IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 73 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HCGSYMPO
(2nd)
2011-12-07
- 2011-12-09
Kagawa Sun Port Hall Takamatsu Keystroke Authentication Method with Touch-Screen using Self-Organizing Maps -- Comparison and Evaluation of Keystroke Rhythm by Number of Six Digits --
Atsuhiro Noguchi (Kanagawa Institute of Technology), Masataka Takahashi, Kazuhiro Notomi (Graduate School of Engineering, Kanagawa Institute of Technology), Keiichi Saito (International University of Health and Welfare)
In recent years, foreign ATMs authenticate individuals by PIN(Personal Identification Number) of six digits, however, PI... [more]
ICD, IE, SIP, IPSJ-SLDM [detail] 2011-10-25
10:45
Miyagi Ichinobo(Sendai) A Study on Biometrics Authentication Method Using Features in Utterance
Atsushi Sayo, Yoshinobu Kajikawa, Mitsuji Muneyasu (Kansai Univ.) SIP2011-71 ICD2011-74 IE2011-70
In this paper, we propose a biometrics authentication method using features in utterance.
The features in utterance con... [more]
SIP2011-71 ICD2011-74 IE2011-70
pp.55-60
IN 2011-10-21
11:00
Osaka Osaka University Keystroke Authentication Using the Neural Network
Kosuke Kimata, Takashi Kobayashi (Kansai Univ.) IN2011-87
The keystroke dynamics use time to need it for key input such as time between pushing and releasingthe key as a characte... [more] IN2011-87
pp.49-52
SIS, IPSJ-AVM 2011-09-22
10:10
Akita   Inprovement of the Block Matching Algorithm for Face Recognition Accross Age Progression -- Adjustment of the Block Position --
Taro Okakura, Kaoru Arakawa (Meiji Univ.) SIS2011-31
Personal authentication using face image is becoming popular nowadaysin various applications. However, if age progressio... [more] SIS2011-31
pp.69-74
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Proposal of personal authentication method using acceleration sensors
Ryosuke Nakayama, Hideharu Ishida, Kazuhiro Notomi (KAIT), Keiichi Saito (TDU)
According to a spread of the Internet, we get used to authentication with ID and password. People will soon need suited ... [more]
NS 2009-12-11
14:15
Ehime Ehime University (Ehime) A Study on a Personal ID Communication Method using IC Card
Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-139
We propose the new communication method that uses the personal ID and the contactless IC card in place of the communicat... [more] NS2009-139
pp.105-110
CQ, NS, ICM
(Joint)
2009-11-12
15:30
Ishikawa Kanazawa Institute of Technology (Ishikawa) A Study on a Communication Method using Personal ID in Future Network
Hiroshi Takekoshi, Takeshi Ogawa, Junichi Akahani (NTT Corp.) NS2009-107
We propose a new communication method using the personal ID in place of the existing telephone number and IP address.
T... [more]
NS2009-107
pp.23-26
LOIS, IPSJ-CN 2009-05-21
15:25
Tokyo Waseda Univ. Faculty of Science and Engineering,OkuboCamp. 55N Bldg Secure Password Authentication Protocol with Key Sharing Function (SPARK)
Hirokazu Nogura, Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (T-SS), Akihiro Shimizu (Kochi Univ. of Tech.) LOIS2009-3
Various information are sent on public networks.Cryptosystems are necessary for protect these information.Existing key s... [more] LOIS2009-3
pp.67-72
IA, SITE 2009-03-05
16:20
Kumamoto   A Proposal of Distributed Authentication Platform and Public Identifiers -- On Appropriateness of Web Traversal Anonymous Authentication using OpenID --
Aya Okashita (NEC) SITE2008-53 IA2008-76
In many virtual worlds on the Web, the account registration by anonymity is done without doing the personal identificati... [more] SITE2008-53 IA2008-76
pp.55-60
SIS 2009-03-06
14:25
Tokyo   A Method for Personal Authentication from Face Image with Age Difference Using Partial Matching
Tomo Nakai, Kaoru Arakawa (Meiji Univ.)
Recently, the research on the personal authentication using face image is popular, but that for the face images which ch... [more] SIS2008-87
pp.85-89
ICM, LOIS
(Joint)
2009-01-23
10:15
Yamaguchi Kaikyo Messe Shimonoseki A One-Time Password Authentication Scheme Resistant to DoS Attacks
Yu Nakayama (Kochi Univ. of Tech.), Takasuke Tsuji (Trinity Security Systems, Inc.), Akihiro Shimizu (Kochi Univ. of Tech.) OIS2008-74
Various information are sent on the Internet. User authentication is necessary to protect these informa-
tion from atta... [more]
OIS2008-74
pp.51-56
MoNA, IPSJ-MBL 2008-05-22
08:35
Okinawa Okinawa-seinen-kaikan Basic Design of A User-driven Service Creation Platform Assisted by Cellular Systems
Kiyohide Nakauchi, Ved P. Kafle, Masugi Inoue (NICT), Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs) MoMuC2008-1
In spite of recent advances of personal communication devices and access network technology, users are still facing the ... [more] MoMuC2008-1
pp.1-6
MoNA, IPSJ-MBL 2008-05-22
09:00
Okinawa Okinawa-seinen-kaikan An Authentication Method for a User-driven Service Creation Platform Assisted by Cellular Systems
Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs.), Kiyohide Nakauchi, Ved P. Kafle, Masugi Inoue (NICT) MoMuC2008-2
Devices and access systems which they are connected are becoming diverse. Under such circumstances, a mechanism is requi... [more] MoMuC2008-2
pp.7-12
PRMU 2008-02-21
13:15
Ibaraki Univ. of Tsukuba Personal Authentication by Handwritten Characters Using Sequential Neural Network
Hideaki Matsumoto, Michio Umeda (Osaka Electro-Communication Univ.) PRMU2007-222
This paper proposes a personal authentication method
by writer verification using a sequential neural network
which ... [more]
PRMU2007-222
pp.49-54
PRMU 2007-12-14
10:30
Hyogo Kobe Univ. Individual certification using the tracks extraction by the fingertip tracking.
Takayuki Sakita, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) PRMU2007-146
Recently, biometrics such as a fingerprint or vein certification has been spreading but much biometrics uses the special... [more] PRMU2007-146
pp.59-64
ISEC, LOIS 2007-11-21
16:40
Hyogo Kobe University A study on implementation of mobile-phone with speaker verification function
Yutaka Hamano, Masatsugu Ichino (Waseda Univ), Yasushi Yamazaki (The University of Kitakyushu), Kazuhiro Tsurumaru, Naohisa Komatsu (Waseda Univ) ISEC2007-96 OIS2007-68
In this paper we propose a speaker verification method based on CELP (Code Excited Linear Prediction) speech coding sche... [more] ISEC2007-96 OIS2007-68
pp.51-56
ISEC, LOIS 2007-11-21
17:05
Hyogo Kobe University Template Protection using Biometric Encryption for CELP Speaker Verification
Shinya Takayama, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (The Univ. of Kitakyushu), Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) ISEC2007-97 OIS2007-69
As the application of biometric authentication technique has been advanced, countermeasures against threat, that the tem... [more] ISEC2007-97 OIS2007-69
pp.57-62
ISEC, SITE, IPSJ-CSEC 2007-07-20
15:20
Hokkaido Future University-Hakodate Efficient Strong Key-Insulated Signature Scheme for Bidirectional Broadcasting Service
Go Ohtake (NHK), Goichiro Hanaoka (AIST), Kazuto Ogawa (NHK) ISEC2007-65
In the bidirectional broadcasting service via networks, provider authentication is necessary for secure transmission of ... [more] ISEC2007-65
pp.133-139
NS 2007-05-18
10:20
Osaka Osaka Univ. Management Method of Terminal Capability on Personal Area Network System
Shozo Fujino, Gen Motoyoshi, Hisaya Wakayama (NEC) NS2007-26
Authors have been proposing services where a mobile network accommodates Personal Area Networks (PANs), which consist of... [more] NS2007-26
pp.63-66
NS, IN
(Joint)
2007-03-09
15:20
Okinawa Okinawa Convention Center Access Limited Encrypted Communication System based on Personal Authentication
Kosuke Matsubara (Shinshu Univ.), Hiroaki Nose, Takashi Nishida (Nagano Industrial Technology Center), Masaaki Niimura, Yasushi Fuwa (Shinshu Univ.) NS2006-201
A firewall is widely used to protect a intranet against attacks form outside. But, intranet have some problems such as s... [more] NS2006-201
pp.223-226
 Results 41 - 60 of 73 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan