IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 29  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
CNR, BioX 2024-02-29
13:30
Tokyo NHK Science & Technology Research Laboratories
(Primary: On-site, Secondary: Online)
Design of Aerial dialing PIN code input authentication system using deep learning hand shape authentication
Jun Wang, Bo Wu, Kiminori Sato (TUT) BioX2023-70 CNR2023-37
With the continuous development of modern technology, the demand for contactless authentication is increasing, and a sim... [more] BioX2023-70 CNR2023-37
pp.1-6
SIS, ITE-BCT 2023-10-12
16:30
Yamaguchi HISTORIA UBE
(Primary: On-site, Secondary: Online)
[Tutorial Lecture] Technical Development of Intrusion Prevention Systems with Reconfigurable Devices
Tomoaki Sato (Hokusei Gakuen Univ.) SIS2023-19
The frequency of Internet use continues to increase in telework and remote work environments. Concurrently, there has be... [more] SIS2023-19
pp.19-24
PN 2023-08-29
15:40
Hokkaido
(Primary: On-site, Secondary: Online)
A Jitter-Constrained High-Speed Multilayer Combined-Path Design Algorithm for Center-Based Security Analysis
Ryuta Murakami, Takashi Kurimoto, Satoru Okamoto, Naoaki Yamanaka (Keio Univ.) PN2023-24
In order to realize a highly reliable network infrastructure in the Beyond 5G era, we have proposed the“Reconfigurable I... [more] PN2023-24
pp.40-46
ISEC 2023-05-17
15:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023)
Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] ISEC2023-12
p.65
HWS 2023-04-15
09:40
Oita
(Primary: On-site, Secondary: Online)
Investigation of automated design technique of pairing engine
Momoko Fukuda, Makoto Ikeda (UT) HWS2023-10
We have realized a design automation platform of hardware accelerator for pairing operation over multiple elliptic curve... [more] HWS2023-10
pp.37-42
VLD, DC, RECONF, ICD, IPSJ-SLDM [detail] 2022-11-30
14:20
Kumamoto  
(Primary: On-site, Secondary: Online)
On the performance evaluation of a PUF circuit using the Delay Testable Circuit under temperature effects
Eisuke Ohama, Hiroyuki Yotsuyanagi, Masaki Hashizume (Tokushima Univ.) VLD2022-46 ICD2022-63 DC2022-62 RECONF2022-69
In this study, we have proposed a method to make the design-for-testability circuity function as a security mechanism by... [more] VLD2022-46 ICD2022-63 DC2022-62 RECONF2022-69
pp.156-161
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
13:50
Online Online An overview of the secrecy of patent applications in the Japanese Law
Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
pp.88-97
DC 2021-12-10
14:00
Kagawa
(Primary: On-site, Secondary: Online)
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] DC2021-57
pp.13-18
RCS 2021-10-21
10:50
Online Online Beamforming Design and Secrecy capacity analysis for Cell-Free massive MIMO
Kengo Ando (UEC), Hiroki Iimori, Giuseppe Abreu (JUB), Koji Ishibashi (UEC) RCS2021-120
In this paper, we investigate a secure beamforming (BF) design for cell-free massive multiple input mul tiple output (CF... [more] RCS2021-120
pp.13-18
EMCJ, EMD, WPT
(Joint)
2021-07-02
13:30
Online Online Three-dimensional Communication Range Design for Transceiver Coils in HF Broadband Communication
Kensi Kuwahara, Toshiyuki Wakisaka, Tohlu Matsushima, Yuki Fukumoto (kyutech) EMCJ2021-26
With the spread of IoT systems in recent years, selecting the appropriate communication system for the application will ... [more] EMCJ2021-26
pp.7-12
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] 2021-03-26
12:00
Online Online A Logic Locking Method Based on Anti-SAT at Register Transfer Level
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-64 DC2020-94
In recent years, increasing circuit density, it has become difficult for only one semiconductor design company to design... [more] CPSY2020-64 DC2020-94
pp.85-90
ICD, HWS [detail] 2020-10-26
17:40
Online Online Investigation of High-Efficiency Simulation Method for Detection of Physical Design Falsification in Secure IC Chip
Kazuki Yasuda, Kazuki Monta, Daichi Nakagawa, Makoto Nagata (Kobe Univ.) HWS2020-41 ICD2020-30
With the development of the IoT society in recent years, various security measures have been developed for integrated ci... [more] HWS2020-41 ICD2020-30
pp.94-98
CPSY, DC, IPSJ-ARC [detail] 2020-07-31
17:30
Online Online An Area Reduction Oriented Controller Augmentation Method Based on Functionally Equivalent Finite State Machine Generation
Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-15 DC2020-15
In recent year, controller augmentation has been used for design-for-testability and design-for-security at register tra... [more] CPSY2020-15 DC2020-15
pp.93-98
ICSS, IPSJ-SPT 2020-03-02
10:20
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Estimation method of information asset security attributes using design mode
Takeshi Ueda, Koichi Shimizu, Shun Hinatsu, Fumio Omatsu (Mitsubishi Electric Corp.) ICSS2019-69
In security evaluation such as risk analysis, analysis is performed based on the value of information assets in the syst... [more] ICSS2019-69
pp.7-12
KBSE 2019-03-02
09:00
Kyoto Doshisha University Kambaikan Development of Knowledge Presentation Method in Security Requirement Analysis and Design Using a Software Security Knowledge Base and Evaluation by a Case Study
Yuki Yamada, Atsuo Hazeyama (Tokyo Gakugei Univ.), Nobukazu Yoshioka (NII) KBSE2018-62
In recent years, the threat of cyber attacks such as information disclosure due to unauthorized access has become seriou... [more] KBSE2018-62
pp.51-56
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
15:25
Hokkaido Sapporo Convention Center Practice and Evaluation of Penetration Testing Exercises for Raising Cybersecurity Awareness
Daisuke Suzuki (Hokuriku Univ.) ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24
The aim of this study is to clarify the educational effect of a penetration testing exercise aimed at raising cybersecur... [more] ISEC2018-25 SITE2018-17 HWS2018-22 ICSS2018-28 EMM2018-24
pp.131-136
KBSE 2018-03-01
15:50
Okinawa   Development of a System Supporting Security Design from Security Requirements Analysis using a Software Security Knowledge Base
Hikaru Miyahara, Atsuo Hazeyama (Tokyo Gakugei Univ.), Takafumi Tanaka (TUAT), Hironori Washizaki (Waseda Univ.), Haruhiko Kaiya (Kanagawa Univ.), Takao Okubo (IISEC), Nobukazu Yoshioka (NII) KBSE2017-50
The importance of software security is recognized because the Internet is permeating into our society. In particular, di... [more] KBSE2017-50
pp.67-72
LOIS, ISEC, SITE 2017-11-09
09:30
Kyoto   Consciousness Investigation of Passwords Management in University Students -- Questionnaire Design based on Friend Relationships --
Takuyoshi Kumagai, Takuto Kikuchi, Shingo Sawa (Tokyo City Univ), Namie Kato (JMAR), Yoshiaki Seki (Tokyo City Univ) ISEC2017-50 SITE2017-32 LOIS2017-27
ID and password are used in information systems in companies and universities. Sometimes, students tell passwords to the... [more] ISEC2017-50 SITE2017-32 LOIS2017-27
pp.7-12
LOIS, ISEC, SITE 2017-11-10
14:00
Kyoto   Implementation Planning of Penetration Testing Exercises for Raising Cybersecurity Awareness
Daisuke Suzuki (Hokuriku Univ.) ISEC2017-67 SITE2017-49 LOIS2017-44
In the information security class at the university, it is common to learn from the defender's perspective how to protec... [more] ISEC2017-67 SITE2017-49 LOIS2017-44
pp.103-106
 Results 1 - 20 of 29  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan