IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 38 of 38 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
MoNA, ASN, IPSJ-MBL, IPSJ-UBI
(Joint) [detail]
2015-03-02
14:35
Tokyo Shibaura Institute of Technology(Toyosu Campus) A Study on Data Processing among Users' Mobiles for Application of Privacy Data
Takafumi Harada, Keizo Murakami, Hironobu Okuyama, Takahiro Yamamoto (NTT) MoNA2014-96
Recently, smartphones have many kinds of sensors. Therefore data from these probes is able to be used for many kinds of ... [more] MoNA2014-96
pp.129-133
CS, NS, IN
(Joint)
2014-09-12
14:50
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan The proposal of the privacy protection technique in the network using positional addresses
Taichi Aoki (IISEC) NS2014-101
Our study is a network, that is using location information as an address. One of the theme of a position address
networ... [more]
NS2014-101
pp.129-134
CPSY, DC
(Joint)
2014-07-29
17:25
Niigata Toki Messe, Niigata Anonymization Infrastructure for Privacy Preserving Data Publishing
Yuichi Nakamura, Kengo Okada, Fumito Yamaguchi, Hiroaki Nishi (Keio Univ.) CPSY2014-30
Nowadays, various institutions manage large amounts of data such as customer information and medical records . These dat... [more] CPSY2014-30
pp.119-124
ICSS, IPSJ-SPT 2014-03-28
09:00
Okinawa Meio Univiersity A Study on the Formulation of Re-identification of Anonymized Personal Information
Hiroko Akiyama, Akira Kato, Hideki Sunahara (Keio Univ.) ICSS2013-86
Anonymizing personal information is one way to preserve human's privacy.
But combination of anonymized information mig... [more]
ICSS2013-86
pp.167-172
LOIS 2014-03-08
16:20
Okinawa   Linkable System Using Encrypted Personal Identification Information for Clinical Research
Tetsuya Hirai (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masanori Hirotomo (Saga Univ.), Masami Mohri (Gifu Univ.), Toshiharu Nakai (NCGG), Yoshiaki Shiraishi (Kobe Univ.) LOIS2013-79
In order to append and relate clinical information to new information, clinical information is de-identified in clinical... [more] LOIS2013-79
pp.149-154
AI 2013-11-28
16:50
Fukuoka   An Algorithm of k-anonymization for Location Information with Errors
Yuichi Sei, Akihiko Ohsuga (Univ. of Electro-Comm.) AI2013-26
Data mining can support effective marketing or advertisement based on user' attributes such as sex, age, and current loc... [more] AI2013-26
pp.41-46
DE, IPSJ-DBS, IPSJ-IFAT 2013-07-23
16:40
Hokkaido Hokkaido University k-anonymization for large-scale data with less information loss
Keisuke Murakami (Aoyama Gakuin Univ.), Takeaki Uno (NII) DE2013-32
The individual information such as the medical database is useful for data analysis. However, the individual information... [more] DE2013-32
pp.193-198
LOIS 2013-03-07
15:30
Okinawa   An Experiment of Purterbation-Reconstruction Method on Power Consumption Data
Ryo Kikuchi (NTT), Satoshi Hasegawa (Univ. of Tsukuba), Dai Ikarashi (NTT) LOIS2012-84
Recently, an anonymization that realizes both privacy protections and statistical analyses is now attracting attention. ... [more] LOIS2012-84
pp.89-94
ICSS 2012-11-22
11:35
Hiroshima Miyajima Mori-no-Yado An analytical study for sensor service provider to keep their use's security
Takamichi Aso, Atsuhiro Goto (IISEC) ICSS2012-47
Sensor service attracts huge attention now. It is easy to image that sensor service providers would utilize public cloud... [more] ICSS2012-47
pp.13-18
EMM 2012-10-04
15:30
Chiba Makuhari Messe [Special Talk] A Proposal on Crisis-proof Social and Life Space -- Life-log Data Driven Information Flow and Privacy Preserving --
Noboru Sonehara (NII) EMM2012-60
Advent of the Internet and the Web have led to the convergence of an integrated society combining the real world and cyb... [more] EMM2012-60
pp.27-32
IA, SITE, IPSJ-IOT [detail] 2012-03-16
11:40
Hokkaido Hokkaido Univ. Statistical disclosure control of health information using the k-Anonymity concept and the virtual desktop technology
Eizen Kimura (Ehime Univ.) SITE2011-50 IA2011-100
Electronic medical record and online receipt system realized the management of enormous health record, and the Big data ... [more] SITE2011-50 IA2011-100
pp.223-228
LOIS 2012-03-09
13:10
Okinawa Meio Univ. t-test for Privacy-Preserved Data
Ryo Kikuchi, Akihiro Yamanaka, Dai Ikarashi (NTT) LOIS2011-101
As the needs of utilizing the privacy information such as giving the receipt to researchers in the university for
the d... [more]
LOIS2011-101
pp.171-176
SITE, IPSJ-CE 2011-12-17
15:45
Shimane   A study for the change of anonymous nature of data from individuals with development of information processing techniques
Soichiro Morishita (Univ. of Tokyo), Hiroshi Yokoi (UEC) SITE2011-29
With the improvement of information processing technology, the data which were not considered to be personal data come t... [more] SITE2011-29
pp.25-28
DE 2011-08-03
10:30
Kyoto Ritusmei University, Suzaki Campus *
Masanori Mano, Yoshiharu Ishikawa (Nagoya Univ.) DE2011-35
In recent years, location-based services have become popular due to the progress of GPS devices and mobile communication... [more] DE2011-35
pp.47-52
ICSS 2011-03-25
10:45
Tokyo Suspended Proposal of an Order Preserving Encryption for Anonymity
Ryoichi Isawa (Kobe Univ./Crypto), Masakatu Morii (Kobe Univ.) ICSS2010-57
The study of Order Preserving Encryption (OPE) is focusing much attention by researchers. OPE is able to anonymize the n... [more] ICSS2010-57
pp.5-10
IA, ICSS 2010-06-17
15:20
Kyoto Academic Center for Computing and Media Studies, Kyoto University Proposal and Consideration for An Anonymity Method for Widespred High-Speed Incident Analysis System(II)
Ryoichi Isawa (CRYPTO), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO), Koji Nakao (NICT) IA2010-6 ICSS2010-6
Some organizations need to collaborate each other to analyze the computer security incidents which become complex. The n... [more] IA2010-6 ICSS2010-6
pp.31-36
IA, ICSS 2009-06-18
13:30
Tokyo Kikai-Shinko-Kaikan Bldg *
Ryoichi Isawa (CRYPTO Co., Ltd.), Kota Kondo, Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-5 ICSS2009-13
The widely distributed incidents analysis system developed by NICT consists of some L-SOCs and an upper level SOC. The L... [more] IA2009-5 ICSS2009-13
pp.25-30
IA, ICSS 2009-06-18
13:55
Tokyo Kikai-Shinko-Kaikan Bldg *
Kota Kondo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Sadako Takasuka (CRYPTO Co., Ltd.), Koji Nakao (NICT) IA2009-6 ICSS2009-14
The problem caused by the computer security incidents become serious in these days. For the countermeasure,the widely di... [more] IA2009-6 ICSS2009-14
pp.31-36
 Results 21 - 38 of 38 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan