IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
VLD, HWS
(Joint)
2018-03-02
14:55
Okinawa Okinawa Seinen Kaikan Machine Learning Attack Using Selectable Challenge Set for Feed-Forward PUF
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2017-128
The dreadful of machine learning attack for physical unclonable functions (PUFs) has been reported. Therefore, PUFs with... [more] VLD2017-128
pp.237-242
ISEC, COMP 2017-12-21
16:40
Kochi Eikokuji Campus, Kochi University of Technology Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST) ISEC2017-82 COMP2017-36
Tamper resistant software, which has sufficient resistance against analysis and attack, is a necessary and important tec... [more] ISEC2017-82 COMP2017-36
pp.67-74
ISEC 2016-09-02
14:25
Tokyo Kikai-Shinko-Kaikan Bldg. Tamper Resistant Software utilizing Data Memory
Kazuomi Oishi (SIST) ISEC2016-45
We study a class of tamper resistant software that can work on a computer on which self-modifying code might not necessa... [more] ISEC2016-45
pp.43-48
ICSS 2015-03-04
15:55
Okinawa Meio Univiersity An Experimental Implementation of Self Destructive Tamper Resistant Software and Its Evaluation
Kazuomi Oishi (SIST), Naoki Yoshida, Naoki Watanabe, Jun'ichi Sakamoto, Tsutomu Matsumoto (YNU) ICSS2014-99
Self destructive tamper resistant software (SDTRS) has strong resistance
against attacker's analysis or modification
... [more]
ICSS2014-99
pp.217-222
EMM 2014-03-07
15:00
Ishikawa JAIST [Poster Presentation] Compatible 2d-code having tamper detection system with QR-code
Takayuki Ishihara, Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2013-106
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2013-106
pp.39-44
EMM 2013-03-07
13:30
Kyoto   Information hiding for QR-code using Wet Paper Code
Michiharu Niimi, Hideki Noda (Kyushu Inst. of Tech.) EMM2012-107
The matrix barcodes known as Quick Response
(QR) codes, which are enable us to import printed digital information
int... [more]
EMM2012-107
pp.1-6
ICD 2011-12-15
13:00
Osaka   [Invited Talk] Tamper LSI Design Methodology using Physical Unclonable Function
Takeshi Fujino, Kota Furuhashi, Mitsuru Shiozaki (Ritsumeikan Univ.) ICD2011-102
Physical Unclonable Functions (PUFs), which extract inherent ID from the device fluctuation, have been proposed as a new... [more] ICD2011-102
pp.13-18
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan