IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 72 of 72 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2007-07-19
10:20
Hokkaido Future University-Hakodate The study for the position authentication and the security of location information
Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC) ISEC2007-16 SITE2007-10
The use of the location information such as walk-navigation by the mobile telephone and car navigations using the GPS sp... [more] ISEC2007-16 SITE2007-10
pp.1-6
ISEC, SITE, IPSJ-CSEC 2007-07-19
15:05
Hokkaido Future University-Hakodate Human communication security to adapt to ever-expanding media environment
Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC)
As network-based media such as Web systems are improved, various new forms of human communication become possible but, a... [more] ISEC2007-34 SITE2007-28
pp.125-131
IN 2007-06-22
15:00
Hokkaido Future University-Hakodate New Security Architecture for IPv6 Global Communications Enabled by an Innovated Service Providing Method
Shigeyoshi Shima, Hiroshi Kitamura (NEC/UEC) IN2007-25
It becomes possible to attach global addresses to all hosts in the IPv6 network. These hosts face several threats such a... [more] IN2007-25
pp.85-90
DE 2006-07-14
09:50
Niigata HOTEL SENKEI A Masking System for Confidential Documents by Unmasking Safe Words
Yohei Ikawa, Daisuke Takuma, Hiroshi Kanayama (IBM Japan)
In order to protect personal and confidential information such as human, place and organization names, document masking ... [more] DE2006-105
pp.79-84
NS 2006-05-18
14:20
Kyoto Kyoto University Clock Tower Centenial Hall A Proposal and Implementation of Secure ID management Scheme on Multi Domain Environment
Ryu Watanabe, Ayumu Kubota, Toshiaki Tanaka (KDDI Labs.) NS2006-23
The expansion of the Internet gives variety to user activity and makes the services convenient. But the number of the pr... [more] NS2006-23
pp.9-12
PRMU, HIP 2006-01-19
16:50
Osaka Osaka Univ. [Special Talk]
shimpo (Tsukuba Univ.)
Legal issues concerned with the utilization of Camera have occurred in a various sides. For instance, "Assurance of Sec... [more] PRMU2005-148 HIP2005-118
pp.75-82
NS 2005-05-26
15:55
Nara NARA INSTITUTE of SCIENCE and TECHNOLOGY An Implementation of ID Management Mechanism with Privacy Protection for Secure Service Platform
Ryu Watanabe, Ayumu Kubota, Toshiaki Tanaka (KDDI Labs)
Recently, the number of the problems, such as the cheat action on net auction or the leakage of personal information fro... [more] NS2005-28
pp.17-20
IT, WBS, ISEC 2005-03-18
13:15
Kyoto Kyoto Univ. [Invited Talk] A Survey of RFID Privacy Protection Technologies
Shingo Kinoshita (NTT)
A Radio Frequency Identification (RFID) tag which consists of tiny chip and antenna is expected as one of the most impor... [more] IT2004-80 ISEC2004-136 WBS2004-195
p.61
NS, IN 2005-03-03
08:40
Okinawa Okinawa Zanpa-misaki Royal Implementation and Evaluation of a Robust and Secure Mobile Communication System
Hiroyuki Yamada, Hiroyuki Morikawa, Tomonori Aoyama (Univ. Tokyo)
We have discussed and designed a robust and secure system supporting mobile communications in the Internet. In
this pap... [more]
NS2004-208 IN2004-208
pp.53-56
IA, MoNA 2005-01-19
09:30
Osaka Osaka University Nakanoshima Center Alarm Aggregation Architecture for Identifying One Way XSS Attacks
Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi (NAIST)
Cross-Site Scripting(XSS) is caused by the failure of web applications to properly
validate user input before returning... [more]
MoMuC2004-89 IA2004-20
pp.7-14
CQ, MoNA 2004-11-18
16:00
Kagawa Kagawa University Securing Data in Mobile Computing Environment
Md. Nurul Huda (Graduate Univ.), Eiji Kamioka, Shigeki Yamada (NII)
Users in mobile computing environment need to move to different administrative and physical domains with their private r... [more] CQ2004-101 MoMuC2004-75
pp.59-64
CQ 2004-07-15
15:00
Hokkaido Kitami Institute of Technology [Special Talk] R&D assignments and activities in National Institute of Information and Communications Technology (NICT) -- Outline of Information Security Center and the future plan --
Takeshi Tandai (NICT)
NICT is currently working on security issues in the areas of information and communications, and in January 2004, we est... [more] CQ2004-58
p.53
 Results 61 - 72 of 72 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan