Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICTSSL |
2017-07-14 10:50 |
Kagawa |
Kagawa Univ. |
A Proposal for Disaster Adult Victims Care by Portable Emergency Call Service
-- Provision to the Designated Temporary Housing System in Mashiki Town at 2016 Kumamoto Earthquake -- Yasuhiro Komatsubara (SECOM) ICTSSL2017-26 |
The designated temporary housings were provided in the Great East Japan Earthquake. The temporary housing system is priv... [more] |
ICTSSL2017-26 pp.51-54 |
VLD |
2014-03-03 16:25 |
Okinawa |
Okinawa Seinen Kaikan |
Secure scan design using improved random order scans and its evaluations Masaru Oya, Yuta Atobe, Youhua Shi, Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) VLD2013-141 |
Scan test using scan chains is one of the most important DFT techniques.
On the other hand, scan-based attacks are repo... [more] |
VLD2013-141 pp.43-48 |
RECONF |
2011-05-12 15:50 |
Hokkaido |
Hokkaido Univ. (Faculty of Eng., B3 Bldg.) |
A Virus Scanning Engine Using a 4IGU Emulator and an MPU Hiroki Nakahara, Tsutomu Sasao, Munehiro Matsuura (KIT) RECONF2011-10 |
This paper shows a virus scanning system using two-stage matching.
In the first stage, a hardware filter quickly detect... [more] |
RECONF2011-10 pp.55-60 |
VLD |
2011-03-03 10:20 |
Okinawa |
Okinawaken-Danjo-Kyodo-Sankaku Center |
Implementation and Security Evaluation of DPA-Resistant DES Circuit utilizing Domino-RSL technique Katsuhiko Iwai, Kenji Kojima, Mitsuru Shiozaki, Syunsuke Asagawa, Takeshi Fujino (Ritsumeikan Univ.) VLD2010-126 |
Some secure DPA-resistant techniques to protect from Side-Channel Attack such as Differential Power Analysis (DPA) have ... [more] |
VLD2010-126 pp.57-62 |
DC |
2009-02-16 16:10 |
Tokyo |
|
A Secure Scan Design Approach using Extended de Bruijn Graph Hideo Fujiwara, Marie Engelene J. Obien (NAIST) DC2008-78 |
Scan design makes digital circuits easily testable, however, it can also be exploited to be used for hacking the chip. T... [more] |
DC2008-78 pp.61-66 |
IN |
2007-07-19 15:35 |
Hyogo |
Kobe University |
Optimum Parameter Setting in Identifying and Quarantining Worm-Infected Hosts Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada (NTT) IN2007-29 |
Abusive traffic caused by worm is a serious problem in the Internet because it consumes a large portion of network resou... [more] |
IN2007-29 pp.13-18 |
IA |
2006-07-20 10:30 |
Kanagawa |
Kanagawa University (Minatomirai, KU Port-Square) |
[Invited Talk]
Measuring Biometric System's Power to Reject Fake Objects Tsutomu Matsumoto (Yokohama National Univ.) IA2006-11 |
(To be available after the conference date) [more] |
IA2006-11 pp.1-6 |
ISEC |
2005-12-16 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Effectiveness of Clock Control in a Clock-Controlled Stream Cipher Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs), Kouichi Sakurai (Kyushu Univ.) |
In this paper, we examine effectiveness for clock control in stream ciphers with the aim of protecting against distingui... [more] |
ISEC2005-112 pp.11-16 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 17:50 |
Iwate |
Iwate Prefectural University |
A Case Study of Gordon-Loeb Model on Optimal Security Investiments Kimio Kuramitsu (Yokohama National Univ.) |
Gordon and Loeb (2002) presented an economic model of characterizing an optimal investment in information security. The ... [more] |
ISEC2005-42 SITE2005-40 pp.243-248 |