IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 43 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCS 2016-10-20
11:35
Kanagawa YRP (Yokosuka) Study on Secret Information Sharing with Propagation Coefficient and Public Transmission of Antenna Weight
Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2016-164
In recent years, as a countermeasure against eavesdropping in wireless communication, physical layer security draw atten... [more] RCS2016-164
pp.65-70
ISEC 2016-05-19
14:30
Tokyo Kikai-Shinko-Kaikan Bldg. Research Problems in "Instrumentation Security"
Tsutomu Matsumoto (YNU) ISEC2016-8
“Instrumentation Security” studies the security with respect to data acquisition phase in IoT or CPS. It examines attack... [more] ISEC2016-8
p.35
ISEC 2016-05-19
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Instrumentation Security of a Pulse LIDAR System Against Reflected Light Masquerading
Kazuki Soma, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2016-9
A number of automatic safety systems such as Automatic Emergency Braking (AEB) for vehicles functions based on the measu... [more] ISEC2016-9
pp.37-44
EMT, IEE-EMT 2015-10-30
10:25
Miyazaki Holiday Inn ANA Resort Miyazaki Envelope-detection Millimeter-wave Active Imaging using Complex-Valued Self-Organizing Map Image Processing
Yuya Arima, Akira Hirose (Univ. of Tokyo) EMT2015-69
Millimeter-wave is the electromagnetic wave having a high directivity and a high penetration into materials such as plas... [more] EMT2015-69
pp.131-135
RCS, SR, SRW
(Joint)
2015-03-06
11:40
Tokyo Tokyo Institute of Technology Secret Key Agreement Scheme Based on Pre-measurement of Radio Wave Propagation Characteristics
Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2014-358
In recent years, for the technology of physical layer security, there has been increasing interest in secret key agreeme... [more] RCS2014-358
pp.339-344
MW, ED 2015-01-15
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. Millimeter-wave Active Imaging Using Multiple Frequencies with Complex-Valued Self-Organizing Map Image Processing
Yuya Arima, Akira Hirose (Univ. Tokyo) ED2014-118 MW2014-182
Millimeter-wave possesses high penetrability and high directivity. In security imaging, we use these features to discove... [more] ED2014-118 MW2014-182
pp.7-11
BioX
(2nd)
2013-08-27
13:00
Osaka The Institute of Scientific and Industrial Research, Osaka Univ. Keystroke Biometrics with Sensor Information on Smartphone
Toshiharu Samura, Masayuki Izumi (ANCT), Haruhiko Nishimura (Univ. Hyogo)
Today smartphones are becoming widely used as multipurpose devices. If smartphone was stolen, the risks of leaking perso... [more]
BioX
(2nd)
2013-08-28
15:15
Osaka The Institute of Scientific and Industrial Research, Osaka Univ. Relations among Security Metrics for Template Protection Algorithms
Manabu Inuma (JU), Akira Otsuka (AIST)
This paper gives the formal definitions for security metrics proposed by Simoens et al. and Nagar et al., and analyze th... [more]
EMCJ 2013-04-12
14:10
Okayama Okayama Univ. Noise Investigation of Cryptographic ICs for Side-Channel Analysis by Means of Equivalent Current Source Model -- A Study with SASEBO-G --
Kengo Iokibe, Tetsuo Amano, Yoshitaka Toyota (Okayama Univ.), Tetsushi Watanabe (Industrial Technology Center of Okayama Prefecture) EMCJ2013-5
It is an important issue to estimate noise for the side-channel analysis that occur in cryptographic integrated circuits... [more] EMCJ2013-5
pp.25-30
MBE, NC
(Joint)
2013-03-15
13:45
Tokyo Tamagawa University Proposal of millimeter-wave security imaging using complex-valued self-organizing map
Shogo Onojima, Yuya Arima, Akira Hirose (Univ. of Tokyo) NC2012-177
We propose a millimeter-wave imaging system for moving targets consisting of one-dimensional array antenna, parallel fro... [more] NC2012-177
pp.249-254
EMCJ, IEE-EMC 2012-12-14
15:35
Gifu Gifu Univ. Safety Estimates of Cryptographic Modules against On-Board Side-Channel Attacks by Use of EMC Macro-Model
Kengo Iokibe, Tetsuo Amano, Kaoru Okamoto, Yoshitaka Toyota (Okayama Univ.), Tetsushi Watanabe (Ind Tech. Center of Okayama Prefecture) EMCJ2012-99
In this study, EMC-macro modeling was examined to develop a method to evaluate cryptographic systems before fabrication.... [more] EMCJ2012-99
pp.87-94
OPE, OFT 2012-03-02
09:05
Tokyo   Optical fiber vibration sensor and application
Tatsuya Kumagai, Shinobu Sato, Shinji Komatsuzaki, Teruyuki Nakamura (Hitachi Cable) OFT2011-72 OPE2011-198
Fiber-optic gyroscope (FOG), rotation sensor, and fiber-optic distributed temperature sensor (DTS) have been developed a... [more] OFT2011-72 OPE2011-198
pp.1-6
IA, SITE, IPSJ-IOT [detail] 2011-03-01
15:25
Kochi Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) Scan Detection Method Based on Multi-Point Observation
Kei Higashijima, Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT), Shunji Abe, Shigeo Urushidani, Shigeki Yamada (NII) SITE2010-66 IA2010-102
The Internet is important infrastructure of the social foundation.
The attacks to the Internet which obstruct stable op... [more]
SITE2010-66 IA2010-102
pp.225-230
CS, OCS
(Joint)
2010-01-29
11:20
Yamaguchi Kaikyo Messe Shimonoseki Effects introduced by Randomization for Intensity Modulated Y-00 Cryptosystem
Yuki Nagasako (IRI/Tamagawa Univ.) OCS2009-111
Yuen 2000 protocol (Y-00) designed by intensity modulation has advantages over phase modulated Y-00. However, it has bee... [more] OCS2009-111
pp.67-71
SR, AN, USN
(Joint)
2009-10-23
11:50
Miyagi Tohoku Univ. [Invited Talk] Hot Research Topics and Attempts for Practical Applications on Ad Hoc Networks
Nei Kato (Tohoku Univ.) SR2009-65 AN2009-35 USN2009-38
Ad hoc networks area has been extremely active during recent years. In this presentation, an overview of ad hoc networks... [more] SR2009-65 AN2009-35 USN2009-38
pp.95-102(SR), pp.87-94(AN), pp.69-76(USN)
ICM, LOIS
(Joint)
2009-01-23
09:00
Yamaguchi Kaikyo Messe Shimonoseki Adoption and evaluation of a Secure Printing System for tax documents issuance at local agency
Hiroki Kitai, Daisuke Nago, Atsushi Kawade, Masashi Doi, Hiroaki Muranaka, Hiroki Kuwabara, Masaaki Niimura, Hisayoshi Kunimune (Shinshu Univ.), Hiroshi Matsuyama (AVASYS Co.), Mitsuoki Ozawa (Shiojiri City), Yasushi Fuwa (Shinshu Univ.) OIS2008-71
There are various security problems using network printer such as tapping from communication path, printed paper being l... [more] OIS2008-71
pp.33-38
USN, IPSJ-UBI 2008-07-17
11:00
Tokyo Tokyo Denki University (Tokyo) A Security Monitoring System of Detecting Unusual Sounds and Hazardous Situations by Sound Environment Measurement Using Microphone Arrays
Mitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani (AIST)
We propose an “unusual sound detection system” which can automatically detect unusual sounds and send hazardous situatio... [more] USN2008-14
pp.19-26
IN 2007-07-19
15:35
Hyogo Kobe University Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts
Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] IN2007-29
pp.13-18
EA 2007-06-29
11:00
Hokkaido Hokkaido Univ. An automatic measurement system of object related transfer function for small object
Yoshifumi Chisaki, Masahiro Naganishi, Toshimichi Takada, Ryuichi Kohzawa, Tsuyoshi Usagawa (Kumamoto Univ.) EA2007-27
Frequency domain binaural model (FDBM) has been proposed as a computer
model of the human auditory system based on head... [more]
EA2007-27
pp.1-6
IN 2007-06-22
14:35
Hokkaido Future University-Hakodate Identifying Worm-Infected Hosts Using White List
Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] IN2007-24
pp.79-84
 Results 21 - 40 of 43 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan