Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICM, LOIS |
2011-01-21 11:20 |
Nagasaki |
|
A New One-time Authentication System Using a Cellular Phone with FeliCa Chip Yusuke Kowakame, Toshihiko Wakahara (FIT) ICM2010-49 LOIS2010-60 |
With the widespread of the Internet in recent years, various technical systems have been developed for improving securit... [more] |
ICM2010-49 LOIS2010-60 pp.93-98 |
ISEC |
2008-09-12 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Security Analysis on Electronic Money Systems including Compromise of Cryptographic Algorithms and/or Devices Masataka Suzuki, Katsuhisa Hirokawa (BOJ) ISEC2008-69 |
This paper mainly focuses on note-based types of prepaid electronic money systems. Assuming compromise of cryptographic ... [more] |
ISEC2008-69 pp.39-46 |
ITE-HI, ITE-AIT, ITE-ME, IE, ITS |
2008-02-18 15:45 |
Hokkaido |
Graduate School of Information Science and Technology Hokkaido Univ |
A Study on User Authentication Infrastructure for Telematics Katsuyuki Umezawa, Seiichi Susaki, Masamori Kashiyama (Hitachi, Ltd) ITS2007-58 IE2007-241 |
Recently, the number of those who use the car by the rental, the lease, and the car sharing has increased. When a telema... [more] |
ITS2007-58 IE2007-241 pp.133-138 |
USN, CQ, MoNA (Joint) |
2008-01-25 09:15 |
Shizuoka |
Kenshu Kouryu Center, Actcity Hamamatsu (Shizuoka) |
Ultra-small reader/writer with multiple contactless interfaces for portable electronic devices Hideaki Yamamoto, Minoru Ikeda, Yasuhiro Hosoda (NTT) USN2007-64 |
The most common technique of handling contactless smart card systems is to tap cards toward fixed readers/writers(RWs). ... [more] |
USN2007-64 pp.55-60 |
SITE |
2007-12-11 15:20 |
Kyoto |
Kyoto Institute of Technology |
An Essay on Success Factors of Smartcard Businesses
-- Cases of Felica -- Shiro Uesugi (Matsuyama Univ.) SITE2007-45 |
2007 is the year of e-Money in Japan. There are two existing large services of e-Money - Edy of bit Wallet and Suica of... [more] |
SITE2007-45 pp.7-12 |
DE |
2007-07-02 13:55 |
Miyagi |
Akiu hot springs (Sendai) |
A Role Distribution Method for RBAC and its Implementation to Smart Card Management Seiichi Kondo (Mitsubishi Electric Corp./Kyoto Univ.), Mizuho Iwaihara, Masatoshi Yoshikawa (Kyoto Univ.), Takashi Komiya, Toshihisa Onuma, Koichi Yamada (Mitsubishi Electric Corp.) DE2007-23 |
Role-Bases Access Control has emerged as an implementation model for
users and access contol administration in enterpri... [more] |
DE2007-23 pp.7-12 |
ISEC |
2005-09-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
IP Security Policy and Authentication Information Distribution Mechanism using Smart Card Manabu Hirano (Toyota National College of Technology), Suguru Yamaguchi (Nara Institute of Science and Technology) |
(To be available after the conference date) [more] |
ISEC2005-80 pp.31-36 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 11:10 |
Iwate |
Iwate Prefectural University |
Defeating Simple Power Analysis on Koblitz Curves Katsuyuki Okeya (Hitachi), Tsuyoshi Takagi (Future Univ. of Hakodate), Camille Vuillaume (Hitachi) |
Koblitz curves belong to a special class of binary curves on which the scalar multiplication can be computed very effici... [more] |
ISEC2005-18 SITE2005-16 pp.67-74 |
LOIS |
2005-03-11 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Smartcard Service Architecture to Enhance Web Application Tomohiro Kokogawa, Michel Faure, Junko Hashimoto, Shinichi Hirata, Sei Ijuin (NTT) |
Services that makes use of smart cards are spreading. However, because of data interface or security problems, few Web a... [more] |
OIS2004-106 pp.65-70 |
NS, IN |
2005-03-04 11:10 |
Okinawa |
Okinawa Zanpa-misaki Royal |
Ubuquitous Service Rights Management Protocol Hiroyoshi Takiguchi, Masami Ueno, Yoshiko Sueda, Satoshi Yagi, Hirokazu Kitami, Toru Kobayashi, Yoshitsugu Kondo (NTT) |
About "Management of Permission of Use with a Smart Card" suggested as access control technology in ubiquitous computing... [more] |
NS2004-272 IN2004-272 pp.145-148 |
NS, IN |
2005-03-04 12:30 |
Okinawa |
Okinawa Zanpa-misaki Royal |
Applicability of XACML to Right-token for Ubuquitous Computing Resource Network Satoshi Yagi, Yoshiko Sueda, Masami Ueno, Hiroyoshi Takiguchi, Hirokazu Kitami, Toru Kobayashi, Yoshitsugu Kondo (NTT) |
For ubiquitous computing resource network, the distributed condition judging technology which ensure privacy for informa... [more] |
NS2004-292 IN2004-292 pp.243-246 |