
IN, ICTSSL, NWS
(Joint)
2016-10-21
09:30
Osaka Osaka Uinv. The Management Method for Publisher's Right Protection on Content Centric Network
Shouhei Nagai, Osamu Mizuno (Kogakuin Univ.) IN2016-56
We can get contents by smartphone and tablet PC in anywhere and anytime. Network traffic for content delivery has been i... [more] IN2016-56
pp.43-48
 Results 21 - 40 of 121 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan