Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SAT, MICT, WBS, RCC (Joint) [detail] |
2024-05-17 11:15 |
Miyazaki |
KITEN Convention hall (Miyazaki) (Primary: On-site, Secondary: Online) |
[Invited Lecture]
Overview of SparkLink Technologies and its Main Application Scenario for Smart City Realization Wang Junyi, Yang Weijia, Ken Kamiryu, Yasuhiro Kondo (AZAPA) |
(To be available after the conference date) [more] |
|
ICM |
2024-03-22 09:10 |
Okinawa |
Okinawa Prefectural Museum and Art Museum (Primary: On-site, Secondary: Online) |
Proposal of an implication relationship estimation method for information security related regulatory documents Kouki Nakanishi, Tkakani ikuko, Sakamoto Masanobu, Ohishi Haruo (NTT) ICM2023-51 |
In recent years, internal controls regarding information security have become increasingly important from the perspectiv... [more] |
ICM2023-51 pp.35-40 |
IA, SITE, IPSJ-IOT [detail] |
2024-03-13 11:35 |
Okinawa |
Miyakojima City Future Creation Center (Primary: On-site, Secondary: Online) |
Law and Policy on the Cybersecurity Supply Chain in the European Union Yusuke Tachibana (FIT) SITE2023-95 IA2023-101 |
This paper explores the legal policy concerning the cybersecurity supply chain in the EU. The term "cyber supply chain" ... [more] |
SITE2023-95 IA2023-101 pp.169-171 |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Router Security Assessment Using CAPEC Vulnerability Assessment Criteria Yu-Chaing Wang, Tai-Ying Chiu, Bor-Yao Tseng, Bagus Tri Atmaja, Jiann-Liang Chen, Shih-Ping Chiu (NTUST), Jian-Chang Hsu (ITRI) IA2023-62 |
Our research addresses the nexus of router performance and security in contemporary cyberinfrastructure. Routers, pivota... [more] |
IA2023-62 pp.30-36 |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63 |
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] |
IA2023-63 pp.37-39 |
ICSS, IPSJ-SPT |
2023-03-13 13:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Basic Study on IoT Security Using Robot Arm Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ICSS2022-51 |
The introduction of IoT devices in industrial systems is becoming increasingly active in order to realise Industry 4.0. ... [more] |
ICSS2022-51 pp.19-24 |
HWS, ICD |
2022-10-25 10:25 |
Shiga |
(Primary: On-site, Secondary: Online) |
A Study on Profiled Side-channel Analysis against AES-CTR Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23 |
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more] |
HWS2022-31 ICD2022-23 pp.6-11 |
IN, CCS (Joint) |
2022-08-05 15:00 |
Hokkaido |
Hokkaido University(Centennial Hall) (Primary: On-site, Secondary: Online) |
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) IN2022-22 |
In-vehicle systems adopt Controller Area Network (CAN) which is the standard communication protocol. Many kinds of data ... [more] |
IN2022-22 pp.39-44 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:40 |
Online |
Online |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 |
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] |
ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 pp.131-138 |
ICM |
2022-07-07 14:50 |
Hokkaido |
Tokachi Plaza (Primary: On-site, Secondary: Online) |
[Invited Talk]
Zero Trust Architecture and Risk Management Yuki Unno (Fujitsu Research) ICM2022-14 |
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] |
ICM2022-14 pp.21-23 |
RCS |
2022-06-17 15:20 |
Okinawa |
University of the Ryukyus, Senbaru Campus and online (Primary: On-site, Secondary: Online) |
A Study on Secret Key Sharing and Randomizing Method Based on Channel State Information and Chaos Theory Takumi Abe, Keisuke Asano, Kenta Kato, Eiji Okamoto (Nagoya Institute of Technology), Tetsuya Yamamoto (Panasonic) RCS2022-66 |
In recent years, with the commercialization of the fifth generation mobile communications system (5G), there has been a ... [more] |
RCS2022-66 pp.247-252 |
PRMU |
2021-10-09 11:15 |
Online |
Online |
Path dependence of latent personal characteristic features in swiping behavior Kazuki Sakai, Josuke Kuroiwa, Tomohiro Odaka, Haruhiko Sirai (Fukui Univ.), Izumi Suwa (Jin-ai Women's College) PRMU2021-23 |
The purpose of this paper is to investigate the path dependency of personal authentication using latent personal charact... [more] |
PRMU2021-23 pp.40-45 |
SANE |
2021-05-13 13:40 |
Online |
Online |
A study on specific emitter identification method using modified Allan variance and correlation coefficients ZHU YAN, Sei Arima, Ryo Hirayama (Ritsumeikan), Masaaki Kobayashi (AOC), Takeshi Kumaki (Ritsumeikan) SANE2021-5 |
In recent years, with the development and spread of information technology, wireless communication has been applied in v... [more] |
SANE2021-5 pp.27-31 |
IN, NS (Joint) |
2021-03-05 11:20 |
Online |
Online |
Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153 |
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] |
NS2020-153 pp.179-184 |
ICD (2nd) |
2021-03-01 14:10 |
Online |
Online |
Multimodal Sense-and-React Countermeasure Against Physical Attacks on Cryptographic Processors Sho Tada, Yuki Yamashita, Takuji Miki, Makoto Nagata (Kobe Univ.), Noriyuki Miura (Osaka Univ.) |
This paper presents a sense-and-react countermeasure that detects various physical attacks on cryptographic processors a... [more] |
|
SIP, IT, RCS |
2021-01-22 16:45 |
Online |
Online |
Revisiting the IND-CPA Security of LWE Encryption Scheme Takahiro Arai, Bagus Santoso, Kaoru Takemure (UEC) IT2020-111 SIP2020-89 RCS2020-202 |
In this paper, we propose a new simpler security notion which is
equivalence to the standard IND-CPA notion,
and base... [more] |
IT2020-111 SIP2020-89 RCS2020-202 pp.271-276 |
IA |
2020-10-01 14:45 |
Online |
Online |
[Poster Presentation]
Cybersecurity Inventory of Autonomous Intelligent Drones Applying IEC 62443 Standard Shih-Yuan Ku, Yu-Lun Wu (National Taiwan University of Science and Technology), Yung-Chiao Chen (National Taiwan University), Jiann-Liang Chen (National Taiwan University of Science and Technology) IA2020-5 |
With the deepening of the computerization and intelligence of various systems, Industrial Control System (ICS) cybersecu... [more] |
IA2020-5 pp.18-21 |
ET |
2019-01-26 11:00 |
Osaka |
Umeda Campus, Kansai University |
WebSec: Development and Evaluation of game exercise tool for security training Tan Omiya (NAIST), Balázs Barna (Corvinus University of Budapest), Youki Kadobayashi (NAIST) ET2018-79 |
Security standards clearly state that it is necessary to implement security education for employees. However, there are ... [more] |
ET2018-79 pp.13-18 |
EMCJ, IEE-EMC, IEE-MAG |
2018-11-22 15:10 |
Overseas |
KAIST |
[Poster Presentation]
Study on Estimation of Sensing Timing Based on Observation of EM Radiation from Ultrasonic Range Finder Daisuke Fujimoto, Yu-ichi Hayashi (NAIST) EMCJ2018-76 |
Recently, Various studies on instrumentation security which aims spoofing on sensor are reported. EM radiation from sens... [more] |
EMCJ2018-76 pp.55-56 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:20 |
Hokkaido |
Sapporo Convention Center |
Construction of Revocable HIBE with Adaptive Security Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 |
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] |
ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 pp.9-16 |