IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 61 - 80 of 120 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
10:30
Aomori Hirosaki University On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Melaka Meeting in April, 2010 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba/IPA), Hajime Watanabe (AIST) ISEC2010-26 SITE2010-22 ICSS2010-32
Secure information systems are absolutely required in the various situations. The international standardization is one ... [more] ISEC2010-26 SITE2010-22 ICSS2010-32
pp.123-132
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
13:25
Aomori Hirosaki University Attribute-based encryption with arbitrary number of authorities
Go Ohtake (NHK/IISEC), Hiroshi Doi (IISEC) ISEC2010-30 SITE2010-26 ICSS2010-36
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy including attributes... [more] ISEC2010-30 SITE2010-26 ICSS2010-36
pp.153-158
IT, ISEC, WBS 2010-03-04
09:25
Nagano Nagano-Engineering Campus, Shinshu University Considerations on Web System Development Process against XSS worms.
Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security) IT2009-73 ISEC2009-81 WBS2009-52
(To be available after the conference date) [more] IT2009-73 ISEC2009-81 WBS2009-52
pp.7-14
IT, ISEC, WBS 2010-03-04
11:15
Nagano Nagano-Engineering Campus, Shinshu University A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] IT2009-76 ISEC2009-84 WBS2009-55
pp.31-38
AI 2010-01-22
11:00
Tokyo   Reduction technique of user rating histories for information filtering systems
Takayuki Uda (IISEC), Tetsuo Kinoshita (TOHOKU Univ.) AI2009-21
The information filtering system refers to action histories and evaluation histories of the user to perform filtering. ... [more] AI2009-21
pp.13-18
R 2009-12-18
13:50
Tokyo   An Investigation of Reliability Evaluation of Networks with Layer Structure
Ayako Suzuki (Inst. of Information Security), Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Inst. of Information Security), Masaki Hanada (Tokyo Univ. of Science) R2009-48
There are many networks organized on an exist network by using appropriate network technologies. In these cases, the re... [more] R2009-48
pp.11-16
CPSY 2009-10-20
16:20
Tokyo 212, 1F, Bldg.E-2, The University of Tokyo [Panel Discussion] The Future of Infomation Technology and its Experts
Hidetsugu Irie (Toyo Univ.), Hidenori Tsuji (Inst. of Info. security), Masaaki Kondo (UEC), Takashi Toyoshima (Fujitsu), Kazuyuki Shudo (Tokyo Inst. of Tech), Koji Ara (Advanced Research Laboratory, Hitachi, Ltd)
 [more]
ISEC 2009-09-25
13:50
Tokyo Kikai-Shinko-Kaikan Bldg. On the Standardization of Information Security -- ISO/IEC JTC1/SC27/WG2 Report on the Beijing Meeting in May, 2009 --
Atsuko Miyaji (JAIST), Takeshi Chikazawa (IPA), Toshio Tatsuta (IISEC), Kenji Ohkuma (Toshiba Corp/IPA) ISEC2009-45
 [more] ISEC2009-45
pp.35-43
EA 2009-03-27
10:30
Tokyo   Kalman Filter Based Robust Restoration Method with Colored Driving Source
Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci), Hideaki Matsue (Tokyo Univ. of Sci, Suwa.), Shigeo Tsujii (Inst. of Info Security) EA2008-136
This paper proposes a Kalman filter based robust restoration method with colored driving source for degraded images. The... [more] EA2008-136
pp.1-5
EA 2009-03-27
11:00
Tokyo   A Fast Noise Suppression Algorithm using Kalman filter with Colored Driving Source
Nari Tanabe, Yasuhiro Onozuka, Masataka Tabata (Tokyo Univ. of Sci, Suwa.), Toshihiro Furukawa (Tokyo Univ. of Sci.), Shigeo Tsujii (Inst. of Information Security.) EA2008-137
 [more] EA2008-137
pp.7-11
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Network Usage Control Based on Evaluation of User Security
Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] IT2008-45 ISEC2008-103 WBS2008-58
pp.15-22
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Anomaly detection based on the machine learning of the human behavior on home network
Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] IT2008-46 ISEC2008-104 WBS2008-59
pp.23-28
WBS, IT, ISEC 2009-03-10
15:40
Hokkaido Hakodate Mirai Univ. A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement
Harumine Yoshiba (Panasonic Corp./Inst. of Info Security), Hidehiko Tanaka (Inst. of Info Security) IT2008-91 ISEC2008-149 WBS2008-104
In this paper, the suitability of multicast encryption key management method for actual business IT systems such as surv... [more] IT2008-91 ISEC2008-149 WBS2008-104
pp.307-314
IA 2009-01-29
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Method of Grouping Routers by Using Positional Addresses
Shigetoshi Okazaki, Naoshi Sato (Graduate School of Info Sec.) IA2008-64
The packet network based on the internet protocol is infrastructure of highly-networked information society, but there a... [more] IA2008-64
pp.95-100
ITE-BCT, IE, CS, IPSJ-AVM 2008-12-11
15:15
Aichi Nagoya University Kalman Filter Based Restoration Algorithm for Degraded Image
Shunichi Kitahara, Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (nstitute of Information Security) CS2008-44 IE2008-108
We propose a Kalman filter based restoration algorithm for degraded images.The algorithm aims to achieve high quality im... [more] CS2008-44 IE2008-108
pp.29-34
SITE 2008-12-05
15:30
Tokyo   [Invited Talk] Comprehensive Science on Information Security -- from the Viewpoint of Contradiction in Information Society --
Shigeo Tsujii (Institute of Infotmation Security) SITE2008-41
 [more] SITE2008-41
pp.31-36
EA 2008-11-21
11:15
Oita   Kalman filter based fast noise suppression algorithm
Nari Tanabe (Tokyo Univ. of Science, Suwa), Toshihiro Furukawa (Tokyo Univ. of Science), Hideaki Matsue (Tokyo Univ. of Science, Suwa), Shigeo Tsujii (Institute of Information Security) EA2008-94
 [more] EA2008-94
pp.57-62
ICM, CQ, NS
(Joint)
2008-11-13
18:00
Fukushima Nihon University A plan of the method of controlling the NGN route using an indivisual security policy
Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] CQ2008-51
pp.33-38
SITE 2008-10-17
14:20
Kanagawa   About the access rule of the integrated security model based on the intuitionistic logic -- The case of combining a conflict of interest attribute with a hierarchical attribute --
Tetsuya Morizumi (TNSi), Hirotsugu Kinoshita (KU), Shigeo Tsujii (IIS) SITE2008-31
 [more] SITE2008-31
pp.9-14
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Design Policy of MPKC based on Piece in Hand Concept
Shigeo Tsujii (iisec), Toshinobu Kaneko (TUS), Kohtaro Tadaki, Masahito Gotaishi (Chuo Univ.) ISEC2008-18 SITE2008-12
Design policy of multivariate public key cryptosystem based on Piece In Hand concept is proposed with focus on quantum c... [more] ISEC2008-18 SITE2008-12
pp.15-22
 Results 61 - 80 of 120 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan