IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 31  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, SITE, IPSJ-IOT [detail] 2024-03-13
14:30
Okinawa Miyakojima City Future Creation Center
(Primary: On-site, Secondary: Online)
Proposal on Secure Hint System for Password Authentication Using Bloom Filter
Kazumu Kaneko, Hiroyuki Inaba (KIT) SITE2023-102 IA2023-108
 [more] SITE2023-102 IA2023-108
pp.211-218
IA, SITE, IPSJ-IOT [detail] 2020-03-02
14:30
Online Online Proposal of Anomaly Based Attack Detection System for IoT Devices Using Deep Metric Learning
Tatsuya Takimoto, Hiroyuki Inaba (KIT) SITE2019-90 IA2019-68
In recent years, with the development of the Internet, many IoT devices are used in all aspects of life. On the other ha... [more] SITE2019-90 IA2019-68
pp.13-18
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:10
Kochi Kochi University of Technology Proposal and Implementation of Password Reminder System for Partial Forgetting
Ryota Hosoda, Hiroyuki Inaba (KIT) ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34
 [more] ISEC2019-31 SITE2019-25 BioX2019-23 HWS2019-26 ICSS2019-29 EMM2019-34
pp.163-170
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
13:35
Kochi Kochi University of Technology Proposal of Spam Filter by Applying Neural Network for Mitigating Catastrophic Forgetting
Shuiti Kawahara, Lu Chen, Hiroyuki Inaba (KIT) ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35
The trend of spam mails is changing. Since, in recent years, spam mails sent from overseas mail serversare increasing, s... [more] ISEC2019-32 SITE2019-26 BioX2019-24 HWS2019-27 ICSS2019-30 EMM2019-35
pp.171-178
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-23
14:00
Kochi Kochi University of Technology Video Watermarking Using Difference of Persistent Homology in Consecutive Frames
Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36
Copyright infringement such as illegal copying and uploading video contents frequently happen in many
video distributio... [more]
ISEC2019-33 SITE2019-27 BioX2019-25 HWS2019-28 ICSS2019-31 EMM2019-36
pp.179-186
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:50
Hokkaido Sapporo Convention Center A Study on Public Wi-Fi Authentication Method with Anonymity and Traceability Using Blockchain
Tomoyuki Sanda, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25
Recently, Wi-Fi access points have been installed in public places, with increasing demand for Internet access by mobile... [more] ISEC2018-26 SITE2018-18 HWS2018-23 ICSS2018-29 EMM2018-25
pp.137-142
SITE, IPSJ-EIP 2018-06-01
14:45
Kanagawa   Implementation and Evaluation of Intrusion Detection System for Malicious PC by Sensor Hosts
Hiroaki Kuno, Satoshi Kimura, Hiroyuki Inaba (KIT) SITE2018-4
In recent years, Intrusion Detection System(IDS) is not able to catch the unknown attack
as malware and its variant ar... [more]
SITE2018-4
pp.95-99
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:15
Tokyo   Performance Analysis of Video Watermarking Using Patchwork Method on Frequency Domain
Takaya Kimura, Hiroyuki Inaba (KIT) ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16
Video watermarking using patchwork method is proposed as one of the video watermarking. This method can defend embedded ... [more] ISEC2017-13 SITE2017-5 ICSS2017-12 EMM2017-16
pp.1-4
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-14
10:40
Tokyo   Improvement of Privacy Preserving Digital Contents Circulation System on Blockchain
Kohei Miura, Hiroyuki Inaba (KIT) ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17
We have proposed a digital contents circulation system on Blockchain. The system can protect user’s privacy from both co... [more] ISEC2017-14 SITE2017-6 ICSS2017-13 EMM2017-17
pp.5-8
SITE, EMM, ISEC, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2017-07-15
13:25
Tokyo   Proposal of Personal Authentication Method by Visual Secret Scheme Using Smart Phone
Ryo Mizuno, Hiroyuki Inaba (KIT) ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38
 [more] ISEC2017-35 SITE2017-27 ICSS2017-34 EMM2017-38
pp.259-266
SITE, IPSJ-EIP 2017-05-31
16:35
Tokyo   A Proposal of Reliable Car Sharing System Using Ethereum's Smart Contract
Tomoya Ogami, Hiroyuki Inaba (KIT) SITE2017-2
Recently, car sharing services which we can lend and rent our own cars or campany's cars spread widely. That is because... [more] SITE2017-2
pp.37-40
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:00
Yamaguchi   Implementation and Convenience Evaluation of Background Pattern Slide Authentication Against Shoulder Surfing
Motoi Tanaka, Hiroyuki Inaba (KIT) ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26
A personal authentication system using PIN or password is widely used in various information terminals. However these au... [more] ISEC2016-18 SITE2016-12 ICSS2016-18 EMM2016-26
pp.29-32
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-14
13:25
Yamaguchi   Study on Classification Method of IDS Alerts Focusing on Relation of Detection Time
Hiroaki Kuno, Hiroyuki Inaba (KIT) ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27
IDS (Intrusion Detection System) is one of the countermeasures for illegal access to the network. Since IDS reports all ... [more] ISEC2016-19 SITE2016-13 ICSS2016-19 EMM2016-27
pp.33-36
SITE, IPSJ-EIP 2016-06-02
13:55
Kanagawa Institute of Information Security Privacy Preserving Digital Contents Circulation System Using Bitcoin 2.0
Kohei Miura, Hiroyuki Inaba (KIT) SITE2016-2
 [more] SITE2016-2
pp.29-32
IA, IPSJ-IOT, SITE [detail] 2015-03-06
14:20
Fukushima   Fast Searchable Encryption Scheme Using Single Bloom Filter and Its Evalustion
Shunsuke Kimura, Hiroyuki Inaba (KIT) SITE2014-79 IA2014-111
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more]
SITE2014-79 IA2014-111
pp.227-232
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:25
Hokkaido San-Refure Hakodate Notes on Secure and Smooth Typing Password Generation Method Using Markov Process(2)
Hiroyuki Inaba, Takuto Tamai (Kyoto Inst. of Tech.) ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39
In recent years, a lot of incident of password leakage by illegal access occurs frequently, therefore a password list at... [more] ISEC2014-39 SITE2014-34 ICSS2014-43 EMM2014-39
pp.275-280
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
13:50
Hokkaido San-Refure Hakodate Proposal on Fast Searchable Encryption Scheme Using Bloom Filter
Shunsuke Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40
Recently, cloud storage service which store several documents on the Internet has become widespread.
This has the remar... [more]
ISEC2014-40 SITE2014-35 ICSS2014-44 EMM2014-40
pp.281-286
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
12:55
Hokkaido   Examination of IDS Log Analysis using Discrete Wavelet Transform
Satoshi Kimura, Hiroyuki Inaba (Kyoto Inst. of Tech.) ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16
With the spread of the Internet, the illegal access to the network is increasing. To overcome this prob-
lem, various t... [more]
ISEC2013-14 SITE2013-9 ICSS2013-19 EMM2013-16
pp.27-32
IA, SITE, IPSJ-IOT [detail] 2013-03-15
10:50
Nara Todaiji Total Cultural Center Study on Cocktail Party Effect Personal Authentication System by Recognizing the Differnce of Voices
Kosei Taketa, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-63 IA2012-101
Recently, personal authentications have been important because of the popularization of personal portable devices or ICc... [more] SITE2012-63 IA2012-101
pp.163-168
IA, SITE, IPSJ-IOT [detail] 2013-03-15
11:15
Nara Todaiji Total Cultural Center Proposal of Active IDS by Risk Level Probe
Atsushi Ushida, Hiroyuki Inaba (Kyoto Inst. of Tech.) SITE2012-64 IA2012-102
Intrusion Detection System (IDS) is a security system in order to detect illegal access by checking the status of a comp... [more] SITE2012-64 IA2012-102
pp.169-174
 Results 1 - 20 of 31  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan