IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 70  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SAT, MICT, WBS, RCC
(Joint) [detail]
2024-05-17
11:15
Miyazaki KITEN Convention hall (Miyazaki)
(Primary: On-site, Secondary: Online)
[Invited Lecture] Overview of SparkLink Technologies and its Main Application Scenario for Smart City Realization
Wang Junyi, Yang Weijia, Ken Kamiryu, Yasuhiro Kondo (AZAPA)
(To be available after the conference date) [more]
ICM 2024-03-22
09:10
Okinawa Okinawa Prefectural Museum and Art Museum
(Primary: On-site, Secondary: Online)
Proposal of an implication relationship estimation method for information security related regulatory documents
Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] ICM2023-51
pp.35-40
IA, SITE, IPSJ-IOT [detail] 2024-03-13
11:35
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Law and Policy on the Cybersecurity Supply Chain in the European Union
Yusuke Tachibana (FIT) SITE2023-95 IA2023-101
This paper explores the legal policy concerning the cybersecurity supply chain in the EU. The term "cyber supply chain" ... [more] SITE2023-95 IA2023-101
pp.169-171
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Router Security Assessment Using CAPEC Vulnerability Assessment Criteria
Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] IA2023-62
pp.30-36
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Analyzing Cybersecurity Datasets -- Enhancing Security throughout the Data Life Cycle --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] IA2023-63
pp.37-39
ICSS, IPSJ-SPT 2023-03-13
13:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Basic Study on IoT Security Using Robot Arm
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] ICSS2022-51
pp.19-24
HWS, ICD 2022-10-25
10:25
Shiga
(Primary: On-site, Secondary: Online)
A Study on Profiled Side-channel Analysis against AES-CTR
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more]
HWS2022-31 ICD2022-23
pp.6-11
IN, CCS
(Joint)
2022-08-05
15:00
Hokkaido Hokkaido University(Centennial Hall)
(Primary: On-site, Secondary: Online)
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks
Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) IN2022-22
In-vehicle systems adopt Controller Area Network (CAN) which is the standard communication protocol. Many kinds of data ... [more] IN2022-22
pp.39-44
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
16:40
Online Online Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model
Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37
pp.131-138
ICM 2022-07-07
14:50
Hokkaido Tokachi Plaza
(Primary: On-site, Secondary: Online)
[Invited Talk] Zero Trust Architecture and Risk Management
Yuki Unno (Fujitsu Research) ICM2022-14
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] ICM2022-14
pp.21-23
RCS 2022-06-17
15:20
Okinawa University of the Ryukyus, Senbaru Campus and online
(Primary: On-site, Secondary: Online)
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory
Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] RCS2022-66
pp.247-252
PRMU 2021-10-09
11:15
Online Online Path dependence of latent personal characteristic features in swiping behavior
Kazuki Sakai, Josuke Kuroiwa, Tomohiro Odaka, Haruhiko Sirai (Fukui Univ.), Izumi Suwa (Jin-ai Women's College) PRMU2021-23
The purpose of this paper is to investigate the path dependency of personal authentication using latent personal charact... [more] PRMU2021-23
pp.40-45
SANE 2021-05-13
13:40
Online Online A study on specific emitter identification method using modified Allan variance and correlation coefficients
ZHU YAN, Sei Arima, Ryo Hirayama (Ritsumeikan), Masaaki Kobayashi (AOC), Takeshi Kumaki (Ritsumeikan) SANE2021-5
In recent years, with the development and spread of information technology, wireless communication has been applied in v... [more] SANE2021-5
pp.27-31
IN, NS
(Joint)
2021-03-05
11:20
Online Online Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] NS2020-153
pp.179-184
ICD
(2nd)
2021-03-01
14:10
Online Online Multimodal Sense-and-React Countermeasure Against Physical Attacks on Cryptographic Processors
Sho Tada, Yuki Yamashita, Takuji Miki, Makoto Nagata (Kobe Univ.), Noriyuki Miura (Osaka Univ.)
This paper presents a sense-and-react countermeasure that detects various physical attacks on cryptographic processors a... [more]
SIP, IT, RCS 2021-01-22
16:45
Online Online Revisiting the IND-CPA Security of LWE Encryption Scheme
Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more]
IT2020-111 SIP2020-89 RCS2020-202
pp.271-276
IA 2020-10-01
14:45
Online Online [Poster Presentation] Cybersecurity Inventory of Autonomous Intelligent Drones Applying IEC 62443 Standard
Shih-Yuan Ku, Yu-Lun Wu (National Taiwan University of Science and Technology), Yung-Chiao Chen (National Taiwan University), Jiann-Liang Chen (National Taiwan University of Science and Technology) IA2020-5
With the deepening of the computerization and intelligence of various systems, Industrial Control System (ICS) cybersecu... [more] IA2020-5
pp.18-21
ET 2019-01-26
11:00
Osaka Umeda Campus, Kansai University WebSec: Development and Evaluation of game exercise tool for security training
Tan Omiya (NAIST), Balázs Barna (Corvinus University of Budapest), Youki Kadobayashi (NAIST) ET2018-79
Security standards clearly state that it is necessary to implement security education for employees. However, there are ... [more] ET2018-79
pp.13-18
EMCJ, IEE-EMC, IEE-MAG 2018-11-22
15:10
Overseas KAIST [Poster Presentation] Study on Estimation of Sensing Timing Based on Observation of EM Radiation from Ultrasonic Range Finder
Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-76
Recently, Various studies on instrumentation security which aims spoofing on sensor are reported. EM radiation from sens... [more] EMCJ2018-76
pp.55-56
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
10:20
Hokkaido Sapporo Convention Center Construction of Revocable HIBE with Adaptive Security
Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13
pp.9-16
 Results 1 - 20 of 70  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan