Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS |
2016-10-20 11:35 |
Kanagawa |
YRP (Yokosuka) |
Study on Secret Information Sharing with Propagation Coefficient and Public Transmission of Antenna Weight Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2016-164 |
In recent years, as a countermeasure against eavesdropping in wireless communication, physical layer security draw atten... [more] |
RCS2016-164 pp.65-70 |
ISEC |
2016-05-19 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Research Problems in "Instrumentation Security" Tsutomu Matsumoto (YNU) ISEC2016-8 |
“Instrumentation Security” studies the security with respect to data acquisition phase in IoT or CPS. It examines attack... [more] |
ISEC2016-8 p.35 |
ISEC |
2016-05-19 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Instrumentation Security of a Pulse LIDAR System Against Reflected Light Masquerading Kazuki Soma, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2016-9 |
A number of automatic safety systems such as Automatic Emergency Braking (AEB) for vehicles functions based on the measu... [more] |
ISEC2016-9 pp.37-44 |
EMT, IEE-EMT |
2015-10-30 10:25 |
Miyazaki |
Holiday Inn ANA Resort Miyazaki |
Envelope-detection Millimeter-wave Active Imaging using Complex-Valued Self-Organizing Map Image Processing Yuya Arima, Akira Hirose (Univ. of Tokyo) EMT2015-69 |
Millimeter-wave is the electromagnetic wave having a high directivity and a high penetration into materials such as plas... [more] |
EMT2015-69 pp.131-135 |
RCS, SR, SRW (Joint) |
2015-03-06 11:40 |
Tokyo |
Tokyo Institute of Technology |
Secret Key Agreement Scheme Based on Pre-measurement of Radio Wave Propagation Characteristics Takumi Higuchi, Hideichi Sasaoka, Hisato Iwai (Doshisha Univ.) RCS2014-358 |
In recent years, for the technology of physical layer security, there has been increasing interest in secret key agreeme... [more] |
RCS2014-358 pp.339-344 |
MW, ED |
2015-01-15 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Millimeter-wave Active Imaging Using Multiple Frequencies with Complex-Valued Self-Organizing Map Image Processing Yuya Arima, Akira Hirose (Univ. Tokyo) ED2014-118 MW2014-182 |
Millimeter-wave possesses high penetrability and high directivity. In security imaging, we use these features to discove... [more] |
ED2014-118 MW2014-182 pp.7-11 |
BioX (2nd) |
2013-08-27 13:00 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
Keystroke Biometrics with Sensor Information on Smartphone Toshiharu Samura, Masayuki Izumi (ANCT), Haruhiko Nishimura (Univ. Hyogo) |
Today smartphones are becoming widely used as multipurpose devices. If smartphone was stolen, the risks of leaking perso... [more] |
|
BioX (2nd) |
2013-08-28 15:15 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
Relations among Security Metrics for Template Protection Algorithms Manabu Inuma (JU), Akira Otsuka (AIST) |
This paper gives the formal definitions for security metrics proposed by Simoens et al. and Nagar et al., and analyze th... [more] |
|
EMCJ |
2013-04-12 14:10 |
Okayama |
Okayama Univ. |
Noise Investigation of Cryptographic ICs for Side-Channel Analysis by Means of Equivalent Current Source Model
-- A Study with SASEBO-G -- Kengo Iokibe, Tetsuo Amano, Yoshitaka Toyota (Okayama Univ.), Tetsushi Watanabe (Industrial Technology Center of Okayama Prefecture) EMCJ2013-5 |
It is an important issue to estimate noise for the side-channel analysis that occur in cryptographic integrated circuits... [more] |
EMCJ2013-5 pp.25-30 |
MBE, NC (Joint) |
2013-03-15 13:45 |
Tokyo |
Tamagawa University |
Proposal of millimeter-wave security imaging using complex-valued self-organizing map Shogo Onojima, Yuya Arima, Akira Hirose (Univ. of Tokyo) NC2012-177 |
We propose a millimeter-wave imaging system for moving targets consisting of one-dimensional array antenna, parallel fro... [more] |
NC2012-177 pp.249-254 |
EMCJ, IEE-EMC |
2012-12-14 15:35 |
Gifu |
Gifu Univ. |
Safety Estimates of Cryptographic Modules against On-Board Side-Channel Attacks by Use of EMC Macro-Model Kengo Iokibe, Tetsuo Amano, Kaoru Okamoto, Yoshitaka Toyota (Okayama Univ.), Tetsushi Watanabe (Ind Tech. Center of Okayama Prefecture) EMCJ2012-99 |
In this study, EMC-macro modeling was examined to develop a method to evaluate cryptographic systems before fabrication.... [more] |
EMCJ2012-99 pp.87-94 |
OPE, OFT |
2012-03-02 09:05 |
Tokyo |
|
Optical fiber vibration sensor and application Tatsuya Kumagai, Shinobu Sato, Shinji Komatsuzaki, Teruyuki Nakamura (Hitachi Cable) OFT2011-72 OPE2011-198 |
Fiber-optic gyroscope (FOG), rotation sensor, and fiber-optic distributed temperature sensor (DTS) have been developed a... [more] |
OFT2011-72 OPE2011-198 pp.1-6 |
IA, SITE, IPSJ-IOT [detail] |
2011-03-01 15:25 |
Kochi |
Kochi City Culture-Plaza CUL-PORT (Kochi prefecture) |
Scan Detection Method Based on Multi-Point Observation Kei Higashijima, Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga (KIT), Shunji Abe, Shigeo Urushidani, Shigeki Yamada (NII) SITE2010-66 IA2010-102 |
The Internet is important infrastructure of the social foundation.
The attacks to the Internet which obstruct stable op... [more] |
SITE2010-66 IA2010-102 pp.225-230 |
CS, OCS (Joint) |
2010-01-29 11:20 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
Effects introduced by Randomization for Intensity Modulated Y-00 Cryptosystem Yuki Nagasako (IRI/Tamagawa Univ.) OCS2009-111 |
Yuen 2000 protocol (Y-00) designed by intensity modulation has advantages over phase modulated Y-00. However, it has bee... [more] |
OCS2009-111 pp.67-71 |
SR, AN, USN (Joint) |
2009-10-23 11:50 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
Hot Research Topics and Attempts for Practical Applications on Ad Hoc Networks Nei Kato (Tohoku Univ.) SR2009-65 AN2009-35 USN2009-38 |
Ad hoc networks area has been extremely active during recent years. In this presentation, an overview of ad hoc networks... [more] |
SR2009-65 AN2009-35 USN2009-38 pp.95-102(SR), pp.87-94(AN), pp.69-76(USN) |
ICM, LOIS (Joint) |
2009-01-23 09:00 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
Adoption and evaluation of a Secure Printing System for tax documents issuance at local agency Hiroki Kitai, Daisuke Nago, Atsushi Kawade, Masashi Doi, Hiroaki Muranaka, Hiroki Kuwabara, Masaaki Niimura, Hisayoshi Kunimune (Shinshu Univ.), Hiroshi Matsuyama (AVASYS Co.), Mitsuoki Ozawa (Shiojiri City), Yasushi Fuwa (Shinshu Univ.) OIS2008-71 |
There are various security problems using network printer such as tapping from communication path, printed paper being l... [more] |
OIS2008-71 pp.33-38 |
USN, IPSJ-UBI |
2008-07-17 11:00 |
Tokyo |
Tokyo Denki University (Tokyo) |
A Security Monitoring System of Detecting Unusual Sounds and Hazardous Situations by Sound Environment Measurement Using Microphone Arrays Mitsuru Kawamoto, Futoshi Asano, Koichi Kurumatani (AIST) |
We propose an “unusual sound detection system” which can automatically detect unusual sounds and send hazardous situatio... [more] |
USN2008-14 pp.19-26 |
IN |
2007-07-19 15:35 |
Hyogo |
Kobe University |
Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29 |
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] |
IN2007-29 pp.13-18 |
EA |
2007-06-29 11:00 |
Hokkaido |
Hokkaido Univ. |
An automatic measurement system of object related transfer function for small object Yoshifumi Chisaki, Masahiro Naganishi, Toshimichi Takada, Ryuichi Kohzawa, Tsuyoshi Usagawa (Kumamoto Univ.) EA2007-27 |
Frequency domain binaural model (FDBM) has been proposed as a computer
model of the human auditory system based on head... [more] |
EA2007-27 pp.1-6 |
IN |
2007-06-22 14:35 |
Hokkaido |
Future University-Hakodate |
Identifying Worm-Infected Hosts Using White List Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino (NTT) IN2007-24 |
In the Internet, a rapid spread of worm is a serious problem. In many cases, worm-infected hosts generate huge amount of... [more] |
IN2007-24 pp.79-84 |