Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NC, MBE |
2015-03-17 15:00 |
Tokyo |
Tamagawa University |
Advanced Mobile Security System Operated by Electromyography Signals Kalanyu Zintus-art, Natsue Yoshimura, Duk Shin, Hiroyuki Kambara, Yasuharu Koike (TiTech) MBE2014-177 NC2014-128 |
This article describes a novel approach to biometric-based mobile security systems: a myokinetic password using surface ... [more] |
MBE2014-177 NC2014-128 pp.343-349 |
ICSS |
2014-11-28 10:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Detecting Backscatter of DDoS Attacks from Darknet Traffic Nobuaki Furutani (Kobe Univ), Tao Ban, Junji Nakazato (NICT), Jumpei Shimamura (clwit), Jun Kitazono, Seiichi Ozawa (Kobe Univ) ICSS2014-59 |
In this work, we propose a method to quickly discriminate DDoS backscatter packets from those of other traffic observed ... [more] |
ICSS2014-59 pp.49-53 |
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM (Joint) [detail] |
2014-11-27 16:00 |
Oita |
B-ConPlaza |
Integrated-Circuit Countermeasures Against Side-Channel Information Leakage Noriyuki Miura, Daisuke Fujimoto, Makoto Nagata (Kobe University) CPM2014-124 ICD2014-67 |
This paper describes integrated-circuit countermeasures against information leakage from cryptographic processor ICs thr... [more] |
CPM2014-124 ICD2014-67 pp.9-14 |
SC, IPSJ-CLE |
2014-10-25 15:10 |
Miyagi |
Tohoku Univ. |
Considering Architecture for Managing House Log in Cloud-Based Home Network System Junho Lee, Satoshi Takatori, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura (Kobe Univ.) SC2014-13 |
We have been developing a novel home network system, called Cloud-HNS, which manages home servers and all the services w... [more] |
SC2014-13 pp.55-60 |
MBE, BioX |
2014-09-12 17:00 |
Nagano |
Shinshu University |
[Poster Presentation]
Performance Assessment by Combined Input Data Method on Flick Input Authentication in Japanese Shinichi Maeda, Masayuki Izumi, Toshiharu Samura (ANCT), Haruhiko Nishimura (Univ. of Hyogo) BioX2014-24 MBE2014-47 |
Recently, smartphones themselves are starting to have value equivalent to that of personal identification and personal p... [more] |
BioX2014-24 MBE2014-47 pp.71-75 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:10 |
Hokkaido |
San-Refure Hakodate |
Forward-Secure Sequential Aggregate Message Authentication Revisited Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 |
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more] |
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 pp.163-170 |
RCS, AP (Joint) |
2013-11-21 13:30 |
Shimane |
Matsue Terrsa |
[Invited Lecture]
Using Multiple-antenna System for Sensor Application Naoki Honma, Keita Konno (Iwate Univ.), Kentaro Nishimori (Niigata Univ.), Nobuyasu Takemura, Tsutomu Mitsui (SAMSUNG R&D INSTITUTE JAPAN), Hiroaki Sato, Yoshitaka Tsunekawa (Iwate Univ.) AP2013-111 RCS2013-189 |
This report explains the microwave sensor using a multiple-antenna system. First, the security sensor using MIMO (Multip... [more] |
AP2013-111 RCS2013-189 pp.67-72(AP), pp.91-96(RCS) |
BioX (2nd) |
2013-08-27 13:00 |
Osaka |
The Institute of Scientific and Industrial Research, Osaka Univ. |
Keystroke Biometrics with Sensor Information on Smartphone Toshiharu Samura, Masayuki Izumi (ANCT), Haruhiko Nishimura (Univ. Hyogo) |
Today smartphones are becoming widely used as multipurpose devices. If smartphone was stolen, the risks of leaking perso... [more] |
|
IN, NS, CS (Joint) |
2012-09-21 09:10 |
Miyagi |
Tohoku Univ. Research Institute of Electrical Communication 2gokan |
Honeycomb-type Barrier Coverage Method for Border Security Systems with Wireless Sensor Network Hiroaki Koyamashita, Takuya Suzuki, Manato Fujimoto, Tomotaka Wada (Kansai Univ.), Kouichi Mutsuura (Shinshu Univ.), Hiromi Okada (Kansai Univ.) IN2012-64 |
Recently,the problem is that many intruders cross the border between America and Mexico. Intruders try to cross the dese... [more] |
IN2012-64 pp.75-80 |
NS, IN (Joint) |
2012-03-09 15:20 |
Miyazaki |
Miyazaki Seagia |
Expanding Darknet Space with Virtual Sensors Kazuhiro Tobe, Shigeki Goto (Waseda Univ.) IN2011-189 |
Only anomalous traffic can be monitored in a network consisting of assigned but unused IP addresses (darknet). Although ... [more] |
IN2011-189 pp.311-316 |
OPE, OFT |
2012-03-02 09:05 |
Tokyo |
|
Optical fiber vibration sensor and application Tatsuya Kumagai, Shinobu Sato, Shinji Komatsuzaki, Teruyuki Nakamura (Hitachi Cable) OFT2011-72 OPE2011-198 |
Fiber-optic gyroscope (FOG), rotation sensor, and fiber-optic distributed temperature sensor (DTS) have been developed a... [more] |
OFT2011-72 OPE2011-198 pp.1-6 |
AP |
2011-06-16 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Array Configuration Evalution of MIMO Sensor for Indoor Intrusion Detection Kei Tanaka, Hiroyoshi Yamada, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) AP2011-22 |
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention. Since... [more] |
AP2011-22 pp.7-12 |
RCS |
2011-04-21 15:00 |
Kanagawa |
Keio University |
[Requested Talk] On Performance Evaluation of Multi-antenna Sensor System Hiroyoshi Yamada, Yuta Kurosaki, Kentaro Nishimori, Yoshio Yamaguchi (Niigata Univ.) RCS2011-8 |
Recently, researches on radio wave security sensors by using array antenna or MIMO have been attracting attention. Since... [more] |
RCS2011-8 pp.41-46 |
IN, NS (Joint) |
2011-03-03 10:00 |
Okinawa |
Okinawa Convention Center |
Barrier Coverage Construction for Border Security Systems in Wireless Sensor Network Hayato Ozaki, Koji Yamamoto, Takuya Suzuki, Tomotaka Wada (Kansai Univ.), Kouichi Mutsuura (Shinshu Univ.), Hiromi Okada (Kansai Univ.) IN2010-148 |
In this paper, we propose a barrier coverage construction method by switching dynamically operation modes of sensor node... [more] |
IN2010-148 pp.25-30 |
ICSS |
2010-11-05 10:55 |
Hiroshima |
Hiroshima City University |
An Efficient Group Key Distribution Protocol in Wireless Sensor Networks Yuudai Miyoshi, Masakazu Soshi (Hiroshima City Univ.) ICSS2010-45 |
This paper discusses the probrem of an efficient group key distribution
protocol for wireless sensor networks,which is ... [more] |
ICSS2010-45 pp.7-10 |
PRMU, HIP |
2010-03-15 09:25 |
Kagoshima |
Kagoshima Univ. |
The non-contacting security key entry system using the form of a hand Seiya Watanabe, Masayuki Kashima, Kiminori Sato, Mutsumi Watanabe (Kagoshima Univ.) PRMU2009-236 HIP2009-121 |
Four columns of numbers utilized as code numbers are used in lots of bank ATM now. On the other hand, card forgery and t... [more] |
PRMU2009-236 HIP2009-121 pp.19-24 |
NS, IN (Joint) |
2010-03-05 13:20 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
An Encrypted Communication Scheme using GDH.3 for Wireless Sensor Networks Hiroki Sampe, Toyofumi Takenaka (Nihon Univ.) NS2009-243 |
The wireless sensor networks have attracted great attention recent years.
However, secure communications in the wirele... [more] |
NS2009-243 pp.457-460 |
SITE, IPSJ-CE |
2009-12-11 15:45 |
Hiroshima |
Hiroshima Univ. |
Anonymity as Privacy in Public Space
-- Is ethical surveillance possible? -- Takushi Otani (KIBI International Univ.) SITE2009-40 |
Anonymity as Privacy in Public Space:
Is Ethical Surveillance Possible?
Abstract The costs of sensors and of access... [more] |
SITE2009-40 pp.49-54 |
CQ, NS, ICM (Joint) |
2009-11-12 17:30 |
Ishikawa |
Kanazawa Institute of Technology (Ishikawa) |
[Special Talk]
Application of IT in the field of nursing and medical service
-- Based on the result of the research project of past five years -- Hiroshi Nagase (Kanazawa Inst. of Tech.) NS2009-111 CQ2009-47 ICM2009-28 |
For the past 5 years, our laboratory engaged in research projects about introduction of IT technology to nursing and med... [more] |
NS2009-111 CQ2009-47 ICM2009-28 pp.45-48(NS), pp.51-54(CQ), pp.13-16(ICM) |
SR, AN, USN (Joint) |
2009-10-23 11:50 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
Hot Research Topics and Attempts for Practical Applications on Ad Hoc Networks Nei Kato (Tohoku Univ.) SR2009-65 AN2009-35 USN2009-38 |
Ad hoc networks area has been extremely active during recent years. In this presentation, an overview of ad hoc networks... [more] |
SR2009-65 AN2009-35 USN2009-38 pp.95-102(SR), pp.87-94(AN), pp.69-76(USN) |