IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 1071  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT, ISEC, RCC, WBS 2022-03-11
09:40
Tokyo Waseda Univ. [Invited Talk] Fundamentals and Security of Encrypted Control Systems
Kiminao Kogiso, Kaoru Teranishi (UEC)
(To be available after the conference date) [more]
IA 2022-01-28
13:35
Tokyo Kikai-Shinko-Kaikan Bldg.
(Primary: On-site, Secondary: Online)
A Feature Data Distribution Method for Human Tracking on Multiple Cameras Systems
Satoru Matsumoto, Tomoki Yoshihisa (Osaka Univ.) IA2021-53
(To be available after the conference date) [more] IA2021-53
pp.1-4
RECONF, VLD, CPSY, IPSJ-ARC, IPSJ-SLDM [detail] 2022-01-25
10:20
Online Online FPGA Implementation of Radar Imaging for Walk-Through Security Screening System
Tatsuya Sumiya, Yuki Kobayashi, Masayuki Ariyoshi (NEC) VLD2021-64 CPSY2021-33 RECONF2021-72
(To be available after the conference date) [more] VLD2021-64 CPSY2021-33 RECONF2021-72
pp.84-89
RCS, SIP, IT 2022-01-20
09:55
Online Online A study on Complexity Reduction and Performance Improvement of Polar Coded Chaos Modulation Utilizing Multi-purpose Frozen Bits
Keisuke Asano, Mamoru Okumura, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) IT2021-29 SIP2021-37 RCS2021-197
In recent years, fifth-generation mobile communications system (5G) has been deployed, and the communications of confide... [more] IT2021-29 SIP2021-37 RCS2021-197
pp.7-12
DC 2021-12-10
14:00
Kagawa
(Primary: On-site, Secondary: Online)
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] DC2021-57
pp.13-18
QIT
(2nd)
2021-11-30
15:30
Online Online [Invited Talk] Recent progress in the security proof of quantum key distribution in the finite-key regime
Toshihiko Sasaki (Univ. of Tokyo)
We show a finite-key analysis method for a broad type of quantum key distribution protocols based on a numerical optimiz... [more]
ICSS 2021-11-29
13:50
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Automation of Security Vulnerability Analysis by Auto-generated DFD
Shun Miyazaki, Junpei Kamimura (NEC) ICSS2021-48
System vulnerabilities can be caused by bugs such as buffer overflow, misconfigurations such as improper permission cont... [more] ICSS2021-48
pp.13-18
ICSS 2021-11-30
10:20
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Monitoring IPv6 packets by dynamic routing in a LAN configured with IPv4
Yuki Yagi, Hideya Ochiai, Hiroshi Esaki (the Univ. of Tokyo) ICSS2021-56
With IPv4 address exhaustion, the transition to IPv6 has been progressing in recent years, but the security measures for... [more] ICSS2021-56
pp.61-66
CQ, ICM, NS, NV
(Joint)
2021-11-26
11:15
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
[Invited Talk] Security Technology for SDN-Based New Generation Network
Satoru Izumi (NIT, Sendai) NS2021-90 CQ2021-72 ICM2021-25
Internet of Things (IoT) society in which various devices such as laptop, smart phone, tablet, home appliances, vehicle,... [more] NS2021-90 CQ2021-72 ICM2021-25
p.36(NS), p.41(CQ), p.19(ICM)
CQ, ICM, NS, NV
(Joint)
2021-11-26
14:50
Fukuoka JR Hakata Stn. Hakata EkiHigashi Rental Room
(Primary: On-site, Secondary: Online)
Data privacy protection method for blockchain by using secret sharing
Jun Nakajima (Hitachi) ICM2021-27
As a form of blockchain(BC), permission-type BC that forms a BC network between specific organizations is attracting att... [more] ICM2021-27
pp.21-26
RISING
(3rd)
2021-11-16
09:30
Tokyo
(Primary: On-site, Secondary: Online)
On Attack Pattern Classification in IoT Networks for Network Intrusion Detection Systems
Jesse Atuhurra, Takanori Hara (NAIST), Yuanyu Zhang (Xidian Univ.), Shoji Kasahara (NAIST)
With the proliferation of IoT devices, IoT security problems arise. To protect heterogeneous connected devices in IoT ne... [more]
RCS 2021-10-21
10:50
Online Online Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO
Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] RCS2021-120
pp.13-18
ICTSSL, IEE-SMF, IN 2021-10-21
09:25
Online Online A Phone Adaptor for Repulsing Telephone Scams
Haruki Ishikawa, Hiroaki Hata (Fukui KOSEN) ICTSSL2021-19
The number of victims of telephone scams remains high, and the total amount of damage in 2020 is said to be over 28 bill... [more] ICTSSL2021-19
pp.7-11
ICTSSL, IEE-SMF, IN 2021-10-21
09:50
Online Online Proposal and Evaluation of Cryptographic Communication Method that Separates Components Related to Coding and Decoding in IoT Environment
Reita Suzuki (Niigata Univ.), Takafumi Hayashi (Nihon Univ.), Keisuke Nakano (Niigata Univ.) ICTSSL2021-20
MQTT is one of the lightweight messaging protocols currently used in the IoT environment, but there is no clear rule reg... [more] ICTSSL2021-20
pp.12-17
RCS 2021-10-22
13:50
Online Online Study on Performance Improvement of Radio-Wave Encrypted Modulation by LLR Clipping
Mamoru Okumura, Keisuke Asano, Takumi Abe, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2021-137
In recent years, physical layer security technologies that encrypt the physical layer using information theory have attr... [more] RCS2021-137
pp.100-105
HWS, ICD [detail] 2021-10-19
15:00
Online Online A Survey on Security Requirements in System-on-Chip(SoC)
Yasuyuki Kawanishi, Hirotaka Yoshida (AIST) HWS2021-49 ICD2021-23
In the EU, a cybersecurity certification scheme for IoT products based on the Common Criteria is being developed. At tha... [more] HWS2021-49 ICD2021-23
pp.43-48
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
CS 2021-10-15
10:15
Online Online A study on traffic monitoring method for control networks
Ginga Katsurai, Hiroaki Mukai, Tetsuya Yokotani (KIT) CS2021-56
In recent years, cyber attacks targeting control systems such as buildings and factories have become apparent. There is ... [more] CS2021-56
pp.20-25
PRMU 2021-10-09
11:15
Online Online Path dependence of latent personal characteristic features in swiping behavior
Kazuki Sakai, Josuke Kuroiwa, Tomohiro Odaka, Haruhiko Sirai (Fukui Univ.), Izumi Suwa (Jin-ai Women's College) PRMU2021-23
The purpose of this paper is to investigate the path dependency of personal authentication using latent personal charact... [more] PRMU2021-23
pp.40-45
IN, NS, CS, NV
(Joint)
2021-09-09
14:05
Online Online A Machine Learning Based Network Intrusion Detection System with Appling Different Algorithms in Multiple Stages
Seiichi Sasa, Hiroyuki Suzuki, Akio Koyama (Yamagata Univ.) NS2021-63
In recent years, the rapid development of Information and Communication Technology (ICT) has led to the provision of a w... [more] NS2021-63
pp.36-41
 Results 1 - 20 of 1071  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan