|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
OCS, CS (Joint) |
2011-01-27 15:40 |
Tokushima |
The University of Tokushima |
Experimental evaluation as the random cipher of the Yuen-2000 (Y-00) protocol Fumio Futami, Osamu Hirota (Tamagawa Univ.) OCS2010-105 |
The personal information and proprietary information in various network applications are transmitted in the current netw... [more] |
OCS2010-105 pp.37-42 |
HIP, HCS, MVE, WIT (2nd) |
2009-12-10 - 2009-12-12 |
Hokkaido |
Sappolo Convention Center |
Comparison of learning-condition for voice authentication with self-organizing map Subaru Yoshikawa, Hideharu Ishida, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.) |
Recently, scenes of personal authentication are increasing, so we are evaluating a variety of authentication methods wit... [more] |
|
IA |
2009-09-25 14:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Reconstructing StarBED Physical Configuration for Providing Security and Usability Satoshi Ohta, Toshiyuki Miyachi (NICT), Takeshi Nakagawa (FJH), Satoshi Uda (JAIST), Shinsuke Miwa (NICT), Ken-ichi Chinen, Yoichi Shinoda (JAIST) IA2009-37 |
Experiments on large-scale network testbed based on actual nodes become important for evaluating binary code of software... [more] |
IA2009-37 pp.23-27 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2008-11-18 15:20 |
Fukuoka |
Kitakyushu Science and Research Park |
Development of Side-channel Attack Standard Evaluation BOard and Tool Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54 |
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more] |
RECONF2008-54 pp.87-92 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 14:40 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.) |
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] |
ISEC2008-54 pp.139-146 |
ISEC, LOIS |
2004-11-09 09:50 |
Osaka |
Osaka Univ. |
A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.) |
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] |
ISEC2004-87 OIS2004-54 pp.15-22 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|