IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 26  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2024-01-25
16:10
Tokyo Kwansei Gakuin Univiversity, Marunouchi Campus
(Primary: On-site, Secondary: Online)
[Poster Presentation] Analyzing Cybersecurity Datasets -- Enhancing Security throughout the Data Life Cycle --
Chidchanok Choksuchat, Sorawit Khamnaewnak, Siwakorn Kasikam, Chanin Maiprom, Suwimon Bureekarn (PSU) IA2023-63
Our study identifies and prevents threats in real-time, particularly focusing on the publishing stage of the data lifecy... [more] IA2023-63
pp.37-39
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-29
15:05
Kumamoto  
(Primary: On-site, Secondary: Online)
Evaluation of power delivery networks in secure semiconductor systems
Masaru Mashiba, Kazuki Monta (Kobe Univ.), Takaaki Okidono (SCU), Takuzi Miki, Makoto Nagata (Kobe Univ.) VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
With the development of the IoT, hardware security is becoming increasingly important. Physical attacks on cryptoprocess... [more] VLD2022-33 ICD2022-50 DC2022-49 RECONF2022-56
pp.82-86
VLD, HWS [detail] 2022-03-08
17:15
Online Online Development of a Test Environment for Attack-Resistance Evaluation of Matrix Direct ToF Lidar
Masato Suzuki, Daisuke Fujimoto, Yuichi Hayashi (NAIST) VLD2021-105 HWS2021-82
Matrix-type Direct Time of flight (dToF) Lidar, which enables high-resolution and high-speed acquisition of distance inf... [more] VLD2021-105 HWS2021-82
pp.164-169
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
IT 2020-12-03
16:40
Online Online Implementation and security evaluation of wiretap channel coding in noisy channels
Koutaro Takasaki, Tomohiro Ogawa (UEC) IT2020-62
In wiretap channel coding by Wyner,one can transmit messages to a legitimate receiver reliably without giving any inform... [more] IT2020-62
pp.206-211
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:30
Kochi Kochi University of Technology Generation of Family Resemblance Inference Rules by Boid Annotation and Labeled-LDA -- A Machine Learning Approach to Integrate Inference Attack Analysis and Covert Channel Attack Analysis --
Kosuke Kurebayashi, Tetsuya Morizumi, Hirotsugu Kinoshita (KU) ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
In this paper we propose a method for machine learning similar chains of words (word chains) similar to "rules for infer... [more] ISEC2019-42 SITE2019-36 BioX2019-34 HWS2019-37 ICSS2019-40 EMM2019-45
pp.243-249
HWS 2019-04-12
13:55
Miyagi Tohoku University Construction of a System to Evaluate Instrumentation Security Enhancement Techniques for Ranging Pulse LIDARs
Tatsuya Suehiro, Satoru Sakurazawa, Naoki Yoshida, Tsutomu Matsumoto (YNU) HWS2019-2
Since the output of instrumentation systems such as sensors in a broad sense can have a significant impact on a system t... [more] HWS2019-2
pp.7-12
HWS, VLD 2019-03-02
13:30
Okinawa Okinawa Ken Seinen Kaikan An Instrumentation Security Metric for ToF Depth-Image Cameras
Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) VLD2018-141 HWS2018-104
We are constructing a system for evaluating instrumentation security of ToF Depth-Image Cameras based on pulse-light spo... [more] VLD2018-141 HWS2018-104
pp.283-288
ISEC 2018-09-07
09:30
Tokyo Kikai-Shinko-Kaikan Bldg. Development of Portable Automotive Security Testbed with Adaptability: PASTA
Tsuyoshi Toyama, Hisashi Oguma (TOYOTA-ITC), Tsutomu Matsumoto (YNU) ISEC2018-51
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicl... [more] ISEC2018-51
pp.7-14
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
13:35
Hokkaido Sapporo Convention Center A System for Evaluating Instrumentation Security of ToF Depth-Image Cameras against Pulse-light Spoofing
Satoru Sakurazawa, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17
The ToF depth-image camera is a device capable of simultaneously measuring distances within a certain range and it is be... [more] ISEC2018-18 SITE2018-10 HWS2018-15 ICSS2018-21 EMM2018-17
pp.61-68
EMM 2017-11-07
13:25
Kagoshima Kagoshima Univ. (Inamori Academy) A study of obfuscation for the security enhancement of watermarking schemes
Koichiro Yamashita, Minoru Kuribayashi, Nobuo Funabiki (Okayama Univ.) EMM2017-65
In general, watermark information is embedded into the host signals selected from digital content according to a secret ... [more] EMM2017-65
pp.53-58
RCS, AP
(Joint)
2016-11-24
10:20
Kyoto Kyoto International Community House Performance Analysis of Physical Layer Security Over Rician/Nakagami-m Fading Channels
Shunya Iwata, Tomoaki Ohtsuki (Keio Univ.), Pooi Yuen Kam (National Univ. of Singapore/Keio Univ.) RCS2016-191
In this report, we investigate the secrecy performance of single-input single-output (SISO) system over fading, in which... [more] RCS2016-191
pp.1-6
IN, ICTSSL, NWS
(Joint)
2016-10-20
11:50
Osaka Osaka Uinv. Construction of Evaluation System in Crisis Management Contest
Sakamoto Hirofumi (Wakayama Univ.) IN2016-50
Today the high reliability of the information security has been requested, the information security is the number of eng... [more] IN2016-50
pp.9-14
ICSS 2014-11-27
14:20
Miyagi Tohoku Gakuin University (Tagajo Campus) Dynamic Zoning of the Industrial Control System for Security improvement
Wataru Machii, Isao Kato, Masahito Koike, Masafumi Matta, Tomomi Aoyama, Ichiro Koshijima, Yoshihiro Hashimoto (NIT) ICSS2014-52
In the previous paper, our authors proposed a design methodology of zones and conduits not only to isolate incidents cau... [more] ICSS2014-52
pp.7-12
ISEC, LOIS, SITE 2014-11-22
09:25
Hyogo   Proposal of the measure behavior intention model in measure against a computer virus.
Sho Hamatsu, Noriaki Yoshikai, Shun-ichi Kurino (Nihon Univ.) ISEC2014-61 SITE2014-52 LOIS2014-31
In the field of information security, even though an individual might intend to take protective action under the virus i... [more] ISEC2014-61 SITE2014-52 LOIS2014-31
pp.33-37
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
11:05
Hokkaido   Proposal of the Support System at the Time of Introduction of User Applications in Android OS
Yuuki Komatu, Eiichiro Kodama, Jiahong Wang, Toyoo Takata (Iwate Prefectural Univ.) ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14
High-performance mobile phone, called the smartphone is beginning to spread regardless of age in recent years. As a matt... [more] ISEC2013-12 SITE2013-7 ICSS2013-17 EMM2013-14
pp.13-18
ASN, RCS, NS, SR
(Joint)
2013-07-18
10:20
Shizuoka Hamamatsu Act City [Poster Presentation] Secondary Node Cooperation with Enhancing Secure Capacity under Existence of Primary System
Kenichi Tsukada, Takayuki Suzuki, Takeo Fujii (UEC), Osamu Takyu (shinshu Univ.), Tomoaki Ohtsuki (Keio Univ.) NS2013-46 RCS2013-97 SR2013-34 ASN2013-64
This paper considers secure communication of secondary user (SU) under existence of a primary user (PU) by cooperating t... [more] NS2013-46 RCS2013-97 SR2013-34 ASN2013-64
pp.69-74(NS), pp.111-116(RCS), pp.77-82(SR), pp.97-102(ASN)
ISEC 2012-09-21
17:05
Tokyo Kikai-Shinko-Kaikan Bldg. An Efficient Method of Strictly Evaluating Side-Channel Security
Takeshi Kishikawa, Shohei Saito, Yuu Tsuchiya, Tsuyoshi Toyama, Tsutomu Matsumoto (Yokohama Nat'l Univ.) ISEC2012-56
Evaluation of side-channel security, i.e., resistance against side-channel attacks of cryptographic modules is definitel... [more] ISEC2012-56
pp.67-74
EA, EMM 2011-12-09
15:15
Tokyo Kikai-Shinko-Kaikan Bldg. A study on audio information hiding and its criteria for evaluation
Akira Nishimura (Tokyo Univ. Info. Sci.), Akio Ogiwara (Osaka Pref. Univ.), Masashi Unoki (JAIST), Kazuhiro Kondo (Yamagata Univ.), Kotaro Sonoda (Nagasaki Univ.), Keiichi Iwamura (Tokyo Univ. Sci.), Ryuki Tachibana (IBM Japan Ltd.) EA2011-101 EMM2011-61
There is no obvious criterion for evaluation on information hiding technologies for image or audio contents. Evaluation ... [more] EA2011-101 EMM2011-61
pp.31-36
AP 2011-08-02
13:00
Akita   Breath Detection Method Using Time-Variant MIMO Channel
Masaki Nango, Naoki Honma (Iwate Univ.), Kentaro Nishimori (Niigata Univ.) AP2011-49
In this paper, the non-touch breath detection method with microwave using time-variant MIMO channel is proposed and expe... [more] AP2011-49
pp.1-6
 Results 1 - 20 of 26  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan