IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ET 2018-03-03
14:25
Kochi Kochi University of Technology (Eikokuji Campus) Construction of Latent Needs Visualization Agent Based on a Hierarchical Topic Model
Yusuke Kometani (Kagawa Univ.), Takashi Satoh (The Univ. of Kitakyushu) ET2017-98
In troubleshooting process it is effective to make visible the root cause and its corresponding solution of problems tha... [more] ET2017-98
pp.53-58
ET 2018-01-27
14:50
Hyogo Kobe Univ. Development of Latent Needs Visualization Agent for Supporting IT Troubleshooting Process within a University
Yusuke Kometani (Kagawa Univ.), Takashi Satoh (The Univ. of Kitakyushu) ET2017-85
In troubleshooting process it is effective to make visible the root cause and its corresponding solution of problems tha... [more] ET2017-85
pp.31-36
ET 2017-11-11
16:40
Tokyo Sophia Univ. Analysis of Latent Needs for IT Consultation within a University using a Topic Model
Yusuke Kometani, Takashi Satoh (The Univ. of Kitakyushu) ET2017-66
When trouble comes, we often try to implement a workaround as a temporal solution. This approach is generally useless to... [more] ET2017-66
pp.69-74
ISEC 2014-12-19
14:50
Tokyo Kikai-Shinko-Kaikan Bldg. Space-Time Encoding Schemes with No False Positives
Ryosuke Shiraishi, Takashi Satoh, Masaki Shimoizumi (Univ. Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-71
IP traceback is a technique to detect attackers in denial of service (DoS) and distributed DoS (DDoS) attacks. We consid... [more] ISEC2014-71
pp.11-15
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
14:15
Hokkaido San-Refure Hakodate DDoS Attack Path Reconstruction in Space-Time Encoding Schemes
Takashi Satoh, Daichi Misumi, Masaki Shimoizumi (Univ. of Kitakyushu), Masakazu Soshi (Hiroshima City Univ.) ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
There are several kinds of IP traceback techniques to trace attack paths in denial of service (DoS) and distributed Dos ... [more] ISEC2014-45 SITE2014-40 ICSS2014-49 EMM2014-45
pp.315-319
IT, ISEC, WBS 2013-03-08
10:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Laser Fault Injection Attack on Non-Decapped Contact Smart Card
Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.) IT2012-93 ISEC2012-111 WBS2012-79
 [more] IT2012-93 ISEC2012-111 WBS2012-79
pp.195-202
ISEC, LOIS 2012-11-21
14:15
Shizuoka Shizuoka City Industry-University Exchange Center How to Extract AES Key from Smart Card by Fault Injection Attack Using Electromaginetic Irradiataion
Yuu Tsuchiya, Takeshi Kishikawa, Shohei Saito, Tsuyoshi Toyama (YNU), Akihiko Sasaki (MORITA TECH), Akashi Satoh (VDEC, Univ. Tokyo), Tsutomu Matsumoto (YNU) ISEC2012-57 LOIS2012-32
Fault injection attack, inducing partial fault in a cryptographic module and extracting the inside key, has been conside... [more] ISEC2012-57 LOIS2012-32
pp.1-8
IT, ISEC, WBS 2012-03-02
14:25
Kanagawa   [Invited Talk] Physical Attacks and Countermeasures on Cryptographic Devices
Akashi Satoh (AIST) IT2011-74 ISEC2011-101 WBS2011-75
After describing the history of cryptography, applications of cryptographic devices are overviewed. Then, physical attac... [more] IT2011-74 ISEC2011-101 WBS2011-75
p.181
ISEC 2011-12-14
13:15
Tokyo Kikai-Shinko-Kaikan Bldg. A Report on CHES 2011
Tetsuya Izu (FUJITSU Lab.), Atsuo Inomata (NAIST), Katsuyuki Okeya (Renesas Electronics), Ken Kawabata, Yuichi Komano (Toshiba), Kazuo Sakiyama (UEC), Yumi Sakemi (FUJITSU Lab.), Akashi Satoh (AIST), Yuji Suga (IIJ), Tsuyoshi Takagi (Kyusyu Univ.), Junko Takahashi (NTT), Yukiyasu Tsunoo (NEC), Shiho Moriai (Sony), Yohei Hori (AIST), Naofumi Homma (Tohoku Univ.) ISEC2011-65
(To be available after the conference date) [more] ISEC2011-65
pp.21-24
RECONF 2011-05-13
11:35
Hokkaido Hokkaido Univ. (Faculty of Eng., B3 Bldg.) Power Consumption Evaluation of a Dynamically Reconfigurable Multi-cryptoprocessor on Virtex-5 FPGA
Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2011-17
 [more] RECONF2011-17
pp.97-102
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
10:10
Fukuoka Kyushu University Magnetic Field Measurement for Side-channel Analysis Environment
Toshihiro Katashita, Yohei Hori, Akashi Satoh (AIST) RECONF2010-46
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] RECONF2010-46
pp.43-48
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
11:05
Fukuoka Kyushu University A study of the success rate of MIA under various probability density function estimations
Yohei Hori (AIST), Takahiro Yoshida (Aoyama Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-48
The pfrobability density function (PDF) of voltage of AES hardware
module is estimated in various ways and applied to ... [more]
RECONF2010-48
pp.55-60
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2010-12-01
11:25
Fukuoka Kyushu University Performance Evaluation for PUF-based Authentication Systems with Shift Post-processing
Hyunho Kang, Yohei Hori, Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-49
A physical unclonable function (PUF) is a physical system with a device manufacturing variations and could be useful for... [more] RECONF2010-49
pp.61-64
RECONF 2010-09-17
13:15
Shizuoka Shizuoka University (Faculty of Eng., Hall 2) Quantitative Performance Evaluation of Arbiter PUFs on FPGAs
Yohei Hori (AIST), Takahiro Yoshida (Chuo Univ.), Toshihiro Katashita, Akashi Satoh (AIST) RECONF2010-37
The quantitative performance indicators of Physical Unclonable
Functions (PUFs)---Randomness, Steadiness, Correctness,... [more]
RECONF2010-37
pp.115-120
ICSS 2010-03-26
13:55
Fukuoka The University of Kitakyushu An Efficient Key Establishment Scheme through Intermediaries for Sensor Networks
Tomonori Kubo, Takashi Satoh (Univ. Kitakyushu) ICSS2009-63
Establishing shared keys is a fundamental issue to provide secure communications among nodes in sensor networks. We prop... [more] ICSS2009-63
pp.7-11
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2009-12-03
15:40
Kochi Kochi City Culture-Plaza Development of Standard Evaluation Environment for Side-channel Attacks and Countermeasures
Toshihiro Katashita (AIST), Yohei Hori (Chuo Univ.), Akashi Satoh (AIST) RECONF2009-46
Cryptography used widely in electronic products is evaluated in terms of computationally-secure, however there is vulner... [more] RECONF2009-46
pp.31-36
EMCJ, ITE-BCT 2009-03-13
14:05
Tokyo Kikai-Shinko-Kaikan Bldg. Magnetic Near Field Measurement of Cryptographic LSI using On-Chip Integrated Micro Magnetic Field probe
Hideki Torizuka, Masahiro Yamaguchi, Takeshi Sugawara, Naofumi Homma (Tohoku Univ.), Akashi Satoh (Adv Ind Sci and Tech.), Takafumi Aoki (Tohoku Univ.) EMCJ2008-120
Increasingly a side channel attack which is to break a cryptographic key using the electromagnetic radiation and power c... [more] EMCJ2008-120
pp.37-42
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2008-11-18
15:20
Fukuoka Kitakyushu Science and Research Park Development of Side-channel Attack Standard Evaluation BOard and Tool
Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more]
RECONF2008-54
pp.87-92
RECONF 2008-05-22
13:50
Fukushima The University of Aizu Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda (AIST) RECONF2008-3
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confi... [more] RECONF2008-3
pp.13-18
ISEC 2008-05-16
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. Integrating Fingerprint and Cryptosystem for Internet-Based Live Pay-TV System
Shuhui Hou, Tetsutaro Uehara (Kyoto Univ.), Takashi Satoh (Univ. of Kitakyushu), Yoshitaka Morimura, Michihiko Minoh (Kyoto Univ.) ISEC2008-12
In the last few years, live pay-TV system via internet has come to be established with the development of broadband netw... [more] ISEC2008-12
pp.77-84
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan