Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Security Analysis on End-to-End Encryption of Zoom Mail Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ICSS2023-71 |
Zoom Mail, an email service offered by Zoom Video Communications, incorporates an end-to-end encryption (E2EE) scheme, t... [more] |
ICSS2023-71 pp.17-24 |
ICSS, IPSJ-SPT |
2023-03-13 16:30 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Evaluation and countermeasures of notification destination restoration attacks using password recovery functions of multiple web services Ryusei Ishikawa, Soramichi Akiyama (Ritsumeikan Univ.), Atsuo Inomata (Ritsumeikan Univ., Osaka Univ.), Tetsutaro Uehara (Ritsumeikan Univ.) ICSS2022-62 |
Many web services with a login function using pair of ID and password have the password recovery function in case the us... [more] |
ICSS2022-62 pp.85-90 |
SSS |
2017-09-19 15:40 |
Tokyo |
|
[Invited Talk]
The mission of Product Test of National Consumer Affairs Center of Japan(NCAC) Koji Matsumoto (NCAC) SSS2017-23 |
Consumer inquiries received by local consumer centers across Japan include information on accidents (e.g. injuries incur... [more] |
SSS2017-23 pp.17-20 |
IA, ICSS |
2017-06-08 14:50 |
Kochi |
Kochi University of Technolo, Eikokuji Campus |
Study on Email address harvesting by free service Keisuke Hashida, Masaru Kawakita, Shigeyoshi Shima (NEC) IA2017-5 ICSS2017-5 |
The cyberattack for which an e-mail was used in recent years is a big problem socially. An indefinite point keeps also h... [more] |
IA2017-5 ICSS2017-5 pp.25-29 |
IA |
2016-11-04 13:30 |
Overseas |
Taipei (Taiwan) |
Multi-site distributed backup system for mail service for disaster preparedness Masatoshi Kakiuchi, Takahiro Tsujii, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2016-50 |
Distributed system across multiple sites is effective ways for information service continuity for disaster preparedness.... [more] |
IA2016-50 pp.109-112 |
ICM, LOIS |
2016-01-21 16:45 |
Fukuoka |
Fukuoka Institute of Technology |
[Invited Talk]
Case studies of targeted attacks stealing information within companies, and our information security management in NTT Communications Yoshiyasu Nishibe, Ken Ito, Masaki Onishi (NTT Com) ICM2015-33 LOIS2015-55 |
In recent years, information leakage incidents caused by malware has never come to an end in companies and organizations... [more] |
ICM2015-33 LOIS2015-55 pp.41-46 |
IN |
2012-01-26 15:20 |
Hokkaido |
Asahikawa-Terminal-Hotel |
A Survey on Immediacy of Mail Transfers from Mobile-phones Tohru Asami, Manabu Isomura, Wei Zhu, Yoshihiro Kawahara (Todai) IN2011-125 |
At the Tohoku Earthquake on 11 March 2011, mobile operators applied originator regurations from 70% to 90% to their pho... [more] |
IN2011-125 pp.29-34 |
WIT |
2010-05-21 16:15 |
Niigata |
Tokimate, Univ. of Niigata |
Development of a Mail Service that Supplys Surrounding Information Using the GPS Function of Mobile Phones George Akiyama, Tetsuya Watanabe, Ken Watanabe, Toshimitsu Yamaguchi (Niigata Univ.), Kazunori Minatani (Nati. Center for Univ. Entrance Examination), Manabi Miyagi (Tsukuba Univ. of Tech.), Susumu Oouchi (Nati. Inst. of Special Needs Education) WIT2010-7 |
Fujitsu's RakuRaku phone series with the voice output function can send GPS information by e-mail. Using this informatio... [more] |
WIT2010-7 pp.33-37 |
NS, IN (Joint) |
2010-03-05 14:00 |
Miyazaki |
Miyazaki Phoenix Seagaia Resort (Miyazaki) |
A method of deducing the user's state of mind and preferences by analyzing pictographic characters and emoticons in mobile phone emails Ryo Yamashita, Sanae Yamaguchi, Kazumasa Takami (Soka Univ.) IN2009-211 |
As the ubiquitous environment is taking root, there are calls for services that deliver content appropriate for the indi... [more] |
IN2009-211 pp.399-404 |
IN, NS (Joint) |
2009-03-04 11:10 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Performance evaluation of policy-based managed Email systems by using agent-based approach with user characteristics Keiichi Kawaji, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) IN2008-171 |
Email is an essential communications tool, but spam emails have a negative effect on email servers and users. For exampl... [more] |
IN2008-171 pp.231-236 |
MBE |
2008-11-21 13:25 |
Miyagi |
Dept. Eng, Tohoku University |
Monitoring system to prevent accidents for blood purification Shouta Oda, Masataka Kitama, Kazuyuki Kimura, Junji Arisawa (Hokkaido Institute of Technology) MBE2008-64 |
There is accidents removing of the needle in daily dialysis services. Self-removal of the needle is a patient removes th... [more] |
MBE2008-64 pp.7-10 |
IA |
2008-11-05 14:30 |
Toyama |
Tateyama Kokusai Hotel |
Designing a certified mail exchnage protocol using gradual secret exchanging protocols Keita Shimizu, Shuichi Miyazaki, Yasuo Okabe (Kyoto Univ.) IA2008-42 |
These days, we more and more depends on e-mails and demands on certified e-mail is growing.
However some commercial ser... [more] |
IA2008-42 pp.7-12 |
SITE, IPSJ-EIP |
2008-05-30 16:30 |
Tochigi |
Utsunomiya University |
The Issues of Online Personal Health Information Exchange Daisuke Yamakata, Hiroki Nogawa, Hiroshi Tanaka (TMD) SITE2008-7 |
In this research, we study issues of the government plan for the Personal Health Information exchange via network. In re... [more] |
SITE2008-7 pp.35-38 |
ICM |
2008-05-08 16:00 |
Kagoshima |
Kagoshima Public Access Center |
Construction and Management of Unified-Server in Nagoya University Hisashi Naito, Yukiko Yamaguchi, Shoji Kajita, Yasushi Hirano, Kenji Mase (Nagoya Univ.) ICM2008-9 |
In Nagoya University, we have constructed Unified-Server to integrate a lot of deceterized e-mail and
web servers in Un... [more] |
ICM2008-9 pp.47-52 |
NS, ICM, CQ (Joint) |
2007-11-15 17:40 |
Fukuoka |
Institute of System LSI Design Industry, Fukuoka |
A queueing network approach to design of email service system Keiichi Kawaji, Takashi Okuda, Tetsuo Ideguchi, Xuejun Tian (Aichi Prefectural Univ.) NS2007-97 |
Spam email is the massive amounts of unwanted email messages sent randomly for advertising purposes and soliciting acros... [more] |
NS2007-97 pp.17-21 |
ISEC |
2007-05-18 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Spam-mail Filtering Based on Cooperation of Users and Providers Takashi Koike (Yahoo), Naoshi Sato (IISEC) ISEC2007-13 |
This study proposes a spam mail filtering method by cooperation of users and internet service providers. The proposed fi... [more] |
ISEC2007-13 pp.85-92 |
NS, IN (Joint) |
2007-03-09 10:30 |
Okinawa |
Okinawa Convention Center |
Mail Sending method to make voice connection trigger Akihisa Hattori, Hiroshi Saga, Hitoshi Sasaki (NTT DoCoMo) NS2006-212 |
We find that some of our company customers would like to send emails automatically to users who called its information c... [more] |
NS2006-212 pp.279-284 |
RCS, SIP |
2007-01-24 15:35 |
Okinawa |
NICT Okinawa |
The Mail Roaming System over Multilink onboard Trains Kazuhiro Yamada, Seiji Imai (CJRC), Yuichi Tanaka, Kinya Asano (Oki) SIP2006-132 RCS2006-190 |
It is difficut to deploy a broadband communication system onto the entire track of an intercity high speed rail from tec... [more] |
SIP2006-132 RCS2006-190 pp.87-92 |