Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2024-01-25 16:10 |
Tokyo |
Kwansei Gakuin Univiversity, Marunouchi Campus (Primary: On-site, Secondary: Online) |
[Poster Presentation]
Analyzing Cybersecurity Datasets
-- Enhancing Security throughout the Data Life Cycle -- Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63 |
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] |
IA2023-63 pp.37-39 |
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] |
2022-11-29 15:05 |
Kumamoto |
(Primary: On-site, Secondary: Online) |
Evaluation of power delivery networks in secure semiconductor systems Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 |
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] |
VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56 pp.82-86 |
VLD, HWS [detail] |
2022-03-08 17:15 |
Online |
Online |
Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82 |
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] |
VLD2021-105 HWS2021-82 pp.164-169 |
ICSS, IPSJ-SPT |
2022-03-08 13:00 |
Online |
Online |
Remote-Control System for Securing IoT Devices Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73 |
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] |
ICSS2021-73 pp.87-92 |
IT |
2020-12-03 16:40 |
Online |
Online |
Implementation and security evaluation of wiretap channel coding in noisy channels Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62 |
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] |
IT2020-62 pp.206-211 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 09:30 |
Kochi |
Kochi University of Technology |
Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA
-- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis -- Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 |
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] |
ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45 pp.243-249 |
HWS |
2019-04-12 13:55 |
Miyagi |
Tohoku University |
Construction of a System to Evaluate Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2019-2 |
Since the output of instrumentation systems such as sensors in a broad sense can have a significant impact on a system t... [more] |
HWS2019-2 pp.7-12 |
HWS, VLD |
2019-03-02 13:30 |
Okinawa |
Okinawa Ken Seinen Kaikan |
An Instrumentation Security Metric for ToF Depth-Image Cameras Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) VLD2018-141 HWS2018-104 |
We are constructing a system for evaluating instrumentation security of ToF Depth-Image Cameras based on pulse-light spo... [more] |
VLD2018-141 HWS2018-104 pp.283-288 |
ISEC |
2018-09-07 09:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Development of Portable Automotive Security Testbed with Adaptability: PASTA Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51 |
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] |
ISEC2018-51 pp.7-14 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 13:35 |
Hokkaido |
Sapporo Convention Center |
A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17 |
The ToF depth-image camera is a device capable of simultaneously measuring distances within a certain range and it is be... [more] |
ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17 pp.61-68 |
EMM |
2017-11-07 13:25 |
Kagoshima |
Kagoshima Univ. (Inamori Academy) |
A study of obfuscation for the security enhancement of watermarking schemes Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-65 |
In general, watermark information is embedded into the host signals selected from digital content according to a secret ... [more] |
EMM2017-65 pp.53-58 |
RCS, AP (Joint) |
2016-11-24 10:20 |
Kyoto |
Kyoto International Community House |
Performance Analysis of Physical Layer Security Over Rician/Nakagami-m Fading Channels Shunya Iwata, Tomoaki Ohtsuki (Keio Univ.), Pooi Yuen Kam (National Univ. of Singapore/Keio Univ.) RCS2016-191 |
In this report, we investigate the secrecy performance of single-input single-output (SISO) system over fading, in which... [more] |
RCS2016-191 pp.1-6 |
IN, ICTSSL, NWS (Joint) |
2016-10-20 11:50 |
Osaka |
Osaka Uinv. |
Construction of Evaluation System in Crisis Management Contest Sakamoto Hirofumi (Wakayama Univ.) IN2016-50 |
Today the high reliability of the information security has been requested, the information security is the number of eng... [more] |
IN2016-50 pp.9-14 |
ICSS |
2014-11-27 14:20 |
Miyagi |
Tohoku Gakuin University (Tagajo Campus) |
Dynamic Zoning of the Industrial Control System for Security improvement Wataru Machii, Isao Kato, Masahito Koike, Masafumi Matta, Tomomi Aoyama, Ichiro Koshijima, Yoshihiro Hashimoto (NIT) ICSS2014-52 |
In the previous paper, our authors proposed a design methodology of zones and conduits not only to isolate incidents cau... [more] |
ICSS2014-52 pp.7-12 |
ISEC, LOIS, SITE |
2014-11-22 09:25 |
Hyogo |
|
Proposal of the measure behavior intention model in measure against a computer virus. Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-61 SITE2014-52 LOIS2014-31 |
In the field of information security, even though an individual might intend to take protective action under the virus i... [more] |
ISEC2014-61 SITE2014-52 LOIS2014-31 pp.33-37 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 11:05 |
Hokkaido |
|
Proposal of the Support System at the Time of Introduction of User Applications in Android OS Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.) ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 |
High-performance mobile phone, called the smartphone is beginning to spread regardless of age in recent years. As a matt... [more] |
ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14 pp.13-18 |
ASN, RCS, NS, SR (Joint) |
2013-07-18 10:20 |
Shizuoka |
Hamamatsu Act City |
[Poster Presentation]
Secondary Node Cooperation with Enhancing Secure Capacity under Existence of Primary System Kenichi Tsukada, Takayuki Suzuki, Takeo Fujii (UEC), Osamu Takyu (shinshu Univ.), Tomoaki Ohtsuki (Keio Univ.) NS2013-46 RCS2013-97 SR2013-34 ASN2013-64 |
This paper considers secure communication of secondary user (SU) under existence of a primary user (PU) by cooperating t... [more] |
NS2013-46 RCS2013-97 SR2013-34 ASN2013-64 pp.69-74(NS), pp.111-116(RCS), pp.77-82(SR), pp.97-102(ASN) |
ISEC |
2012-09-21 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Efficient Method of Strictly Evaluating Side-Channel Security Takeshi Kishikawa, Shohei Saito, Yuu Tsuchiya, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama Nat'l Univ.) ISEC2012-56 |
Evaluation of side-channel security, i.e., resistance against side-channel attacks of cryptographic modules is definitel... [more] |
ISEC2012-56 pp.67-74 |
EA, EMM |
2011-12-09 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A study on audio information hiding and its criteria for evaluation Akira Nishimura (Tokyo Univ. Info. Sci.), Akio Ogiwara (Osaka Pref. Univ.), Masashi Unoki (JAIST), Kazuhiro Kondo (Yamagata Univ.), Kotaro Sonoda (Nagasaki Univ.), Keiichi Iwamura (Tokyo Univ. Sci.), Ryuki Tachibana (IBM Japan Ltd.) EA2011-101 EMM2011-61 |
There is no obvious criterion for evaluation on information hiding technologies for image or audio contents. Evaluation ... [more] |
EA2011-101 EMM2011-61 pp.31-36 |
AP |
2011-08-02 13:00 |
Akita |
|
Breath Detection Method Using Time-Variant MIMO Channel Masaki Nango, Naoki Honma (Iwate Univ.), Kentaro Nishimori (Niigata Univ.) AP2011-49 |
In this paper, the non-touch breath detection method with microwave using time-variant MIMO channel is proposed and expe... [more] |
AP2011-49 pp.1-6 |