IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 9 of 9  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
PRMU, BioX 2015-03-19
15:30
Kanagawa   A study on the performance of a mobile terminal-based signature verification system under different writing conditions
Shin Onoda, Yuuki Goubaru, Yasushi Yamazaki (Kitakyush City Univ.) BioX2014-51 PRMU2014-171
Recently, with the rapid spread of smartphones and tablet PCs, a user interface with pens or fingers is commonly used. F... [more] BioX2014-51 PRMU2014-171
pp.71-76
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:40
Hokkaido San-Refure Hakodate A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals
Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
Act on Electronic Signatures and Certification Business was revised and duties of Public Certification Service for Indiv... [more] ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11
pp.9-16
MoNA, IN
(Joint)
2011-11-18
11:35
Fukuoka   Studying of the authentication platform for Non-PC terminals
Kenichiro Kitayama, Kazuaki Yamaguchi, Tetsuya Yamaguchi (NTTW) IN2011-99
Due to the fact that Non-PC terminals(e.g. smartphones and tablet terminals) that can connect the Internet have been rap... [more] IN2011-99
pp.37-42
IN, MoNA
(Joint)
2010-11-19
11:35
Fukuoka Fukuoka Institute of Technology Proposal of Authentication System that uses Cellular Phone as Storage of Authentication Information
Katsuyuki Umezawa, Makoto Kayashima (Hitachi), Satoru Tezuka (Tokyo University of Technology) MoMuC2010-52
Recently, the cellular phone penetration rate increased. One person came to own two or more cellular phones. On the othe... [more] MoMuC2010-52
pp.73-78
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
15:05
Aomori Hirosaki University Development and Evaluation of Federation Technology for Authenticated Information based on GBA Protocol
Katsuyuki Umezawa, Takashi Tashiro (Hitachi), Satoru Tezuka (School of Computer Science, Tech. of Tokyo Univ.) ISEC2010-17 SITE2010-13 ICSS2010-23
Recently, the cellular phone penetration rate increased. One person came to own two or more cellular phones. On the othe... [more] ISEC2010-17 SITE2010-13 ICSS2010-23
pp.47-53
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
15:20
Akita Akita University Development of FMC Authentication Technique with Mobile Terminal
Katsuyuki Umezawa, Takatoshi Kato (Hitachi), Satoru Tezuka (Tech. of Tokyo Univ.) ISEC2009-36 SITE2009-28 ICSS2009-50
The meaning of the narrow sense of FMC is a technology and service that can use the same terminals by both a mobile netw... [more] ISEC2009-36 SITE2009-28 ICSS2009-50
pp.203-208
IN 2008-07-18
15:50
Hyogo Koube Univ. A Load Balancing Method for Radio Access Servers to Handle a Large Number of Wireless Terminals
Hiroshi Shibata, Koki Mitani, Koichi Takasugi, Hideki Toshinaga, Satoshi Kotabe, Shinya Ishihara, Hiroshi Saito (NTT) IN2008-42
We propose a load-balancing method for Radio access network servers (RANSes) to authenticate and control communication o... [more] IN2008-42
pp.95-100
NS, IN
(Joint)
2007-03-09
13:10
Okinawa Okinawa Convention Center Proposal for Terminal Management on Quarantine Network using PPPoE
Jingpeng Xu (Waseda Univ.), Mitsuo Kuroishi (IIJ), Hidenori Nakazato, Yoshiyori Urano (Waseda Univ.) NS2006-195
This paper proposes MAC address registration mechanism in DHCP-based quarantine network. The mechanism exploit PPPoE pro... [more] NS2006-195
pp.193-196
NS, CS, IN 2004-09-03
10:55
Miyagi Tohoku University Proposal of the authenticated type firewall using Hierarchical Mobile IPv6
Yuji Yamada, Kazuhide Koide, Gen Kitagata, Norio Shiratori (Tohoku Univ.)
When a certain node moves in a network, due to network Security Policy, it becomes impossible to access the network. Alt... [more] NS2004-112 IN2004-71 CS2004-67
pp.61-66
 Results 1 - 9 of 9  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan