IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 71  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
15:10
Hokkaido Hokkaido Jichiro Kaikan Extended $k^m$-anonymity for randomization
Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53
pp.255-260
NS 2023-04-13
12:50
Fukushima Nihon University, Koriyama Campus + Online
(Primary: On-site, Secondary: Online)
[Encouragement Talk] Designing Name Obfuscation Protocol on Content-Centric Networking using a Programmable Switch
Yutaro Yoshinaka, Kentaro Kita, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2023-1
In CCN, much user privacy leaks to eavesdroppers due to the routing based on content names, which are semantically rich ... [more] NS2023-1
pp.1-6
RCC, ISEC, IT, WBS 2023-03-14
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
Claimable Designated Verifier Signature
Kyosuke Yamashita (Osaka Univ.), Keisuke Hara (AIST/YNU), Yohei Watanabe (UEC/JDC), Naoto Yanai (Osaka Univ./JDC), Junji Shikata (YNU) IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
This paper considers the problem of balancing anonymity and traceablity in group-oriented signature schemes. That is, we... [more] IT2022-95 ISEC2022-74 WBS2022-92 RCC2022-92
pp.171-178
IN, NS
(Joint)
2023-03-03
13:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
Designing Lightweight Anonymity Protocol for Host- and AS-Level Relationship Anonymity
Yutaro Yoshinaka, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2022-238
Lightweight anonymity protocols achieve high-performance anonymity communication compared to Onion Routing, which repeat... [more] NS2022-238
pp.406-411
IN, NS
(Joint)
2023-03-03
14:30
Okinawa Okinawa Convention Centre + Online
(Primary: On-site, Secondary: Online)
A Study on the Design of a Method for Balancing Anonymity and Accountability in Network-layer Anonymity Protocols
Kentaro Kita, Junji Takemasa, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) NS2022-241
Tor is the most widely used application-layer anonymity protocol; however, its performance degradation due to its featur... [more] NS2022-241
pp.424-429
ISEC 2022-05-18
16:00
Online Online [Invited Talk] Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles (from PKC 2022)
Ren Ishibashi, Kazuki Yoneyama (Ibaraki Univ.) ISEC2022-6
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usual... [more] ISEC2022-6
p.21
CQ, IMQ, MVE, IE
(Joint) [detail]
2022-03-11
14:15
Online Online (Zoom) A morphing-based web conference system for promoting turning on the video
Shunsuke Yoshitsugu, Ryota Mima, Keita Kobayashi, Taro Obayashi, Tomoko Yonezawa (Kansai Univ.) IMQ2021-60 IE2021-122 MVE2021-89
(To be available after the conference date) [more] IMQ2021-60 IE2021-122 MVE2021-89
pp.261-265
ICSS 2021-11-29
13:00
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Current status, issues, and research trends of user authentication in mobile networks
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2021-46
We will report on the current status of 5G, issues to be examined for Beyond 5G / 6G, research trends, etc. regarding se... [more] ICSS2021-46
pp.1-6
ICSS 2021-11-29
14:15
Kochi KOCHIJYO HALL
(Primary: On-site, Secondary: Online)
Ring Signature scheme based on prime-order bilinear group
Masato Uehara, Tian Yangguang, Atsuko Miyaji (OU) ICSS2021-49
Among the Ring Signature schemes that satisfy Forward-Secure security, the most efficient scheme is Joseph K. Liu et al.... [more] ICSS2021-49
pp.19-24
HCS, HIP, HI-SIGCOASTER [detail] 2021-05-25
15:20
Online Online Prevention of extremist opinions through breaking entitativity in online communication
Masato Kondo (Nagoya Univ.), Sachiko Kiyokawa (Univ. of Tokyo), Jiro Takai (Nagoya Univ.) HCS2021-15 HIP2021-15
People tend to conform to the majority opinion in an anonymous situation. This tendency may lead to undesirable result l... [more] HCS2021-15 HIP2021-15
pp.75-80
WBS, IT, ISEC 2021-03-05
09:00
Online Online Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) IT2020-143 ISEC2020-73 WBS2020-62
Watanabe et al. (SCIS2021) proposed Anonymous Broadcast Authentication (ABA) as a cryptographic primitive for remote con... [more] IT2020-143 ISEC2020-73 WBS2020-62
pp.187-194
ICSS, IPSJ-SPT 2021-03-02
10:25
Online Online Consideration on the mechanism of identifying and tracking Bitcoin users
Toshiaki Saisho (Advanced IT Corp.), Shigeo Tsujii (Chuo Univ.), Kouichi Sakurai (Kyushu Univ./ATR) ICSS2020-44
The use of CryptoAssets for money laundering and settlement of fraudulent and illegal transactions due to strong anonymi... [more] ICSS2020-44
pp.108-113
QIT
(2nd)
2020-12-10
17:30
Online Online Quantum anonymous senser which hides positions of magnetic fields
Hiroto Kasai (Univ of Tsukuba/AIST), Yuki Takeuchi (NTT), Hideaki Hakoshima, Yuichiro Matsuzaki (AIST), Yasuhiro Tokura (Univ of Tsukuba)
A lot of attention has been paid to a quantum sensing network for detecting magnetic fields in different positions.
Her... [more]

ISEC 2020-05-20
15:30
Online Online An Anonymous Trust-Marking Scheme on NEM Blockchain Systems
Tomoki Fujitani (Univ.Tsukuba/NICT), Keita Emura (NICT), Kazumasa Omote (Univ.Tsukuba/NICT) ISEC2020-11
In recent years, cryptocurrencies (crypto-assets) such as Bitcoin, Ethereum, and NEM have attracted attention in various... [more] ISEC2020-11
pp.47-54
NS, IN
(Joint)
2020-03-06
09:10
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
A k-anonymity based Scheme for Private Location-related Content Retrieval in NDN
Kentaro Kita, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2019-108
We have proposed a location-based forwarding scheme for Named Data Networking, in which consumers retrieve content from ... [more] IN2019-108
pp.177-182
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
14:10
Kochi Kochi University of Technology Anonymous Public-Key Certificates based on Elliptic Curve
Kazuomi Oishi (SIST) ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
Anonymous public-key certificates can guarantee anonymity of the certificate users and are useful for applications in wh... [more] ISEC2019-53 SITE2019-47 BioX2019-45 HWS2019-48 ICSS2019-51 EMM2019-56
pp.347-352
IT, ISEC, WBS 2019-03-08
16:10
Tokyo University of Electro-Communications Non-interactive Proof Systems for Group-Dependent Bundled Languages
Hiroaki Anada (Univ. of Nagasaki) IT2018-114 ISEC2018-120 WBS2018-115
In this report,
we propose a bundled language for the direct product of group-dependent languages.
Then we construct... [more]
IT2018-114 ISEC2018-120 WBS2018-115
pp.243-248
IA, IN
(Joint)
2018-12-14
11:10
Hiroshima Hiroshima Univ. Privacy Protection against a Semi-honest Anonymizer for Location-Based Services
Kentaro Kita, Yoshiki Kurihara, Yuki Koizumi, Toru Hasegawa (Osaka Univ.) IN2018-67
Location-based services, which provide content based on locations which are specified by users, are becoming essential f... [more] IN2018-67
pp.49-54
WBS, IT, ISEC 2018-03-09
09:00
Tokyo Katsusika Campas, Tokyo University of Science A Note on Security Notions of Anonymity in Identity-Based Encryption -- Case of ID-CCA2 Security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] IT2017-139 ISEC2017-127 WBS2017-120
pp.213-218
ISEC, COMP 2017-12-21
16:15
Kochi Eikokuji Campus, Kochi University of Technology Blacklistable Anonymous Credential System with Reputation Using Accumulator
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.) ISEC2017-81 COMP2017-35
Conventional anonymous authentication such as group signature has a problem that the ID administrator can specify the au... [more] ISEC2017-81 COMP2017-35
pp.59-65
 Results 1 - 20 of 71  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan