IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 26 of 26 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
OCS, CS
(Joint)
2011-01-27
15:40
Tokushima The University of Tokushima Experimental evaluation as the random cipher of the Yuen-2000 (Y-00) protocol
Fumio Futami, Osamu Hirota (Tamagawa Univ.) OCS2010-105
The personal information and proprietary information in various network applications are transmitted in the current netw... [more] OCS2010-105
pp.37-42
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Comparison of learning-condition for voice authentication with self-organizing map
Subaru Yoshikawa, Hideharu Ishida, Kazuhiro Notomi (Kanagawa Institute of Technology), Keiichi Saito (Tokyo Denki Univ.)
Recently, scenes of personal authentication are increasing, so we are evaluating a variety of authentication methods wit... [more]
IA 2009-09-25
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. Reconstructing StarBED Physical Configuration for Providing Security and Usability
Satoshi Ohta, Toshiyuki Miyachi (NICT), Takeshi Nakagawa (FJH), Satoshi Uda (JAIST), Shinsuke Miwa (NICT), Ken-ichi Chinen, Yoichi Shinoda (JAIST) IA2009-37
Experiments on large-scale network testbed based on actual nodes become important for evaluating binary code of software... [more] IA2009-37
pp.23-27
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2008-11-18
15:20
Fukuoka Kitakyushu Science and Research Park Development of Side-channel Attack Standard Evaluation BOard and Tool
Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more]
RECONF2008-54
pp.87-92
ISEC, SITE, IPSJ-CSEC 2008-07-25
14:40
Fukuoka Fukuoka Institute of System LSI Design Industry A Methodology for Evaluating Each Measure in the Integrated Evaluation of the Security Measures in a System
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai (Kyushu Univ.)
For covering various requirements for the evaluations of security measures for a system with good coordination among the... [more] ISEC2008-54
pp.139-146
ISEC, LOIS 2004-11-09
09:50
Osaka Osaka Univ. A Formal Method for finding the Lowest Cost Attack on Cryptographic Protocols
Takane Umayama, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
Various cryptographic protocols are proposed for providing secure services on computer network. Some cryptographic proto... [more] ISEC2004-87 OIS2004-54
pp.15-22
 Results 21 - 26 of 26 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan