|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2019-11-13 15:20 |
Miyazaki |
MRT Terrace(Miyazaki) |
Detecting Wi-Fi channel-based man-in-the-middle attacks by scanning access points Sheng Gong, Hideya Ochiai, Hiroshi Esaki (UTokyo) ICSS2019-64 |
Today, Wi-Fi is being used as a means of near-field high-speed communication across much equipment, such as personal com... [more] |
ICSS2019-64 pp.25-30 |
CPSY, IPSJ-EMB, IPSJ-SLDM, DC [detail] |
2015-03-06 17:30 |
Kagoshima |
|
A Trial Investigation System for Vulnerability on M2M Network Kiyotaka Atsumi (ka-lab) CPSY2014-172 DC2014-98 |
Nowadays, M2M networks are growing up more and more, and many devices are active in M2M networks. Various devices are ex... [more] |
CPSY2014-172 DC2014-98 pp.61-64 |
ICSS, IA |
2014-06-05 13:35 |
Hyogo |
Takikawa Memorial Hall, Kobe University |
[Invited Talk]
A two-path authentication for protecting net banking against illegal access
-- How to prevent Man-In-The-Middle/Browser Attack -- Haruhiko Fujii (NTT) IA2014-1 ICSS2014-1 |
(To be available after the conference date) [more] |
IA2014-1 ICSS2014-1 pp.1-5 |
ICSS, IPSJ-SPT |
2014-03-27 15:45 |
Okinawa |
Meio Univiersity |
On Threats of Impersonation and Man-In-The-Middle Attack on Network Printers Yuka Enomoto, Akira Kanaoka (Toho Univ.) ICSS2013-68 |
From Windows Vista, automatic network printer discovery and configuration is available by UPnP functions.
Recent Window... [more] |
ICSS2013-68 pp.37-41 |
PN |
2013-03-12 14:10 |
Okinawa |
Okinawa-ken Seinen-Kaikan |
Prevention Properties of Optical-CDMA and Y-00 Quantum Stream Cipher against Signal Altenation Attacks Takehisa Iwakoshi, Osamu Hirota (Tamagawa Univ.) PN2012-89 |
In the modern society, mathematical ciphers are often used to protect transmitted data. However, there are possibilities... [more] |
PN2012-89 pp.65-69 |
IT, ISEC, WBS |
2010-03-04 11:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55 |
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] |
IT2009-76 ISEC2009-84 WBS2009-55 pp.31-38 |
ICSS |
2009-05-15 17:05 |
Hyogo |
Kobe University |
A Mutual Authentication System for Web Access Using Web Browser Extension and Cellular Phone Yukiko Sawaya, Yutaka Miyake (KDDI Labs.) ICSS2009-8 |
The two-factor client authentication methods such as one-time password scheme or using cellular phone network with ID/pa... [more] |
ICSS2009-8 pp.37-42 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|