IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 60 of 67 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NC, MBE 2015-03-17
15:00
Tokyo Tamagawa University Advanced Mobile Security System Operated by Electromyography Signals
Kalanyu Zintus-art, Natsue Yoshimura, Duk Shin, Hiroyuki Kambara, Yasuharu Koike (TiTech) MBE2014-177 NC2014-128
This article describes a novel approach to biometric-based mobile security systems: a myokinetic password using surface ... [more] MBE2014-177 NC2014-128
pp.343-349
ICSS 2014-11-28
10:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Detecting Backscatter of DDoS Attacks from Darknet Traffic
Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] ICSS2014-59
pp.49-53
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2014-11-27
16:00
Oita B-ConPlaza Integrated-Circuit Countermeasures Against Side-Channel Information Leakage
Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata (Kobe University) CPM2014-124 ICD2014-67
This paper describes integrated-circuit countermeasures against information leakage from cryptographic processor ICs thr... [more] CPM2014-124 ICD2014-67
pp.9-14
SC, IPSJ-CLE 2014-10-25
15:10
Miyagi Tohoku Univ. Considering Architecture for Managing House Log in Cloud-Based Home Network System
Junho Lee, Satoshi Takatori, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) SC2014-13
We have been developing a novel home network system, called Cloud-HNS, which manages home servers and all the services w... [more] SC2014-13
pp.55-60
MBE, BioX 2014-09-12
17:00
Nagano Shinshu University [Poster Presentation] Performance Assessment by Combined Input Data Method on Flick Input Authentication in Japanese
Shinichi Maeda, Masayuki Izumi, Toshiharu Samura (ANCT), Haruhiko Nishimura (Univ. of Hyogo) BioX2014-24 MBE2014-47
Recently, smartphones themselves are starting to have value equivalent to that of personal identification and personal p... [more] BioX2014-24 MBE2014-47
pp.71-75
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:10
Hokkaido San-Refure Hakodate Forward-Secure Sequential Aggregate Message Authentication Revisited
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more]
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26
pp.163-170
RCS, AP
(Joint)
2013-11-21
13:30
Shimane Matsue Terrsa [Invited Lecture] Using Multiple-antenna System for Sensor Application
Naoki Honma, Keita Konno (Iwate Univ.), Kentaro Nishimori (Niigata Univ.), Nobuyasu Takemura, Tsutomu Mitsui (SAMSUNG R&D INSTITUTE JAPAN), Hiroaki Sato, Yoshitaka Tsunekawa (Iwate Univ.) AP2013-111 RCS2013-189
This report explains the microwave sensor using a multiple-antenna system. First, the security sensor using MIMO (Multip... [more] AP2013-111 RCS2013-189
pp.67-72(AP), pp.91-96(RCS)
BioX
(2nd)
2013-08-27
13:00
Osaka The Institute of Scientific and Industrial Research, Osaka Univ. Keystroke Biometrics with Sensor Information on Smartphone
Toshiharu Samura, Masayuki Izumi (ANCT), Haruhiko Nishimura (Univ. Hyogo)
Today smartphones are becoming widely used as multipurpose devices. If smartphone was stolen, the risks of leaking perso... [more]
IN, NS, CS
(Joint)
2012-09-21
09:10
Miyagi Tohoku Univ. Research Institute of Electrical Communication 2gokan Honeycomb-type Barrier Coverage Method for Border Security Systems with Wireless Sensor Network
Hiroaki Koyamashita, Takuya Suzuki, Manato Fujimoto, Tomotaka Wada (Kansai Univ.), Kouichi Mutsuura (Shinshu Univ.), Hiromi Okada (Kansai Univ.) IN2012-64
Recently,the problem is that many intruders cross the border between America and Mexico. Intruders try to cross the dese... [more] IN2012-64
pp.75-80
NS, IN
(Joint)
2012-03-09
15:20
Miyazaki Miyazaki Seagia Expanding Darknet Space with Virtual Sensors
Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] IN2011-189
pp.311-316
OPE, OFT 2012-03-02
09:05
Tokyo   Optical fiber vibration sensor and application
Tatsuya Kumagai, Shinobu Sato, Shinji Komatsuzaki, Teruyuki Nakamura (Hitachi Cable) OFT2011-72 OPE2011-198
Fiber-optic gyroscope (FOG), rotation sensor, and fiber-optic distributed temperature sensor (DTS) have been developed a... [more] OFT2011-72 OPE2011-198
pp.1-6
AP 2011-06-16
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Array Configuration Evalution of MIMO Sensor for Indoor Intrusion Detection
Kei Tanaka, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2011-22
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention. Since... [more] AP2011-22
pp.7-12
RCS 2011-04-21
15:00
Kanagawa Keio University [Requested Talk] On Performance Evaluation of Multi-antenna Sensor System
Hiroyoshi Yamada, Yuta Kurosaki, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) RCS2011-8
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention. Since... [more] RCS2011-8
pp.41-46
IN, NS
(Joint)
2011-03-03
10:00
Okinawa Okinawa Convention Center Barrier Coverage Construction for Border Security Systems in Wireless Sensor Network
Hayato Ozaki, Koji Yamamoto, Takuya Suzuki, Tomotaka Wada (Kansai Univ.), Kouichi Mutsuura (Shinshu Univ.), Hiromi Okada (Kansai Univ.) IN2010-148
In this paper, we propose a barrier coverage construction method by switching dynamically operation modes of sensor node... [more] IN2010-148
pp.25-30
ICSS 2010-11-05
10:55
Hiroshima Hiroshima City University An Efficient Group Key Distribution Protocol in Wireless Sensor Networks
Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.) ICSS2010-45
This paper discusses the probrem of an efficient group key distribution
protocol for wireless sensor networks,which is ... [more]
ICSS2010-45
pp.7-10
PRMU, HIP 2010-03-15
09:25
Kagoshima Kagoshima Univ. The non-contacting security key entry system using the form of a hand
Seiya Watanabe, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) PRMU2009-236 HIP2009-121
Four columns of numbers utilized as code numbers are used in lots of bank ATM now. On the other hand, card forgery and t... [more] PRMU2009-236 HIP2009-121
pp.19-24
NS, IN
(Joint)
2010-03-05
13:20
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) An Encrypted Communication Scheme using GDH.3 for Wireless Sensor Networks
Hiroki Sampe, Toyofumi Takenaka (Nihon Univ.) NS2009-243
The wireless sensor networks have attracted great attention recent years.
However, secure communications in the wirele... [more]
NS2009-243
pp.457-460
SITE, IPSJ-CE 2009-12-11
15:45
Hiroshima Hiroshima Univ. Anonymity as Privacy in Public Space -- Is ethical surveillance possible? --
Takushi Otani (KIBI International Univ.) SITE2009-40
Anonymity as Privacy in Public Space:
Is Ethical Surveillance Possible?

Abstract The costs of sensors and of access... [more]
SITE2009-40
pp.49-54
CQ, NS, ICM
(Joint)
2009-11-12
17:30
Ishikawa Kanazawa Institute of Technology (Ishikawa) [Special Talk] Application of IT in the field of nursing and medical service -- Based on the result of the research project of past five years --
Hiroshi Nagase (Kanazawa Inst. of Tech.) NS2009-111 CQ2009-47 ICM2009-28
For the past 5 years, our laboratory engaged in research projects about introduction of IT technology to nursing and med... [more] NS2009-111 CQ2009-47 ICM2009-28
pp.45-48(NS), pp.51-54(CQ), pp.13-16(ICM)
SR, AN, USN
(Joint)
2009-10-23
11:50
Miyagi Tohoku Univ. [Invited Talk] Hot Research Topics and Attempts for Practical Applications on Ad Hoc Networks
Nei Kato (Tohoku Univ.) SR2009-65 AN2009-35 USN2009-38
Ad hoc networks area has been extremely active during recent years. In this presentation, an overview of ad hoc networks... [more] SR2009-65 AN2009-35 USN2009-38
pp.95-102(SR), pp.87-94(AN), pp.69-76(USN)
 Results 41 - 60 of 67 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan