Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
KBSE |
2015-01-27 11:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Case base of secure web application development using software security knowledge base Atsuo Hazeyama, Masahito Saito (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII), Azusa Kumagaya (Tokyo Gakugei Univ.), Takanori Kobashi, Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC) KBSE2014-47 |
Importance for software security technologies has been recognized according to increase of services on the Internet. Var... [more] |
KBSE2014-47 pp.49-54 |
IA, IN (Joint) |
2014-12-19 14:45 |
Hiroshima |
Hiroshima City University |
A new method for constructing Dynamic VPN using PKI certificate authentication and OpenFlow control Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) IN2014-97 |
With increasing demand for the protection of personal information on the network, high level security measures is requir... [more] |
IN2014-97 pp.35-39 |
ICM, CQ, NS, NV (Joint) |
2014-11-13 09:25 |
Kochi |
Kochi-City-Culture-Plaza CUL-PORT |
A Suggestion of a secure network implementation based on the Healthcare PKI and OpenFlow control Technology. Joong Sun Lee, Takashi Obi, Hiroyuki Suzuki, Kazushige Fujita, Masuyoshi Yachida, Nagaaki Ohyama (Tokyo Tech) ICM2014-17 |
In dealing with medical information of patients through the network, high-level security is required. The Security Guide... [more] |
ICM2014-17 pp.7-11 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:40 |
Hokkaido |
San-Refure Hakodate |
A Proposal of Issuing Method of a Public Key Certificate to Mobile Terminals Katsuyuki Umezawa (Hitachi), Satoru Tezuka (Tokyo Univ. of Tech.) ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 |
Act on Electronic Signatures and Certification Business was revised and duties of Public Certification Service for Indiv... [more] |
ISEC2014-11 SITE2014-6 ICSS2014-15 EMM2014-11 pp.9-16 |
ICSS, IA |
2014-06-06 14:25 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
Shared Nothing Secure Programming in Erlang/OTP Kenji Rikitake IA2014-11 ICSS2014-11 |
Shared nothing architecture (SN) is a standard design method for distributed systems. In this paper, the author presents... [more] |
IA2014-11 ICSS2014-11 pp.55-60 |
ASN |
2014-05-29 14:30 |
Tokyo |
Convention Hall, RCAST, The University of Tokyo |
[Poster Presentation]
An Adaptivity-Enhancing Multipath Routing Method to Ad Hoc Networks with Diversity on Node Density for Secure Dispersed Data Transfer Tetsuya Murakami, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) ASN2014-27 |
In Ad hoc networks including multihop transmission functions, malicious relaying nodes can steal and leak their transfer... [more] |
ASN2014-27 pp.91-96 |
VLD |
2014-03-03 16:25 |
Okinawa |
Okinawa Seinen Kaikan |
Secure scan design using improved random order scans and its evaluations Masaru Oya, Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-141 |
Scan test using scan chains is one of the most important DFT techniques.
On the other hand, scan-based attacks are repo... [more] |
VLD2013-141 pp.43-48 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2013-11-28 09:45 |
Kagoshima |
|
An Area Constraint-Based Fault-Secure HLS Algorithm for RDR Architectures Considering Trade-Off between Reliability and Time Overhead Kazushi Kawamura, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-79 DC2013-45 |
With process technology scaling, decreasing reliability caused by soft errors as well as increasing the average intercon... [more] |
VLD2013-79 DC2013-45 pp.129-134 |
VLD, IPSJ-SLDM |
2013-05-16 16:00 |
Fukuoka |
Kitakyushu International Conference Center |
A Zero Time and Area Overhead Fault-Secure High-Level Synthesis Algorithm for RDR Architectures Kazushi Kawamura, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-9 |
In this paper, we propose a zero time and area overhead fault-secure high-level synthesis algorithm for RDR architecture... [more] |
VLD2013-9 pp.67-72 |
KBSE |
2013-03-14 12:00 |
Tokyo |
Shibaura Institute of Technology |
KBSSD: Proposal of a Software Security Knowledge Base for Web Application Development Atsuo Hazeyama (Tokyo Gakugei Univ.) KBSE2012-72 |
Importance for software security technologies has been recognized according to increase of services on the internet.
A ... [more] |
KBSE2012-72 pp.19-24 |
NS, IN (Joint) |
2013-03-07 10:00 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
On multipath routing method to reduce the number of bottleneck nodes for secure dispersed data transfer in ad hoc networks Anri Kimura, Eitaro Kohno, Yoshiaki Kakuda (Hiroshima City Univ.) IN2012-162 |
Ad hoc networks are autonomous distributed networks without the fixed communication infrastructures such as base station... [more] |
IN2012-162 pp.47-52 |
NS, IN (Joint) |
2013-03-08 15:30 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
A Study of a Trust-aware Routing Protocol in Wireless Multi-hop Networks Kazuya Kohara (Osaka Univ.), Hirotake Abe (Univ. of Tsukuba), Ken-ichi Baba, Shinji Shimojo (Osaka Univ.) NS2012-223 |
In wireless multihop networks, conventional trust based routing protocols are vulnerable to Spoofing ACK Attack.Maliciou... [more] |
NS2012-223 pp.337-342 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2012-11-26 16:00 |
Fukuoka |
Centennial Hall Kyushu University School of Medicine |
Secure Scan Architecture Using State Dependent Scan Flip Flop with Key-Based Configuration against Scan-Based Attack Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2012-67 DC2012-33 |
Secure cryptographic LSIs is intensively used in order to perform confidential operation. Scan test has become the most ... [more] |
VLD2012-67 DC2012-33 pp.45-50 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2012-11-28 16:50 |
Fukuoka |
Centennial Hall Kyushu University School of Medicine |
A Design Method of Fault-Secure Parallel Prefix Adders by Carry-Bit Duplication Nobutaka Kito (Chukyo Univ.), Naofumi Takagi (Kyoto Univ.) VLD2012-106 DC2012-72 |
We show a design method of fault-secure parallel prefix adders with various prefix structures.
Adders by the method gen... [more] |
VLD2012-106 DC2012-72 pp.273-278 |
IE, SIP, ICD, VLD, IPSJ-SLDM [detail] |
2012-10-19 16:00 |
Iwate |
Hotel Ruiz |
Secure Scan Architecture Using State Dependent Scan Flip-Flop with Key-Based Configuration on RSA Circuit   Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2012-57 SIP2012-79 ICD2012-74 IE2012-81 |
Scan test is one of the useful design for testability techniques, which can detect circuit failure efficiently. However,... [more] |
VLD2012-57 SIP2012-79 ICD2012-74 IE2012-81 pp.95-100 |
DC, CPSY (Joint) |
2012-08-02 14:30 |
Tottori |
Torigin Bunka Kaikan |
Application Authentication System on Untrusted OS Tsuyoshi Yamada, Masahiro Goshima, Shuichi Sakai (UT) CPSY2012-11 |
In order to prevent the information which an application deal from leakage, it is necessary to verify that following thr... [more] |
CPSY2012-11 pp.13-18 |
VLD, CAS, MSS, SIP |
2012-07-03 11:40 |
Kyoto |
Kyoto Research Park |
Secure Scan Architecture on RSA Circuit Using State Dependent Scan Flip Flop against Scan-Based Side Channel Attack Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) CAS2012-21 VLD2012-31 SIP2012-53 MSS2012-21 |
Scan test that is one of the useful design for testability tecniques, which can control and observe the FFs(Flip Flops) ... [more] |
CAS2012-21 VLD2012-31 SIP2012-53 MSS2012-21 pp.115-120 |
NS, IN (Joint) |
2012-03-09 13:30 |
Miyazaki |
Miyazaki Seagia |
Content Espresso: A Global Secure File Sharing System for Large Files Kunitake Kaneko, Daisuke Ando, Fumio Teraoka (Keio Univ.) IN2011-192 |
Recently, it is common to handle large files over the world. However, large files make the system to store, share, and a... [more] |
IN2011-192 pp.329-334 |
NS |
2012-01-27 13:20 |
Okinawa |
Ryukyu University |
A study on the efficient construction mechanism of overlay control channels in OpenFlow-based networks Toshio Koide, Hideyuki Shimonishi (NEC) NS2011-168 |
A secure channel that connects a switch in OpenFlow-based network to a remote controller, allowing control information t... [more] |
NS2011-168 pp.133-138 |
NS, IN (Joint) |
2010-03-05 13:00 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
Communication Architecture Evolution that is enabled by Introducing Specific IP address for Each Session
-- Unified Multiplex -- Hiroshi Kitamura (NEC Corp./Univ. of Electro-Comm.), Shingo Ata (Osaka City Univ.), Masayuki Murata (Osaka Univ.) IN2009-212 |
We have proposed a new communication architecture called “Unified Multiplex Communication Architecture.” Two new types o... [more] |
IN2009-212 pp.405-410 |