Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HCGSYMPO (2nd) |
2011-12-07 - 2011-12-09 |
Kagawa |
Sun Port Hall Takamatsu |
Keystroke Authentication Method with Touch-Screen using Self-Organizing Maps
-- Comparison and Evaluation of Keystroke Rhythm by Number of Six Digits -- Atsuhiro Noguchi (Kanagawa Institute of Technology), Masataka Takahashi, Kazuhiro Notomi (Graduate School of Engineering, Kanagawa Institute of Technology), Keiichi Saito (International University of Health and Welfare) |
In recent years, foreign ATMs authenticate individuals by PIN(Personal Identification Number) of six digits, however, PI... [more] |
|
ICD, IE, SIP, IPSJ-SLDM [detail] |
2011-10-25 10:45 |
Miyagi |
Ichinobo(Sendai) |
A Study on Biometrics Authentication Method Using Features in Utterance Atsushi Sayo, Yoshinobu Kajikawa, Mitsuji Muneyasu (Kansai Univ.) SIP2011-71 ICD2011-74 IE2011-70 |
In this paper, we propose a biometrics authentication method using features in utterance.
The features in utterance con... [more] |
SIP2011-71 ICD2011-74 IE2011-70 pp.55-60 |
IN |
2011-10-21 11:00 |
Osaka |
Osaka University |
Keystroke Authentication Using the Neural Network Kosuke Kimata, Takashi Kobayashi (Kansai Univ.) IN2011-87 |
The keystroke dynamics use time to need it for key input such as time between pushing and releasingthe key as a characte... [more] |
IN2011-87 pp.49-52 |
SIS, IPSJ-AVM |
2011-09-22 10:10 |
Akita |
|
Inprovement of the Block Matching Algorithm for Face Recognition Accross Age Progression
-- Adjustment of the Block Position -- Taro Okakura, Kaoru Arakawa (Meiji Univ.) SIS2011-31 |
Personal authentication using face image is becoming popular nowadaysin various applications. However, if age progressio... [more] |
SIS2011-31 pp.69-74 |
HIP, HCS, MVE, WIT (2nd) |
2009-12-10 - 2009-12-12 |
Hokkaido |
Sappolo Convention Center |
Proposal of personal authentication method using acceleration sensors Ryosuke Nakayama, Hideharu Ishida, Kazuhiro Notomi (KAIT), Keiichi Saito (TDU) |
According to a spread of the Internet, we get used to authentication with ID and password. People will soon need suited ... [more] |
|
NS |
2009-12-11 14:15 |
Ehime |
Ehime University (Ehime) |
A Study on a Personal ID Communication Method using IC Card Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-139 |
We propose the new communication method that uses the personal ID and the contactless IC card in place of the communicat... [more] |
NS2009-139 pp.105-110 |
CQ, NS, ICM (Joint) |
2009-11-12 15:30 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
A Study on a Communication Method using Personal ID in Future Network Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-107 |
We propose a new communication method using the personal ID in place of the existing telephone number and IP address.
T... [more] |
NS2009-107 pp.23-26 |
LOIS, IPSJ-CN |
2009-05-21 15:25 |
Tokyo |
Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg |
Secure Password Authentication Protocol with Key Sharing Function (SPARK) Hirokazu Nogura, Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (T-SS), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-3 |
Various information are sent on public networks.Cryptosystems are necessary for protect these information.Existing key s... [more] |
LOIS2009-3 pp.67-72 |
IA, SITE |
2009-03-05 16:20 |
Kumamoto |
|
A Proposal of Distributed Authentication Platform and Public Identifiers
-- On Appropriateness of Web Traversal Anonymous Authentication using OpenID -- Aya Okashita (NEC) SITE2008-53 IA2008-76 |
In many virtual worlds on the Web, the account registration by anonymity is done without doing the personal identificati... [more] |
SITE2008-53 IA2008-76 pp.55-60 |
SIS |
2009-03-06 14:25 |
Tokyo |
|
A Method for Personal Authentication from Face Image with Age Difference Using Partial Matching Tomo Nakai, Kaoru Arakawa (Meiji Univ.) |
Recently, the research on the personal authentication using face image is popular, but that for the face images which ch... [more] |
SIS2008-87 pp.85-89 |
ICM, LOIS (Joint) |
2009-01-23 10:15 |
Yamaguchi |
Kaikyo Messe Shimonoseki |
A One-Time Password Authentication Scheme Resistant to DoS Attacks Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (Trinity Security Systems, Inc.), Akihiro Shimizu (Kochi Univ. of Tech.) OIS2008-74 |
Various information are sent on the Internet. User authentication is necessary to protect these informa-
tion from atta... [more] |
OIS2008-74 pp.51-56 |
MoNA, IPSJ-MBL |
2008-05-22 08:35 |
Okinawa |
Okinawa-seinen-kaikan |
Basic Design of A User-driven Service Creation Platform Assisted by Cellular Systems Kiyohide Nakauchi, Ved P. Kafle, Masugi Inoue (NICT), Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs) MoMuC2008-1 |
In spite of recent advances of personal communication devices and access network technology, users are still facing the ... [more] |
MoMuC2008-1 pp.1-6 |
MoNA, IPSJ-MBL |
2008-05-22 09:00 |
Okinawa |
Okinawa-seinen-kaikan |
An Authentication Method for a User-driven Service Creation Platform Assisted by Cellular Systems Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs.), Kiyohide Nakauchi, Ved P. Kafle, Masugi Inoue (NICT) MoMuC2008-2 |
Devices and access systems which they are connected are becoming diverse. Under such circumstances, a mechanism is requi... [more] |
MoMuC2008-2 pp.7-12 |
PRMU |
2008-02-21 13:15 |
Ibaraki |
Univ. of Tsukuba |
Personal Authentication by Handwritten Characters Using Sequential Neural Network Hideaki Matsumoto, Michio Umeda (Osaka Electro-Communication Univ.) PRMU2007-222 |
This paper proposes a personal authentication method
by writer verification using a sequential neural network
which ... [more] |
PRMU2007-222 pp.49-54 |
PRMU |
2007-12-14 10:30 |
Hyogo |
Kobe Univ. |
Individual certification using the tracks extraction by the fingertip tracking. Takayuki Sakita, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) PRMU2007-146 |
Recently, biometrics such as a fingerprint or vein certification has been spreading but much biometrics uses the special... [more] |
PRMU2007-146 pp.59-64 |
ISEC, LOIS |
2007-11-21 16:40 |
Hyogo |
Kobe University |
A study on implementation of mobile-phone with speaker verification function Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ) ISEC2007-96 OIS2007-68 |
In this paper we propose a speaker verification method based on CELP (Code Excited Linear Prediction) speech coding sche... [more] |
ISEC2007-96 OIS2007-68 pp.51-56 |
ISEC, LOIS |
2007-11-21 17:05 |
Hyogo |
Kobe University |
Template Protection using Biometric Encryption for CELP Speaker Verification Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-97 OIS2007-69 |
As the application of biometric authentication technique has been advanced, countermeasures against threat, that the tem... [more] |
ISEC2007-97 OIS2007-69 pp.57-62 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 15:20 |
Hokkaido |
Future University-Hakodate |
Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2007-65 |
In the bidirectional broadcasting service via networks, provider authentication is necessary for secure transmission of ... [more] |
ISEC2007-65 pp.133-139 |
NS |
2007-05-18 10:20 |
Osaka |
Osaka Univ. |
Management Method of Terminal Capability on Personal Area Network System Shozo Fujino, Gen Motoyoshi, Hisaya Wakayama (NEC) NS2007-26 |
Authors have been proposing services where a mobile network accommodates Personal Area Networks (PANs), which consist of... [more] |
NS2007-26 pp.63-66 |
NS, IN (Joint) |
2007-03-09 15:20 |
Okinawa |
Okinawa Convention Center |
Access Limited Encrypted Communication System based on Personal Authentication Kosuke Matsubara (Shinshu Univ.), Hiroaki Nose, Takashi Nishida (Nagano Industrial Technology Center), Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.) NS2006-201 |
A firewall is widely used to protect a intranet against attacks form outside. But, intranet have some problems such as s... [more] |
NS2006-201 pp.223-226 |