Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2021-03-01 09:35 |
Online |
Online |
Detection of Infected Device Using DNS Traffic Soichiro Kogo, Atsushi Kanai (Hosei Univ.) ICSS2020-27 |
The damage caused by computer viruses is becoming a serious problem. However, it requires a lot of effort to manage all ... [more] |
ICSS2020-27 pp.7-12 |
ICSS |
2015-11-26 15:25 |
Fukushima |
AIST, Fukushima Renewable Energy Institute |
Study on Rogue Access Point detection method Takaaki Hoyo, Atsushi Kanai (Hosei Univ.) ICSS2015-39 |
Wireless LAN access points are installed everywhere, it has become possible to connect to the Internet. While such acces... [more] |
ICSS2015-39 pp.25-30 |
IE, ITS, ITE-AIT, ITE-HI, ITE-ME, ITE-MMS, ITE-CE [detail] |
2015-02-23 16:40 |
Hokkaido |
Hokkaido Univ. |
Authentication Method against Shoulder-Surfing Attacks using Secondary Channel Akira Aratani, Atsushi Kanai (Hosei Univ.) |
(To be available after the conference date) [more] |
|
ICM, LOIS |
2015-01-16 13:20 |
Fukuoka |
Kanmon Straits & Mojiko Retro |
A Study of Slow Policy Introduction in Information Security Management System Kenichirou Hata, Akira Sato, Shoichi Yoneda, Shigeaki Tanimoto (CIT), Hiroyuki Sato (The University of Tokyo), Atsushi Kanai (Hosei University) ICM2014-48 LOIS2014-55 |
(To be available after the conference date) [more] |
ICM2014-48 LOIS2014-55 pp.91-96 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 10:15 |
Hokkaido |
San-Refure Hakodate |
Dynamic Security Control Architecture on Hybrid-cloud Yuuki Kajiura, Atsushi Kanai (Hosei Univ.), Shigeaki Tanimoto (Chiba Inst. of Tech.), Hiroyuki Sato (Univ. of Tokyo) ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 |
Recently, it is increasing that the multiple cloud services are used because cloud computing has been spread. However, i... [more] |
ISEC2014-14 SITE2014-9 ICSS2014-18 EMM2014-14 pp.61-67 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 13:50 |
Hokkaido |
San-Refure Hakodate |
A proposal of authentication methods against shoulder surfing using a sub channel Akira Aratani, Atsushi Kanai (Hosei Univ.) ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 |
The compromise of personal information has become a social problem as the rapid spread of smart phones and tablet-type d... [more] |
ISEC2014-22 SITE2014-17 ICSS2014-26 EMM2014-22 pp.139-144 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:40 |
Hokkaido |
San-Refure Hakodate |
A quantification method of the degree of personal information disclosure using statistical data Tomoyasu Shirayama, Atsushi Kanai (Hosei Univ) ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24 |
In recent years, we have come to be seen many cases where the user is in the disclosure of personal information unconsci... [more] |
ISEC2014-24 SITE2014-19 ICSS2014-28 EMM2014-24 pp.149-154 |
ICSS |
2013-03-25 10:20 |
Kanagawa |
Yokohama National University |
A Method to Identify the Writer's Birthday on a Blog article Masataka Kawahara, Atsushi Kanai (Hosei Univ.) ICSS2012-57 |
In recent years, personal information is unconsciously written in many cases because of the opportunity for an individua... [more] |
ICSS2012-57 pp.1-6 |
ICSS |
2013-03-25 10:45 |
Kanagawa |
Yokohama National University |
A STUDY ON QUANTIFYING THE DEGREE OF PERSONAL INFORMATION DISCLOSURE USING STATISTICAL DATA Maya Takizawa, Daiki Matsunaga, Atsushi Kanai (Hosei Univ.) ICSS2012-58 |
In recent years, people’s concern towards the protection of personal information is growing and many companies and unive... [more] |
ICSS2012-58 pp.7-12 |
LOIS, IPSJ-CN, IPSJ-SPT |
2012-05-18 16:40 |
Chiba |
Chiba Institute of Technology |
A Study of the Risk Management in Life Log Service Shigeaki Tanimoto, Ken Takahashi (CIT), Yoshiaki Seki (NTT), Motoi Iwashita (CIT), Hiroyuki Sato (s.tanimoto@m.ieice.org), Atsushi Kanai (HOSEI University) LOIS2012-8 |
In recent years, Life Log Service treating action records, such as an individual search log and a data on shoppers' brow... [more] |
LOIS2012-8 pp.127-132 |
ICSS |
2012-03-16 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A report on the state of blog publication photograph which can pinpoint the address Noriyuki Takada, Atsushi Kanai (Hosei Univ) ICSS2011-41 |
In recent years, personal information disclosure has become a serious problem with the rapid spread of the Internet. Man... [more] |
ICSS2011-41 pp.11-16 |
IE, LOIS, ITE-ME, IEE-CMN [detail] |
2010-09-21 15:20 |
Kochi |
|
A Study of the Cost Structure in Campus PKI Shigeaki Tanimoto, Satoru Kurosaki, Tsuyoshi Takamoto, Kazunori Hayashi, Shinichi Mizuhara, Toshihiko Moriya (CIT), Masahiko Yokoi (NTT Communications), Hiroyuki Sato (The University of Tokyo), Atsushi Kanai (Hosei University) LOIS2010-22 IE2010-64 |
Today's ICT environments have rapidly developed by ubiquitization and cloud computing, and have gained maximum functiona... [more] |
LOIS2010-22 IE2010-64 pp.25-30 |
SS |
2008-03-04 09:55 |
Nagasaki |
Nagasaki Univ. |
A Proposal of The Secure Software Engineering Noriaki Saito, Satoshi Oda, Toshiyuki Miyazawa, Sakae Chikara, Toru Kawamura, Atsushi Kanai (NTT) SS2007-71 |
At the recent software design and development, a necessity of the security is increasing, though a developing term is sh... [more] |
SS2007-71 pp.85-90 |
ISEC, SITE, IPSJ-CSEC |
2007-07-19 14:40 |
Hokkaido |
Future University-Hakodate |
A Study on a Participant Behavior in Bulletin Board System based on Decentralized Identity Escrow. Ryota Sato, Keiichi Hirota, Taro Yamamoto, Shigeaki Tanimoto, Osamu Shionoiri, Atsushi Kanai (NTT) ISEC2007-28 SITE2007-22 |
An identity escrow scheme called Decentralized Identity Escrow (DECIDE) has three identity tiers,’identity’ (=’real iden... [more] |
ISEC2007-28 SITE2007-22 pp.87-94 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 13:25 |
Hokkaido |
Future University-Hakodate |
A Study for Characteristics Transition of SPAM Yosuke Aragane, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT) |
[more] |
ISEC2007-61 pp.111-116 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 13:50 |
Hokkaido |
Future University-Hakodate |
A Study of Spam Mail Combined with Social Engineering Kensuke Shibata, Itaru Kamiya, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT) |
The spam mail has become a serious threat as the trigger of cyber crime
as well as adverse effect of backbone traffic... [more] |
ISEC2007-62 pp.117-122 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 14:15 |
Hokkaido |
Future University-Hakodate |
A study of outward features of Spam mails Itaru Kamiya, Kensuke Shibata, Kazutoshi Sano, Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT) |
The purpose of spam mail sending is mostly leading spam mail readers to some web sites. In order to lead efficiently, sp... [more] |
ISEC2007-63 pp.123-127 |
LOIS, IPSJ-CN |
2007-06-01 14:10 |
Osaka |
|
The Fragment Aggregation Certification Method Noriaki Saito, Tetsurou Yamazaki, Sakae Chikara, Toru Kobayashi, Atsushi Kanai (NTT) |
A lot of threats like a ID theft are increasing though our daily life became convenient by using the Internet, and we wi... [more] |
OIS2007-8 pp.43-48 |
SITE, IPSJ-EIP |
2007-05-25 13:25 |
Tokyo |
|
A Study for the Impact of Fishing on Brands Yosuke Aragane, Osamu Shionoiri, Atsushi Kanai (NTT) |
[more] |
SITE2007-2 pp.5-10 |
MoNA, IPSJ-MBL |
2007-05-18 08:30 |
Okinawa |
Okinawa-seinen-kaikan |
A Study of Phishing on Cellular Phone Yosuke Aragane, Kensuke Shibata, Kazutoshi Sano, Osamu Shionoiri, Atsushi Kanai (NTT) |
[more] |
MoMuC2007-14 pp.67-72 |