IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 13 of 13  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2023-11-22
16:00
Aomori Aomori Prefecture Tourist Center ASPM (Aomori)
(Primary: On-site, Secondary: Online)
A Study on BGP Routing Operations in the Deployment of ASPA as Path Validation
Yusho Yamaguchi (Osaka Univ.), Taiji Kimura (JPNIC), Naoto Yanai, Atsuo Inomata (Osaka Univ.) IA2023-40
Autonomous Systems Path Authorization (ASPA) is a technology for verifying routing information advertised in Border Gate... [more] IA2023-40
pp.25-32
ISEC 2023-05-17
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities (from BRAIN 2023)
Chihiro Kado, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Shingo Okamura (NIT, Nara College) ISEC2023-11
Vulnerabilities are an important issue in Ethereum smart contracts. Although various vulnerability analysis tools have b... [more] ISEC2023-11
pp.62-64
RCC, ISEC, IT, WBS 2023-03-14
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Claimable Designated Verifier Signature
Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
pp.171-178
ICSS, IPSJ-SPT 2023-03-13
16:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Implementation and Evaluation for Remote-Control Security System of IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] ICSS2022-67
pp.115-120
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
NS, NWS
(Joint)
2022-01-28
13:30
Online Online Implementation and Evaluation for A Self-Stabilizing Leader Election Algorithm on the Population Protocol Model
Keitaro Watanabe, Hideharu Kojima (Osaka Univ.), Yuichi Sudo (Hosei Univ.), Naoto Yanai, Tatsuhiro Tsuchiya (Osaka Univ.) NS2021-120
 [more] NS2021-120
pp.56-61
NS 2021-10-06
15:45
Online Online Implementation of smart contracts with an access control by attribute based encryption
Takumi Okano, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tsuchiya (Osaka Univ.)
 [more]
WBS, IT, ISEC 2021-03-05
14:20
Online Online Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) IT2020-156 ISEC2020-86 WBS2020-75
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many smart contract vulnerabilities have ... [more] IT2020-156 ISEC2020-86 WBS2020-75
pp.273-280
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:30
Kochi Kochi University of Technology SecureHID: Securing the USB Interface
Jan Goette (Waseda Univ.), Naoto Yanai (Osaka Univ.), Tatsuya Mori (Waseda Univ.) ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38
 [more] ISEC2019-35 SITE2019-29 BioX2019-27 HWS2019-30 ICSS2019-33 EMM2019-38
pp.199-206
ICSS, IA 2018-06-26
10:45
Ehime Ehime University [Invited Talk] Security Analysis with Formal Methods
Naoto Yanai (Osaka Univ.) IA2018-12 ICSS2018-12
For security analysis of information security researches, a method with a formal proof has attracted attention in recent... [more] IA2018-12 ICSS2018-12
pp.73-75
ICSS, IPSJ-SPT 2016-03-03
16:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University Privacy-preserving Log Analysis with Deterministic Encryption
Yuji Furuta, Naoto Yanai (Osaka Univ.), Masashi Karasaki (NTT-neomeit), Katsuhiko Eguchi (NTT Neomeit), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) ICSS2015-54
Recently, an increase of attacks via a network is remarkable, and the observation and the analysis of log information is... [more] ICSS2015-54
pp.41-46
ICSS 2015-03-04
09:50
Okinawa Meio Univiersity An Estimation of Signature Schemes for Multiple Signers
Kenta Muranaka, Naoto Yanai (Osaka Univ.), Shingo Okamura (NITNC), Toru Fujiwara (Osaka Univ.) ICSS2014-78
A signature scheme for multiple signers is a cryptographic primitive where each signer generates an individual signature... [more] ICSS2014-78
pp.91-96
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
09:10
Hokkaido   A Note on a Construction of Gateway Threshold Password-based Authenticated Key Exchange
Yukou Kobayashi, Naoto Yanai, Takashi Nishide, Eiji Okamoto (Univ. of Tsukuba) ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
Password-based authenticated key exchange (PAKE) allowing users to utilize passwords as secret information is suitable f... [more] ISEC2013-35 SITE2013-30 ICSS2013-40 EMM2013-37
pp.247-254
 Results 1 - 13 of 13  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan