IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 80 of 1026 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, VLD 2023-03-03
13:25
Okinawa
(Primary: On-site, Secondary: Online)
High-Performance and Programmer-Friendly Secure Non-Volatile Memory using Temporal Memory-Access Redirection
Ryo Koike, Shinya Takamaeda (UTokyo) VLD2022-106 HWS2022-77
Byte-addressable non-volatile memory (NVM) has two challenges, performance degradation due to high-latency integrity tre... [more] VLD2022-106 HWS2022-77
pp.179-184
HWS, VLD 2023-03-04
10:25
Okinawa
(Primary: On-site, Secondary: Online)
Fundamental study of distance spoofing attack against dToF lidar with interference mitigation function
Midori Tomijima, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2022-116 HWS2022-87
In order to avoid interference with the spread of LiDAR, a simple mitigation method that changes the irradiation interva... [more] VLD2022-116 HWS2022-87
pp.239-244
HWS, VLD 2023-03-04
13:30
Okinawa
(Primary: On-site, Secondary: Online)
Threat of EM Information Leakage from Speakerphones Due to IEMI and Suppression Indexes for EMC Countermeasures
Seiya Takano, Yuichi Hayashi (NAIST) VLD2022-120 HWS2022-91
Threats of causing forced electromagnetic information leakage by irradiating devices with electromagnetic waves have bee... [more] VLD2022-120 HWS2022-91
pp.261-266
HWS, VLD 2023-03-04
13:55
Okinawa
(Primary: On-site, Secondary: Online)
*
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Nagata Makoto (Kobe Univ.) VLD2022-121 HWS2022-92
With the development of IoT, security is becoming increasingly important. Confidential information and other information... [more] VLD2022-121 HWS2022-92
pp.267-272
IE, ITS, ITE-MMS, ITE-ME, ITE-AIT [detail] 2023-02-22
10:15
Hokkaido Hokkaido Univ. Generation Method of Targeted Adversarial Examples using Gradient Information for the Target Class of the Image
Ryo Kumagai, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) ITS2022-61 IE2022-78
With the advancement of AI technology, the vulnerability of AI system is pointed out. The adversarial examples (AE), whi... [more] ITS2022-61 IE2022-78
pp.107-111
NS, NWS
(Joint)
2023-01-26
13:00
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] NS2022-153
pp.19-24
MSS, SS 2023-01-11
10:00
Osaka
(Primary: On-site, Secondary: Online)
Prohibited Items Detection in X-ray Security Inspection by Using a Deep Learning Method
Qingqi Zhang (Yamaguchi Univ.), Ren Wu (Yamaguchi Junior College), Mitsuru Nakata, Qi-Wei Ge (Yamaguchi Univ.) MSS2022-52 SS2022-37
Security screening machines using X-ray scanners are usually used to find out whether there are prohibited items in pack... [more] MSS2022-52 SS2022-37
pp.42-47
CPSY, IPSJ-ARC 2023-01-11
11:40
Online Online Reliability Enhancement Techniques for On-Device Learning on Wireless Sensor Nodes
Kazuki Sunaga (Keio Univ.), Kota Yoshida (Ritsumeikan Univ.), Hiroki Matsutani (Keio Univ.) CPSY2022-33
(To be available after the conference date) [more] CPSY2022-33
pp.29-34
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
15:10
Kumamoto  
(Primary: On-site, Secondary: Online)
FPGA Implementation and Area Evaluation of JTAG Access Mechanism Using Lightweight One-Time Password Authentication Scheme
Hisashi Okamoto, Jun Ma, Senling Wang, Hiroshi Kai, Hiroshi Takahashi (Ehime Univ), Akihiro Shimizu (Kochi Univ. of Technology) VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71
When building a cyber-physical system (CPS), it is essential to guarantee the fault tolerance and security of edge devic... [more] VLD2022-48 ICD2022-65 DC2022-64 RECONF2022-71
pp.168-173
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:10
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Deep Learning Side-Channel Attack in Noise Based Countermeasure Simon
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NS2022-103
The IoT requires the implementation of cryptographic techniques to ensure the confidentiality, integrity, and availabili... [more] NS2022-103
pp.19-22
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
NS, ICM, CQ, NV
(Joint)
2022-11-25
16:20
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] Operation and Management of Microservices-based Distributed System using Service Mesh
Takaya Ide, Hitoshi Yabusaki (Hitachi) NS2022-127 CQ2022-60 ICM2022-30
Distributed systems such as microservice architectures are complex and change rapidly. A network model called a service ... [more] NS2022-127 CQ2022-60 ICM2022-30
pp.137-141(NS), pp.58-62(CQ), pp.31-35(ICM)
EA, EMM, ASJ-H 2022-11-22
13:00
Online Online [Fellow Memorial Lecture] Security and Privacy Preservation for Speech Signal -- Approach from speech information hiding technology --
Masashi Unoki (JAIST) EA2022-60 EMM2022-60
Non-authentic but skillfully fabricated artificial replicas of authentic media in the real world are known as “media clo... [more] EA2022-60 EMM2022-60
pp.99-104
ISEC, SITE, LOIS 2022-11-18
09:25
Online Online Analysis of EU Cyber Resilience Act -- from a Perspective of Cyber Supply Chain Security --
Yusuke Tachibana (FIT) ISEC2022-32 SITE2022-36 LOIS2022-16
This past September, the European Commission published the Cyber Resilience Act. It will establish security requirements... [more] ISEC2022-32 SITE2022-36 LOIS2022-16
pp.16-19
ITE-BCT, OCS, IEE-CMN, OFT 2022-11-10
14:00
Miyagi Forest-Sendai
(Primary: On-site, Secondary: Online)
Y-00 Quantum Noise Stream Cipher with Quantum Deliberate Signal Randomization and Its Application to Optical Fiber Transmission System
Fumio Futami, Ken Tanizawa, Kentaro Kato (Tamagawa Univ.) OCS2022-41
Deliberate signal randomization (DSR) driven by quantum random numbers is proposed for enhancing security. PSK Y-00 ciph... [more] OCS2022-41
pp.7-12
ICSS 2022-11-08
10:30
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
Design and Implementation of a Task Scheduler for Delaying Ransomware
Shuhei Enomoto (TUAT), Hiroki Kuzuno (Kobe Univ.), Hiroshi Yamada (TUAT), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-46
(To be available after the conference date) [more] ICSS2022-46
pp.49-54
CS 2022-10-27
11:30
Hiroshima Hiroshima City University Satellite campus
(Primary: On-site, Secondary: Online)
Implementation of a large-scale evaluation platform in a BACnet/IP environment
Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] CS2022-45
pp.11-14
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:55
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Data Security Verification in Supply Chain
Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] ICTSSL2022-19
pp.12-17
HWS, ICD 2022-10-25
10:25
Shiga
(Primary: On-site, Secondary: Online)
A Study on Profiled Side-channel Analysis against AES-CTR
Katsumi Ebina, Rei Ueno, Naohumi Homma (Tohoku Univ) HWS2022-31 ICD2022-23
This paper describes profiling Side-Channel Analysis for AES counter mode.
AES-CTR is a mode in which an internally sto... [more]
HWS2022-31 ICD2022-23
pp.6-11
 Results 61 - 80 of 1026 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan