Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS |
2016-03-04 10:40 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on variations in the false rejection rate and the false acceptance rate on human-behavior-based authentication Kenichiro Muto, Ryo Yamada, Fumiaki Kudo, Hideki Kawabe, Takahiro Yamamoto (NTT) LOIS2015-85 |
False rejection rate (FRR) and false acceptance rate (FAR) are generally used as indices of identification accuracy in b... [more] |
LOIS2015-85 pp.127-132 |
LOIS |
2016-03-04 11:00 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on personalized selection methods for authentication elements and algorithms Fumiaki Kudo, Kenichiro Muto, Hideki Kawabe, Takahiro Yamamoto (NTT) LOIS2015-86 |
Modern smartphones and wearable devices comprise a multitude of sensors which can be utilized to measure a variety of us... [more] |
LOIS2015-86 pp.133-138 |
LOIS |
2016-03-04 11:20 |
Okinawa |
Central Community Center, Miyakojima-City |
A study on data protection requirements for an authentication system using personal data Miho Ikeda, Kenichiro Muto, Hideki Kawabe, Fumiaki Kudo, Takahiro Yamamoto (NTT) LOIS2015-87 |
We have been researching new authentication which identifies users by analyzing personal characteristics of human behavi... [more] |
LOIS2015-87 pp.139-144 |
IA, ICSS |
2015-06-12 10:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
Experimental Results on an Attack Detection System for Advanced Persistent Threats Kenichiro Muto, Yasuhiro Okumura, Shinya Kuramoto, Hidemori Ikeda, Mitsuhiro Hatada, Takayuki Watanabe (NTT Communications), Tohru Sato, Kazufumi Aoki (NTT), Junichi Murakami, Kazuyuki Iso, Yasuhiro Kunda (FFRI), Toshio Nawa, Mai Kiuchi (CDI) IA2015-9 ICSS2015-9 |
In this paper, we proposed an attack detection system, which is a component of the model a security model against advanc... [more] |
IA2015-9 ICSS2015-9 pp.45-50 |
LOIS |
2012-03-08 13:50 |
Okinawa |
Meio Univ. |
A Proposal of Situation-Sensitive Application Launcher for Smartphones Ryota Sato, Kenichiro Muto, Sakae Chikara, Shigeru Kayaguchi (NTT) LOIS2011-83 |
According to the rapid spread of smartphones, their usage pattern is becoming diversified. For instance, some companies ... [more] |
LOIS2011-83 pp.61-66 |
ISEC, LOIS |
2011-11-15 10:55 |
Osaka |
Osaka Electro-Communication University |
A Method to Find Vulnerable Cryptographic Algorithms in SSH Protocol Satoshi Hara (UEC), Kenichiro Muto, Sakae Chikara, Yoshiaki Seki (NTT) ISEC2011-52 LOIS2011-46 |
Secure Shell (SSH), a network protocol for secure data communication between two networked computers that connects via a... [more] |
ISEC2011-52 LOIS2011-46 pp.123-128 |
LOIS |
2011-03-04 09:10 |
Okinawa |
Ishigaki IT business support center |
A Consideration of Security Risk in Compromising Hash Function
-- An Exposure of Vulnerability against Information Storage System -- Kenichiro Muto, Sakae Chikara, Katsuhiko Yoshida, Shigeru Kayaguchi, Yoshiaki Seki (NTT Corp.) LOIS2010-81 |
Lifelog and office information systems store processing data. Because these systems process data with these stored data,... [more] |
LOIS2010-81 pp.95-100 |
ISEC, LOIS |
2010-11-18 09:00 |
Ibaraki |
Tsukuba Univ. |
Sample Investigation and the Consideration to Compromising Cryptosystems in SSL Seiji Takano (UEC), Ryota Sato, Kenichiro Muto, Sakae Chikara, Masayuki Kanda, Yoshiaki Seki (NTT) ISEC2010-59 LOIS2010-38 |
In the information society, the encryption technology is indispensable. The improvement of computer performance causes t... [more] |
ISEC2010-59 LOIS2010-38 pp.65-72 |
ISEC, IT, WBS |
2008-02-29 08:55 |
Tokyo |
|
Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) IT2007-50 ISEC2007-147 WBS2007-81 |
Enocoro is a pseudorandom number generator for a stream cipher proposed by Hitachi,Ltd at ISEC in September, 2007.
In... [more] |
IT2007-50 ISEC2007-147 WBS2007-81 pp.7-13 |