Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 10:20 |
Hokkaido |
Future University-Hakodate |
The study for the position authentication and the security of location information Yukio Takahashi (IISEC/NICT), Shigeo Tsujii (IISEC) ISEC2007-16 SITE2007-10 |
The use of the location information such as walk-navigation by the mobile telephone and car navigations using the GPS sp... [more] |
ISEC2007-16 SITE2007-10 pp.1-6 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 15:05 |
Hokkaido |
Future University-Hakodate |
Human communication security to adapt to ever-expanding media environment Hiroshi Yoshiura, Haruno Kataoka, Shinta Nakayama (UEC) |
As network-based media such as Web systems are improved, various new forms of human communication become possible but, a... [more] |
ISEC2007-34 SITE2007-28 pp.125-131 |
IN |
2007-06-22 15:00 |
Hokkaido |
Future University-Hakodate |
New Security Architecture for IPv6 Global Communications Enabled by an Innovated Service Providing Method Shigeyoshi Shima, Hiroshi Kitamura (NEC/UEC) IN2007-25 |
It becomes possible to attach global addresses to all hosts in the IPv6 network. These hosts face several threats such a... [more] |
IN2007-25 pp.85-90 |
DE |
2006-07-14 09:50 |
Niigata |
HOTEL SENKEI |
A Masking System for Confidential Documents by Unmasking Safe Words Yohei Ikawa, Daisuke Takuma, Hiroshi Kanayama (IBM Japan) |
In order to protect personal and confidential information such as human, place and organization names, document masking ... [more] |
DE2006-105 pp.79-84 |
NS |
2006-05-18 14:20 |
Kyoto |
Kyoto University Clock Tower Centenial Hall |
A Proposal and Implementation of Secure ID management Scheme on Multi Domain Environment Ryu Watanabe, Ayumu Kubota, Toshiaki Tanaka (KDDI Labs.) NS2006-23 |
The expansion of the Internet gives variety to user activity and makes the services convenient. But the number of the pr... [more] |
NS2006-23 pp.9-12 |
PRMU, HIP |
2006-01-19 16:50 |
Osaka |
Osaka Univ. |
[Special Talk]
shimpo (Tsukuba Univ.) |
Legal issues concerned with the utilization of Camera have occurred in a various sides. For instance, "Assurance of Sec... [more] |
PRMU2005-148 HIP2005-118 pp.75-82 |
NS |
2005-05-26 15:55 |
Nara |
NARA INSTITUTE of SCIENCE and TECHNOLOGY |
An Implementation of ID Management Mechanism with Privacy Protection for Secure Service Platform Ryu Watanabe, Ayumu Kubota, Toshiaki Tanaka (KDDI Labs) |
Recently, the number of the problems, such as the cheat action on net auction or the leakage of personal information fro... [more] |
NS2005-28 pp.17-20 |
IT, WBS, ISEC |
2005-03-18 13:15 |
Kyoto |
Kyoto Univ. |
[Invited Talk]
A Survey of RFID Privacy Protection Technologies Shingo Kinoshita (NTT) |
A Radio Frequency Identification (RFID) tag which consists of tiny chip and antenna is expected as one of the most impor... [more] |
IT2004-80 ISEC2004-136 WBS2004-195 p.61 |
NS, IN |
2005-03-03 08:40 |
Okinawa |
Okinawa Zanpa-misaki Royal |
Implementation and Evaluation of a Robust and Secure Mobile Communication System Hiroyuki Yamada, Hiroyuki Morikawa, Tomonori Aoyama (Univ. Tokyo) |
We have discussed and designed a robust and secure system supporting mobile communications in the Internet. In
this pap... [more] |
NS2004-208 IN2004-208 pp.53-56 |
IA, MoNA |
2005-01-19 09:30 |
Osaka |
Osaka University Nakanoshima Center |
Alarm Aggregation Architecture for Identifying One Way XSS Attacks Omar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi (NAIST) |
Cross-Site Scripting(XSS) is caused by the failure of web applications to properly
validate user input before returning... [more] |
MoMuC2004-89 IA2004-20 pp.7-14 |
CQ, MoNA |
2004-11-18 16:00 |
Kagawa |
Kagawa University |
Securing Data in Mobile Computing Environment Md. Nurul Huda (Graduate Univ.), Eiji Kamioka, Shigeki Yamada (NII) |
Users in mobile computing environment need to move to different administrative and physical domains with their private r... [more] |
CQ2004-101 MoMuC2004-75 pp.59-64 |
CQ |
2004-07-15 15:00 |
Hokkaido |
Kitami Institute of Technology |
[Special Talk]
R&D assignments and activities in National Institute of Information and Communications Technology (NICT)
-- Outline of Information Security Center and the future plan -- Takeshi Tandai (NICT) |
NICT is currently working on security issues in the areas of information and communications, and in January 2004, we est... [more] |
CQ2004-58 p.53 |