|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-10 15:25 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Improvements for Enhancing the Reliability of NFTs
-- NFT Challenges and Solutions -- Yasushi Nakayama (SBI FERI) ISEC2023-72 SITE2023-66 LOIS2023-30 |
Non-Fungible Token (NFT) is a technology that enables the "one and only" nature of the target digital data, as well as p... [more] |
ISEC2023-72 SITE2023-66 LOIS2023-30 pp.114-118 |
BioX |
2022-10-03 17:00 |
Okinawa |
|
Unsolved problems in self-sovereign identity
-- A study on SSI using biometrics (Part 1) -- Kenta Takahashi (Hitachi) BioX2022-60 |
The concept of Self-sovereign identity (SSI), which states that users should be able to manage their own identity inform... [more] |
BioX2022-60 pp.26-31 |
WBS, IT, ISEC |
2021-03-05 10:55 |
Online |
Online |
Digital Signatures with Wildcards Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) IT2020-147 ISEC2020-77 WBS2020-66 |
Recently, many IoT devices have been used, and the number of IoT devices will increase in near future. In such era, it w... [more] |
IT2020-147 ISEC2020-77 WBS2020-66 pp.213-218 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:20 |
Hokkaido |
San-Refure Hakodate |
Privacy Invasion and the Concept of the "Digital Person"
-- Understanding Based on Information Ethics and Goffman's Dramaturgy Theory -- Takushi Otani (Kibi International Univ.) ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 |
This article explores the harm caused by the misuses of the “digital person,” which is the aggregated personal data from... [more] |
ISEC2014-28 SITE2014-23 ICSS2014-32 EMM2014-28 pp.205-212 |
WBS, IT, ISEC |
2009-03-10 16:40 |
Hokkaido |
Hakodate Mirai Univ. |
Construction of EUF-CMA-secure Digital Signatures Based on weak Identity-Based Signatures Takahiro Oshima, Taiichi Saito (Tokyo Denki Univ.) IT2008-129 ISEC2008-187 WBS2008-142 |
In 2004, Canetti, Halevi, and Katz proposed a construction of an IND-CCA-secure Public-Key Encryption (PKE) scheme from ... [more] |
IT2008-129 ISEC2008-187 WBS2008-142 pp.557-562 |
ICM |
2008-05-09 13:35 |
Kagoshima |
Kagoshima Public Access Center |
Nayose Problem and Approach in Issuing Nagoya University ID as a Lifelong User ID Yoshihiro Ohta, Shoji Kajita, Yoshinori Tajima, Hisanori Tajima, Yasushi Hirano, Hisashi Naito, Kenji Mase (Nagoya Univ.) ICM2008-20 |
Nagoya University introduced “a lifelong User ID” (Nagoya University ID), and began to provide the
production service ... [more] |
ICM2008-20 pp.109-114 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|