Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-11-22 16:50 |
Aomori |
Aomori Prefecture Tourist Center ASPM (Aomori) (Primary: On-site, Secondary: Online) |
IA2023-42 |
When a spam scam email is reported, it is desirable to share the data so that many researchers aiming to improve informa... [more] |
IA2023-42 pp.41-47 |
LOIS, SITE, ISEC |
2023-11-09 13:55 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
ISEC2023-58 SITE2023-52 LOIS2023-16 |
With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] |
ISEC2023-58 SITE2023-52 LOIS2023-16 pp.26-32 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
SIP, EA, SP, MI (Joint) [detail] |
2018-03-19 13:00 |
Okinawa |
|
[Poster Presentation]
Acoustic analysis of speech for emergency speech detection of voicemail Matsuto Hori (Meiji Univ.), Hosana Kamiyama, Satoshi Kobashikawa (NTT), Shigeki Sagayama (Meiji Univ.) EA2017-112 SIP2017-121 SP2017-95 |
In this paper, we investigate the effectiveness of acoustic features for detecting urgency in voicemail. In previous res... [more] |
EA2017-112 SIP2017-121 SP2017-95 pp.63-68 |
IA, ICSS |
2017-06-08 14:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study on Email address harvesting by free service Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5 |
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] |
IA2017-5 ICSS2017-5 pp.25-29 |
TL |
2016-12-17 10:15 |
Tokyo |
Room 303/304/305, Building #8, Waseda University |
Recipients interpretation of Japanese business email communication
-- the situation conjecture expression -- Yuki Hiramatsu (Waseda Univ.) TL2016-42 |
The purpose of this study is to clarify what kind of interpretations are available in Japanese business email communicat... [more] |
TL2016-42 pp.31-36 |
ICSS |
2015-03-04 11:15 |
Okinawa |
Meio Univiersity |
A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-86 |
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is require... [more] |
ICSS2014-86 pp.139-144 |
ICSS |
2015-03-04 14:05 |
Okinawa |
Meio Univiersity |
Targeted Malware Detection Focused on Dummy Document Display Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89 |
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] |
ICSS2014-89 pp.157-161 |
SSS |
2012-03-16 15:40 |
Tokyo |
Meiji Univ. |
Targeted Email Attack Takehiko Nakayama (National Police Agency) SSS2011-29 |
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] |
SSS2011-29 pp.17-18 |
NS, IN (Joint) |
2010-03-05 14:00 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A method of deducing the user's state of mind and preferences by analyzing pictographic characters and emoticons in mobile phone emails Ryo Yamashita, Sanae Yamaguchi, Kazumasa Takami (Soka Univ.) IN2009-211 |
As the ubiquitous environment is taking root, there are calls for services that deliver content appropriate for the indi... [more] |
IN2009-211 pp.399-404 |
IN, NS (Joint) |
2009-03-04 11:10 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Performance evaluation of policy-based managed Email systems by using agent-based approach with user characteristics Keiichi Kawaji, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) IN2008-171 |
Email is an essential communications tool, but spam emails have a negative effect on email servers and users. For exampl... [more] |
IN2008-171 pp.231-236 |
NS, ICM, CQ (Joint) |
2007-11-15 17:40 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
A queueing network approach to design of email service system Keiichi Kawaji, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) NS2007-97 |
Spam email is the massive amounts of unwanted email messages sent randomly for advertising purposes and soliciting acros... [more] |
NS2007-97 pp.17-21 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 14:40 |
Hokkaido |
Future University-Hakodate |
Partial Integrity Assurance Technology PIAT: An Application to Sender Domain Authentication Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka (FUJITSU Lab.) |
Recently, the sender domain authentication protocol DKIM (DomainKeys Identified Mail) attracts much attention, in which ... [more] |
ISEC2007-64 pp.129-132 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 15:20 |
Hokkaido |
Future University-Hakodate |
A Consideration for Detecting Virus Email by Using Mail Form Information Daisuke Miyamoto, Takuji Iimura, Youki Kadobayashi (NAIST) ISEC2007-69 |
In this paper, we argue that a novel virus mail detection system. Recently, detecting virus programs
is difficult becau... [more] |
ISEC2007-69 pp.161-168 |
DE |
2007-07-04 09:55 |
Miyagi |
Akiu hot springs (Sendai) |
Proposal of an E-mail transmission and reception range management method in RMX Satoshi Harada, Sang-Gyu Shin, Motomichi Toyama (Keio Univ) DE2007-109 |
In late years a social request of personal information protection rises.
So in a company, infomation system need mecha... [more] |
DE2007-109 pp.521-525 |
SITE, IPSJ-EIP |
2007-05-25 13:50 |
Tokyo |
|
A study on risk for using e-mail system bothered by spam messages and silent mails Takashi Okuda (Aichi Pref. Univ.) SITE2007-3 |
pam is an unwanted electronic mail often advertisements and commercial messages. The continuing increase in spam has res... [more] |
SITE2007-3 pp.11-16 |
IN |
2007-02-02 10:50 |
Aichi |
Aichi Prefectural University |
Analysis of spam email inter-arrival time characteristics: a case study Takahisa Ichikawa, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefecture Univ) IN2006-172 |
Spam is an unwanted electronic mail often advertisements and commercial messages. The continuing increase in spam has re... [more] |
IN2006-172 pp.59-64 |