IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 67 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC
(Joint) [detail]
2019-11-15
09:40
Ehime Ehime Prefecture Gender Equality Center Modeling attacks against device authentication using CMOS image sensor PUF
Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] ICD2019-34 IE2019-40
pp.31-36
SC 2019-06-01
10:30
Ibaraki National Institute for Materials Science An Introduction of Security Case Studies for Service Robots and IoT Devices
Jiro Yamazaki, Hidenori Tsuiji, Fumiaki Yamasaki (NOS) SC2019-8
In the past years, robots worked in very restricted area such as industrial factory for a certain purposes and
also iso... [more]
SC2019-8
pp.45-50
HWS 2019-04-12
13:55
Miyagi Tohoku University Construction of a System to Evaluate Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs
Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2019-2
Since the output of instrumentation systems such as sensors in a broad sense can have a significant impact on a system t... [more] HWS2019-2
pp.7-12
ITS, IE, ITE-MMS, ITE-HI, ITE-ME, ITE-AIT [detail] 2019-02-20
16:00
Hokkaido Hokkaido Univ. [Invited Talk] Anomaly Detection for Smart Home Based on User Behavior -- ICCE2019 Report --
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric)
The operations of home IoT devices by attackers can cause serious problems.
However, such attacks are difficult to dete... [more]

EMCJ, IEE-EMC, IEE-MAG 2018-11-22
15:10
Overseas KAIST [Poster Presentation] Study on Estimation of Sensing Timing Based on Observation of EM Radiation from Ultrasonic Range Finder
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-76
Recently, Various studies on instrumentation security which aims spoofing on sensor are reported. EM radiation from sens... [more] EMCJ2018-76
pp.55-56
ASN, SRW
(Joint)
2018-11-05
10:25
Tokyo Tokyo Denki University, Tokyo Senju Campus Study on obstacle avoidance in video surveillance system using a drone
Daiki Suzuki, Susumu Matsui (OIT) ASN2018-52
The needs of home security systems are increasing against the background of the solitary old people’s increase. As funct... [more] ASN2018-52
pp.1-5
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:10
Hokkaido Sapporo Convention Center A Study on Amplitude Controlling Using Modulated Wave toward Countermeasure against Spoofing Attack on Ultrasonic Rangefinder
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16
Various sensors are increasing with spread of applications such as automatic operation. Ultrasonic rangefinders have bec... [more] ISEC2018-17 SITE2018-9 HWS2018-14 ICSS2018-20 EMM2018-16
pp.55-59
HWS 2018-04-13
15:25
Fukuoka   A Compact Countermeasure against Laser-Fault-Injection Attack Utilizing Bulk-Current Sensor and Instantaneous Supply-Shunt Circuit
Kohei Matsuda (Kobe Univ.), Tatsuya Fujii, Shoji Natsu, Takeshi Sugawara, Kazuo Sakiyama (UCE), Yu-ichi Hayashi (NAIST), Makoto Nagata, Noriyuki Miura (Kobe Univ.) HWS2018-8
A compact sense-and-reacts countermeasure is proposed against laser fault injection attack on cryptographic processors. ... [more] HWS2018-8
pp.41-44
HWS 2018-04-13
15:50
Fukuoka   An analog security technique on a physical-cyber boundary
Takuji Miki, Kento Mizuta, Noriyuki Miura, Makoto Nagata (Kobe Univ.) HWS2018-9
This paper presents an analog measurement security technique for sensor systems. A sensor analog circuit is indispensabl... [more] HWS2018-9
pp.45-48
IA, IN
(Joint)
2017-12-14
16:45
Hiroshima Hiroshima City Univ. Anomaly Detection for Smart Home IoT based on Users' Behavior
Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (Mitsubishi Electric) IN2017-58
Many devices such as air conditioners and refrigerator have become connected to the Internet, and become a target of the... [more] IN2017-58
pp.73-78
ICSS 2017-11-20
14:15
Oita Beppu International Convention Center [Invited Talk] Case Study and Future Perspective on Security Assessment of Connected Car
Masaki Kamizono (PwC) ICSS2017-38
Various cyber security threats and vulnerabilities are reported in accordance with the remarkable rise of the connected ... [more] ICSS2017-38
pp.1-4
MSS, CAS, IPSJ-AL [detail] 2016-11-24
10:00
Hyogo Kobe Institute of Computing Hardware Trojan with Sensor Trigger
Takato Iwase, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-58 MSS2016-38
Recently, in-vehicle system technology has been rapidly developed. However, in-vehicle system is vulnerable because of s... [more] CAS2016-58 MSS2016-38
pp.1-6
IA 2016-11-03
14:45
Overseas Taipei (Taiwan) A Design and Implementation of The Raspberry Gate -- A Small Security Gateway for IoT Generations --
Hiroyuki Ohno (Kanazawa Univ.), Hironobu Suzuki (Senshu Univ.), Yoshiaki Kitaguchi (Kanazawa Univ.) IA2016-30
Tens of millions of ultra-small electronic devices, sensors, and actuators are ready to be connected to the internet. We... [more] IA2016-30
pp.21-26
RECONF 2016-05-19
17:30
Kanagawa FUJITSU LAB. [Invited Talk] Overviews on key technologies to substantialize 'IoT society'
Toshihiro Matsui, Hisashi Sekine, Hideki Hayashi, Hiroaki Ohkubo, Hirotaka Sunaguchi, Naoyuki Matsuo, Yoshitatsu Sato (NEDO TSC) RECONF2016-16
Regarding non-volatile memories, sensors, embedded software, and cyber security as the key components in the coming IoT ... [more] RECONF2016-16
pp.77-82
ISEC 2016-05-19
14:30
Tokyo Kikai-Shinko-Kaikan Bldg. Research Problems in "Instrumentation Security"
Tsutomu Matsumoto (YNU) ISEC2016-8
“Instrumentation Security” studies the security with respect to data acquisition phase in IoT or CPS. It examines attack... [more] ISEC2016-8
p.35
ICSS, IPSJ-SPT 2016-03-04
14:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University An Autonomous DDoS Backscatter Detection System from Darknet Traffic
Yuki Ukawa, Jun Kitazono, Seiichi Ozawa (Kobe Univ.), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit) ICSS2015-67
This paper proposes an autonomous DDoS backscatter detection system from UDP darknet traffic. To identify DDoS backscatt... [more] ICSS2015-67
pp.123-128
IA 2016-01-29
16:15
Tokyo Kikai-Shinko-Kaikan Bldg. B3 Kenshu-2 room Study on Network Architecture for the efficient transport of Encrypted IoT/M2M packets
Shu Yamamoto, Akihiro Nakao (U-Tokyo) IA2015-87
When the sensor data is collected from the huge number of IOT/M2M sensor devices through the Internet, the traffic conta... [more] IA2015-87
pp.49-54
MBE, BioX, NC 2015-10-25
17:10
Osaka Osaka Electro-Communication University A New Biometrics Technique with Flick Operation on Electronic Device
Yoshitomo Matsubara, Haruhiko Nishimura (Univ. of Hyogo), Toshiharu Samura (NCT, Akashi College), Hiroyuki Yoshimoto, Ryohei Tanimoto (Step One) BioX2015-39 MBE2015-50 NC2015-34
Electronic devices adopting a touch-screen display such as smart phone, tablet and wearable devices have been getting us... [more] BioX2015-39 MBE2015-50 NC2015-34
pp.91-96
BioX, ITE-ME, ITE-IST 2015-06-30
10:30
Ishikawa Kanazawa University, Kakuma Campus Performance estimation based on artifact species
Tetsushi Ohki, Akira Otsuka (AIST) BioX2015-10
Technology evaluation of biometric authentication systems is widely conducted based on public biometric databases especi... [more] BioX2015-10
pp.73-78
PRMU, BioX 2015-03-19
14:30
Kanagawa   Personal authentication from Walking measured by Kinect in the night
Takuya Toyama, Masanobu Yamamoto (Niigata Univ.) BioX2014-49 PRMU2014-169
For crimes that often occur at night, we identify a walking person from a skeletal movement of the body captured by Kine... [more] BioX2014-49 PRMU2014-169
pp.59-64
 Results 21 - 40 of 67 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan