IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 18 of 18  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2015-05-15
14:35
Tokyo Kikai-Shinko-Kaikan Bldg. Path analysis method of anonymous communication system Tor
Yukihiro Shibahara, Naoshi Sato (IISEC) ISEC2015-3
Anonymous communication system looks effective for the privacy protection because it could assure anonymity of path from... [more] ISEC2015-3
pp.15-22
ISEC, LOIS 2013-11-29
13:30
Miyagi Tohoku Univ. The proposal on a vulnerability evaluation method according to information system environment
Naoki Kamegai, Naoshi Sato (IISEC) ISEC2013-69 LOIS2013-35
It is essential to perform a vulnerability assessment to avoid for the security incident of own system because a lot of ... [more] ISEC2013-69 LOIS2013-35
pp.65-70
SITE, IPSJ-EIP 2013-05-16
11:25
Kanagawa Institute of Infomation Security Proposal of SNS Membership Qualification System Using Security Information Database
Yasuyoshi Okada, Kazuyuki Ishii, Naoshi Sato (Institute of Information Security) SITE2013-3
In order to assure information security of Social Networking Service (SNS), this paper proposes to introduce a membershi... [more] SITE2013-3
pp.11-16
MoNA, IE, ITE-CE, ITE-ME, IPSJ-AVM
(Joint) [detail]
2012-07-20
11:00
Ibaraki University Hall, University of Tsukuba Location Proof by GPS and WLAN Information
Tadashi Yamaguchi, Naoshi Sato (IISEC) MoMuC2012-18 IE2012-43
Location-based services (LBS) of mobile phone have entered a period of expansion, as number of smartphones equipped with... [more] MoMuC2012-18 IE2012-43
pp.43-48
ICSS, IA 2012-06-22
09:00
Tokyo Room 1206, 1st bldg, Takanawa Campus, Tokai University Proposed phishing countermeasures based on URL information analysis
Shingo Matsugaya, Naoshi Sato (IISEC) IA2012-6 ICSS2012-6
Although phishing has been conducted from various countermeasures already, the number of victims are still more likely t... [more] IA2012-6 ICSS2012-6
pp.31-36
ICSS 2012-03-16
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Proposal on Dynamic Decision Making Model for Cyber Attack and Defense Strategy
Naoshi Sato (IISEC), Hitoshi Watanabe (SUT) ICSS2011-47
This paper discusses real-time and dynamic decision making process on cyber attacks, under the game-theoretical assumpti... [more] ICSS2011-47
pp.49-54
AN, MoNA, USN
(Joint)
2011-01-21
10:30
Hiroshima Hiroshima City University Computer Simulation on Rescueing Movement using Adhoc Network in case of a disaster
Yuta Koide, Naoshi Sato, Kazuyuki Ishii (IISEC) USN2010-58
A variety of wireless networks were high-speed and steady and it came to be organizable as the wireless technology devel... [more] USN2010-58
pp.107-112
R 2009-12-18
13:50
Tokyo   An Investigation of Reliability Evaluation of Networks with Layer Structure
Ayako Suzuki (Inst. of Information Security), Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Inst. of Information Security), Masaki Hanada (Tokyo Univ. of Science) R2009-48
There are many networks organized on an exist network by using appropriate network technologies. In these cases, the re... [more] R2009-48
pp.11-16
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Network Usage Control Based on Evaluation of User Security
Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] IT2008-45 ISEC2008-103 WBS2008-58
pp.15-22
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Anomaly detection based on the machine learning of the human behavior on home network
Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] IT2008-46 ISEC2008-104 WBS2008-59
pp.23-28
IA 2009-01-29
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Method of Grouping Routers by Using Positional Addresses
Shigetoshi Okazaki, Naoshi Sato (Graduate School of Info Sec.) IA2008-64
The packet network based on the internet protocol is infrastructure of highly-networked information society, but there a... [more] IA2008-64
pp.95-100
ICM, CQ, NS
(Joint)
2008-11-13
18:00
Fukushima Nihon University A plan of the method of controlling the NGN route using an indivisual security policy
Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] CQ2008-51
pp.33-38
R 2008-05-30
15:50
Hyogo Kobe Gakuin Univ. An investigation of reliability of systems with latent failures
Hitoshi Watanabe (Tokyo Univ. of Science), Naoshi Sato (Institute of Information Security) R2008-14
There are many systems with elements of which failures are not discovered immediately after their occurrences. In these... [more] R2008-14
pp.29-34
ISEC, SITE, IPSJ-CSEC 2007-07-19
10:45
Hokkaido Future University-Hakodate A preference transmission method with information security database systems on the Internet
Yasuyoshi Okada, Naoshi Sato (I.I.S.) ISEC2007-17 SITE2007-11
The number of computer viruses or illegal accesses on the Internet is rapidly increasing. According to information techn... [more] ISEC2007-17 SITE2007-11
pp.7-14
ISEC 2007-05-18
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Spam-mail Filtering Based on Cooperation of Users and Providers
Takashi Koike (Yahoo), Naoshi Sato (IISEC) ISEC2007-13
This study proposes a spam mail filtering method by cooperation of users and internet service providers. The proposed fi... [more] ISEC2007-13
pp.85-92
CQ 2006-07-13
15:15
Hokkaido Future University-Hakodate A Relative Evaluation of Information Security Countermeasures
Hirotoshi Oomura (FUJITSU FIP), Naoshi Sato (IISEC) CQ2006-25
(To be available after the conference date) [more] CQ2006-25
pp.47-52
MVE, CQ, MoNA
(Joint)
2006-01-26
10:55
Oita Beppu Onsen Spring (Resorpia Beppu Hotel) Evaluation and Control of Transmission Performance in use of Grading Bit Error Mode
Naoshi Sato (IISEC)
The author has proposed the method for determining both the beginning and ending times of a burst error duration and for... [more] CQ2005-83
pp.25-30
CS, CAS, SIP 2005-03-15
09:30
Okayama Okayama Prefectural University Classification of Burst errors and Its Performance
Naoshi Sato (IISEC)
As a study on telecommunication service quality degradation due to burst errors, this report proposes a method for class... [more] CAS2004-97 SIP2004-140 CS2004-233
pp.1-6
 Results 1 - 18 of 18  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan