IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 25  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2021-03-01
09:35
Online Online Detection of Infected Device Using DNS Traffic
Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] ICSS2020-27
pp.7-12
ICSS 2015-11-26
15:25
Fukushima AIST, Fukushima Renewable Energy Institute Study on Rogue Access Point detection method
Takaaki Hoyo, Atsushi Kanai (Hosei Univ.) ICSS2015-39
Wireless LAN access points are installed everywhere, it has become possible to connect to the Internet. While such acces... [more] ICSS2015-39
pp.25-30
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] 2015-02-23
16:40
Hokkaido Hokkaido Univ. Authentication Method against Shoulder-Surfing Attacks using Secondary Channel
Akira Aratani, Atsushi Kanai (Hosei Univ.)
(To be available after the conference date) [more]
ICM, LOIS 2015-01-16
13:20
Fukuoka Kanmon Straits & Mojiko Retro A Study of Slow Policy Introduction in Information Security Management System
Kenichirou Hata, Akira Sato, Shoichi Yoneda, Shigeaki Tanimoto (CIT), Hiroyuki Sato (The University of Tokyo), Atsushi Kanai (Hosei University) ICM2014-48 LOIS2014-55
(To be available after the conference date) [more] ICM2014-48 LOIS2014-55
pp.91-96
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
10:15
Hokkaido San-Refure Hakodate Dynamic Security Control Architecture on Hybrid-cloud
Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo) ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14
Recently, it is increasing that the multiple cloud services are used because cloud computing has been spread. However, i... [more] ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14
pp.61-67
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
13:50
Hokkaido San-Refure Hakodate A proposal of authentication methods against shoulder surfing using a sub channel
Akira Aratani, Atsushi Kanai (Hosei Univ.) ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22
The compromise of personal information has become a social problem as the rapid spread of smart phones and tablet-type d... [more] ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22
pp.139-144
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
14:40
Hokkaido San-Refure Hakodate A quantification method of the degree of personal information disclosure using statistical data
Tomoyasu Shirayama, Atsushi Kanai (Hosei Univ) ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24
In recent years, we have come to be seen many cases where the user is in the disclosure of personal information unconsci... [more] ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24
pp.149-154
ICSS 2013-03-25
10:20
Kanagawa Yokohama National University A Method to Identify the Writer's Birthday on a Blog article
Masataka Kawahara, Atsushi Kanai (Hosei Univ.) ICSS2012-57
In recent years, personal information is unconsciously written in many cases because of the opportunity for an individua... [more] ICSS2012-57
pp.1-6
ICSS 2013-03-25
10:45
Kanagawa Yokohama National University A STUDY ON QUANTIFYING THE DEGREE OF PERSONAL INFORMATION DISCLOSURE USING STATISTICAL DATA
Maya Takizawa, Daiki Matsunaga, Atsushi Kanai (Hosei Univ.) ICSS2012-58
In recent years, people’s concern towards the protection of personal information is growing and many companies and unive... [more] ICSS2012-58
pp.7-12
LOIS, IPSJ-CN, IPSJ-SPT 2012-05-18
16:40
Chiba Chiba Institute of Technology A Study of the Risk Management in Life Log Service
Shigeaki Tanimoto, Ken Takahashi (CIT), Yoshiaki Seki (NTT), Motoi Iwashita (CIT), Hiroyuki Sato (s.tanimoto@m.ieice.org), Atsushi Kanai (HOSEI University) LOIS2012-8
In recent years, Life Log Service treating action records, such as an individual search log and a data on shoppers' brow... [more] LOIS2012-8
pp.127-132
ICSS 2012-03-16
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. A report on the state of blog publication photograph which can pinpoint the address
Noriyuki Takada, Atsushi Kanai (Hosei Univ) ICSS2011-41
In recent years, personal information disclosure has become a serious problem with the rapid spread of the Internet. Man... [more] ICSS2011-41
pp.11-16
IE, LOIS, ITE-ME, IEE-CMN [detail] 2010-09-21
15:20
Kochi   A Study of the Cost Structure in Campus PKI
Shigeaki Tanimoto, Satoru Kurosaki, Tsuyoshi Takamoto, Kazunori Hayashi, Shinichi Mizuhara, Toshihiko Moriya (CIT), Masahiko Yokoi (NTT Communications), Hiroyuki Sato (The University of Tokyo), Atsushi Kanai (Hosei University) LOIS2010-22 IE2010-64
Today's ICT environments have rapidly developed by ubiquitization and cloud computing, and have gained maximum functiona... [more] LOIS2010-22 IE2010-64
pp.25-30
SS 2008-03-04
09:55
Nagasaki Nagasaki Univ. A Proposal of The Secure Software Engineering
Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] SS2007-71
pp.85-90
ISEC, SITE, IPSJ-CSEC 2007-07-19
14:40
Hokkaido Future University-Hakodate A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow.
Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT) ISEC2007-28 SITE2007-22
An identity escrow scheme called Decentralized Identity Escrow (DECIDE) has three identity tiers,’identity’ (=’real iden... [more] ISEC2007-28 SITE2007-22
pp.87-94
ISEC, SITE, IPSJ-CSEC 2007-07-20
13:25
Hokkaido Future University-Hakodate A Study for Characteristics Transition of SPAM
Yosuke Aragane, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT)
 [more] ISEC2007-61
pp.111-116
ISEC, SITE, IPSJ-CSEC 2007-07-20
13:50
Hokkaido Future University-Hakodate A Study of Spam Mail Combined with Social Engineering
Kensuke Shibata, Itaru Kamiya, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)
The spam mail has become a serious threat as the trigger of cyber crime
as well as adverse effect of backbone traffic... [more]
ISEC2007-62
pp.117-122
ISEC, SITE, IPSJ-CSEC 2007-07-20
14:15
Hokkaido Future University-Hakodate A study of outward features of Spam mails
Itaru Kamiya, Kensuke Shibata, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)
The purpose of spam mail sending is mostly leading spam mail readers to some web sites. In order to lead efficiently, sp... [more] ISEC2007-63
pp.123-127
LOIS, IPSJ-CN 2007-06-01
14:10
Osaka   The Fragment Aggregation Certification Method
Noriaki Saito, Tetsurou Yamazaki, Sakae Chikara, Toru Kobayashi, Atsushi Kanai (NTT)
A lot of threats like a ID theft are increasing though our daily life became convenient by using the Internet, and we wi... [more] OIS2007-8
pp.43-48
SITE, IPSJ-EIP 2007-05-25
13:25
Tokyo   A Study for the Impact of Fishing on Brands
Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT)
 [more] SITE2007-2
pp.5-10
MoNA, IPSJ-MBL 2007-05-18
08:30
Okinawa Okinawa-seinen-kaikan A Study of Phishing on Cellular Phone
Yosuke Aragane, Kensuke Shibata, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT)
 [more] MoMuC2007-14
pp.67-72
 Results 1 - 20 of 25  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan