IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2023-11-16
13:00
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Implementation of Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities, and A Study on Its Large-scale Demonstration
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2023-51
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2023-51
pp.1-6
RCC, ISEC, IT, WBS 2023-03-14
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Claimable Designated Verifier Signature
Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
pp.171-178
ICSS, IPSJ-SPT 2023-03-13
16:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Implementation and Evaluation for Remote-Control Security System of IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] ICSS2022-67
pp.115-120
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
A Study on Dynamic Secure Network for Traffic and Logistics with Supermassive and Supervarious Mobilities
Masaru Takeuchi, Toshiaki Saisho, Junji Shikata (JDC), Toshio Sato, Kazue Sako, Jiro Katto, Takuro Sato (WU) ICSS2022-68
In the era of Beyond 5G/6G, effective use of space-time is expected by cooperative operation of a large number and varie... [more] ICSS2022-68
pp.121-126
ISEC, SITE, LOIS 2022-11-18
17:45
Online Online Aggregate Entity Authentication with Group Testing
Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) ISEC2022-46 SITE2022-50 LOIS2022-30
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication schem... [more] ISEC2022-46 SITE2022-50 LOIS2022-30
pp.100-106
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
ICSS, IPSJ-SPT 2020-03-02
13:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96
 [more] ICSS2019-96
pp.207-212
ICSS 2019-11-13
16:45
Miyazaki MRT Terrace(Miyazaki) Study on evaluation system for aggregate message authentication and its application to IoT systems
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] ICSS2019-67
pp.41-46
ICSS, IPSJ-SPT 2019-03-07
14:45
Okinawa NICT Okinawa Electromagnetic Technology Center Implementation and evaluation of aggregate message authentication method
Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73
 [more] ICSS2018-73
pp.29-33
IT, ISEC, WBS 2019-03-08
09:00
Tokyo University of Electro-Communications History-Free Sequential Aggregate MAC without Pseudorandom Permutation
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] IT2018-101 ISEC2018-107 WBS2018-102
pp.155-162
ITS, WBS, RCC 2017-12-15
09:30
Okinawa Tiruru/Okinawa Jichikaikan ()
Ryota Iwanaji (Waseda Univ.), Kazuaki Ishikawa (Zenrin DataCom), Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) WBS2017-63 ITS2017-40 RCC2017-79
(To be available after the conference date) [more] WBS2017-63 ITS2017-40 RCC2017-79
pp.155-160
ITS, WBS, RCC 2017-12-15
13:30
Okinawa Tiruru/Okinawa Jichikaikan ()
Ryoya Yano (Waseda Univ.), Kazuaki Ishikawa (Zenrin DataCom), Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) WBS2017-73 ITS2017-50 RCC2017-89
(To be available after the conference date) [more] WBS2017-73 ITS2017-50 RCC2017-89
pp.215-220
ITS, WBS, RCC 2017-12-15
13:55
Okinawa Tiruru/Okinawa Jichikaikan ()
Keisuke Kono (Waseda Univ.), Kazuaki Ishikawa (ZDC), Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) WBS2017-74 ITS2017-51 RCC2017-90
(To be available after the conference date) [more] WBS2017-74 ITS2017-51 RCC2017-90
pp.221-226
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] 2017-02-21
14:00
Hokkaido Hokkaido Univ. (none)
Ryota Iwanaji (Waseda Univ.), Tomoyuki Nitta (Zenrin DataCom), Masao Yanagisawa, Nozomu Togawa (Waseda Univ.) ITS2016-71 IE2016-129
(To be available after the conference date) [more] ITS2016-71 IE2016-129
pp.387-392
CCS 2016-08-09
17:00
Hokkaido Yoichi Chuo kominkan Community detection of human mobility networks and models of infectious diseases
Naoya Fujiwara (UTokyo), Ritsu Sakuramachi (ZDC), Yuki Akiyama (UTokyo), Shota Fujishima (Tokyo Univ. Sci.), Hodaka Kaneda (ZDC), Ryosuke Shibasaki (UTokyo) CCS2016-20
It is important to define life spheres in which people transport actively. For instance, such spheres can be regarded as... [more] CCS2016-20
pp.21-26
ICSS 2015-03-03
15:40
Okinawa Meio Univiersity A Study on the Effectiveness of Correlation Analysis of Cyber Attack Information by means of Tagging Technique
Taichi Hata (JDC/Nissin), Manabu Inuma (Josai Univ.), Junji Shikata (Yokohama National Univ.), Shin Takeuchi (JDC/Nissin), Koji Nakao (NICT) ICSS2014-69
Recently, cyber-attacks caused by malwares are steadily increasing.
Since the attack techniques are also diversified, c... [more]
ICSS2014-69
pp.37-42
SWIM, SC
(2nd)
2010-10-07
14:25
Chiba makuhari Mese Internatinal Confercene Hall Techinical Asessments for SQL Database Conversion to GAE
Midori Sone, Isao Kaji (Miyagi Univ.), Masahide Kanemura (Etos), Masanobu Jinusi (Datacom)
 [more]
IA, ICSS 2010-06-17
15:45
Kyoto Academic Center for Computing and Media Studies, Kyoto University Implementation and its Evaluation of A Secure One-Time Passoword Method against the Stolen-Verifier Attack
Tatsuya Takehisa (JDC), Ryoichi Isawa (Crypto), Masakatu Morii (Kobe Univ.) IA2010-7 ICSS2010-7
The ssh is widely used for the construction of the secure communication channel, and the authentic method based on publi... [more] IA2010-7 ICSS2010-7
pp.37-42
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
16:50
Hiroshima Hiroshima Univ. Evaluation of Remote Access VPN with Dynamic Port Randomization Function by Mobile Codes
Tatsuya Takehisa (Japan Datacom Co., Ltd), Masanori Hirotomo (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) LOIS2009-39 IE2009-80
Recently, the variety of attacks against servers in the Internet is increased. The survivability of servers serving the ... [more] LOIS2009-39 IE2009-80
pp.119-124
IA, ICSS 2009-06-18
14:20
Tokyo Kikai-Shinko-Kaikan Bldg *
Satoshi Hashimoto (Kobe Univ.), Ryoichi Isawa (CRYPTO Co., Ltd.), Tatsuya Takehisa (Japan Datacom Co., Ltd.), Masakatu Morii (Kobe Univ.), Koji Nakao (NICT) IA2009-7 ICSS2009-15
In 2008, Nakano et al. proposed a password authentication method, which is secure against the stolen-verifier attack. Ho... [more] IA2009-7 ICSS2009-15
pp.37-42
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan