IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2023-11-22
16:50
Aomori Aomori Prefecture Tourist Center ASPM (Aomori)
(Primary: On-site, Secondary: Online)
IA2023-42 When a spam scam email is reported, it is desirable to share the data so that many researchers aiming to improve informa... [more] IA2023-42
pp.41-47
LOIS, SITE, ISEC 2023-11-09
13:55
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
ISEC2023-58 SITE2023-52 LOIS2023-16 With the spread of work style reforms such as remote work, communication about information security risks tends to be in... [more] ISEC2023-58 SITE2023-52 LOIS2023-16
pp.26-32
ICSS, IPSJ-SPT 2023-03-13
16:30
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services
Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] ICSS2022-62
pp.85-90
SIP, EA, SP, MI
(Joint) [detail]
2018-03-19
13:00
Okinawa   [Poster Presentation] Acoustic analysis of speech for emergency speech detection of voicemail
Matsuto Hori (Meiji Univ.), Hosana Kamiyama, Satoshi Kobashikawa (NTT), Shigeki Sagayama (Meiji Univ.) EA2017-112 SIP2017-121 SP2017-95
In this paper, we investigate the effectiveness of acoustic features for detecting urgency in voicemail. In previous res... [more] EA2017-112 SIP2017-121 SP2017-95
pp.63-68
IA, ICSS 2017-06-08
14:50
Kochi Kochi University of Technolo, Eikokuji Campus Study on Email address harvesting by free service
Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] IA2017-5 ICSS2017-5
pp.25-29
TL 2016-12-17
10:15
Tokyo Room 303/304/305, Building #8, Waseda University Recipients interpretation of Japanese business email communication -- the situation conjecture expression --
Yuki Hiramatsu (Waseda Univ.) TL2016-42
The purpose of this study is to clarify what kind of interpretations are available in Japanese business email communicat... [more] TL2016-42
pp.31-36
ICSS 2015-03-04
11:15
Okinawa Meio Univiersity A Multi-Party Optimistic Certified Email Protocol Using Verifiably Encrypted Signature Scheme For Line Topology
Hitoshi Miyazaki (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Kobe Univ.) ICSS2014-86
While many two-party fair exchange protocols have been proposed, more than three-party fair exchange protocol is require... [more] ICSS2014-86
pp.139-144
ICSS 2015-03-04
14:05
Okinawa Meio Univiersity Targeted Malware Detection Focused on Dummy Document Display
Yusuke Takahashi, Ryota Kikkawa, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) ICSS2014-89
In recent years, targeted attacks have become a bigger threat. Attackers usually try to intrude into targeted organizati... [more] ICSS2014-89
pp.157-161
SSS 2012-03-16
15:40
Tokyo Meiji Univ. Targeted Email Attack
Takehiko Nakayama (National Police Agency) SSS2011-29
Targeted e-mail attack is a form of attacks sending malicious e-mail to specific individual or company and it is very hu... [more] SSS2011-29
pp.17-18
NS, IN
(Joint)
2010-03-05
14:00
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) A method of deducing the user's state of mind and preferences by analyzing pictographic characters and emoticons in mobile phone emails
Ryo Yamashita, Sanae Yamaguchi, Kazumasa Takami (Soka Univ.) IN2009-211
As the ubiquitous environment is taking root, there are calls for services that deliver content appropriate for the indi... [more] IN2009-211
pp.399-404
IN, NS
(Joint)
2009-03-04
11:10
Okinawa Okinawa-Zanpamisaki Royal Hotel Performance evaluation of policy-based managed Email systems by using agent-based approach with user characteristics
Keiichi Kawaji, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) IN2008-171
Email is an essential communications tool, but spam emails have a negative effect on email servers and users. For exampl... [more] IN2008-171
pp.231-236
NS, ICM, CQ
(Joint)
2007-11-15
17:40
Fukuoka Institute of System LSI Design Industry, Fukuoka A queueing network approach to design of email service system
Keiichi Kawaji, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) NS2007-97
Spam email is the massive amounts of unwanted email messages sent randomly for advertising purposes and soliciting acros... [more] NS2007-97
pp.17-21
ISEC, SITE, IPSJ-CSEC 2007-07-20
14:40
Hokkaido Future University-Hakodate Partial Integrity Assurance Technology PIAT: An Application to Sender Domain Authentication
Yoshiki Higashikado, Tetsuya Izu, Masahiko Takenaka, Takashi Yoshioka (FUJITSU Lab.)
Recently, the sender domain authentication protocol DKIM (DomainKeys Identified Mail) attracts much attention, in which ... [more] ISEC2007-64
pp.129-132
ISEC, SITE, IPSJ-CSEC 2007-07-20
15:20
Hokkaido Future University-Hakodate A Consideration for Detecting Virus Email by Using Mail Form Information
Daisuke Miyamoto, Takuji Iimura, Youki Kadobayashi (NAIST) ISEC2007-69
In this paper, we argue that a novel virus mail detection system. Recently, detecting virus programs
is difficult becau... [more]
ISEC2007-69
pp.161-168
DE 2007-07-04
09:55
Miyagi Akiu hot springs (Sendai) Proposal of an E-mail transmission and reception range management method in RMX
Satoshi Harada, Sang-Gyu Shin, Motomichi Toyama (Keio Univ) DE2007-109
In late years a social request of personal information protection rises.
So in a company, infomation system need mecha... [more]
DE2007-109
pp.521-525
SITE, IPSJ-EIP 2007-05-25
13:50
Tokyo   A study on risk for using e-mail system bothered by spam messages and silent mails
Takashi Okuda (Aichi Pref. Univ.) SITE2007-3
pam is an unwanted electronic mail often advertisements and commercial messages. The continuing increase in spam has res... [more] SITE2007-3
pp.11-16
IN 2007-02-02
10:50
Aichi Aichi Prefectural University Analysis of spam email inter-arrival time characteristics: a case study
Takahisa Ichikawa, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefecture Univ) IN2006-172
Spam is an unwanted electronic mail often advertisements and commercial messages. The continuing increase in spam has re... [more] IN2006-172
pp.59-64
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan