IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 69件中 1~20件目  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SR 2019-12-05
13:50
Okinawa Ishigaki City Hall (Ishigaki Island) [Poster Presentation] Consideration of security for PLNC with Untrusted Relay by strategy of game theory
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ)
(To be available after the conference date) [more]
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] 2019-07-24
09:55
Kochi Kochi University of Technology Fundamental Study on an Estimation Method of Irradiate Frequencies to Forcibly Cause Electromagnetic Information Leakage
Shugo Kaji (NAIST), Masahiro Kinugawa (NIT), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST)
The threats of electromagnetic (EM) information leakage from the input/output (I/O) signal of an IC mounted on a de-vice... [more] ISEC2019-40 SITE2019-34 BioX2019-32 HWS2019-35 ICSS2019-38 EMM2019-43
pp.235-238
HWS 2019-04-12
15:55
Miyagi Tohoku University Fundamental Study on Suppression of Self-Interference Wave Caused by Intentional Information Leakage with IEMI
Riho Kawakami, Shugo Kaji (NAIST), Masahiro Kinugawa (NIT, Sendai College), Diasuke Fujimoto, Yu-ichi Hayashi (NAIST)
There is a threat of information leakage through unintentional electromagnetic (EM) emissions from equipment. The feasib... [more] HWS2019-6
pp.31-35
IT, ISEC, WBS 2019-03-08
10:50
Tokyo University of Electro-Communications The distribution of the conditional information leakage in binary symmetric erasure wiretap channels
Ukyo Michiwaki, Yutaka Jitsumatsu (Kyushu Univ.), Yasutada Oohama (UEC)
In Wyner's wiretap channel, information leakage is defined as mutual information between transmitter's messages and eave... [more] IT2018-118 ISEC2018-124 WBS2018-119
pp.263-268
RCS, SR, SRW
(Joint)
2019-03-08
13:45
Kanagawa YRP Consideration of security for PLNC with Untrusted Relay by double-objective optimization problem
Go Ikeuchi, Osamu Takyu (Shinshu Univ), Takeo Fujii (UEC), Tomoaki Ohtsuki (Keio Univ), Fumihito Sasamori, Shiro Handa (Shinshu Univ)
In this study, we have focused on wireless communication networks which can easily construct a network by using the rela... [more] RCS2018-335
pp.279-284
SS 2019-03-04
17:35
Okinawa   Dynamic information leakage analysis and adaptive input optimization
Tatsuya Miwa, Hiroyuki Seki (Nagoya Univ.)
We first propose a method of analyzing dynamic information leakage of a given program.Our method uses abstract interpret... [more] SS2018-68
pp.97-102
EMCJ, IEE-EMC, IEE-MAG 2018-11-22
15:10
Overseas KAIST [Poster Presentation] A Specification Method of Faulty Bytes in Cryptographic Module Using EM Information Leakage
Naoto Saga (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
Fault analysis methods such as Differential Fault Analysis (DFA) need ciphertexts which have specific timing faults and ... [more] EMCJ2018-68
pp.39-40
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-25
14:50
Hokkaido Sapporo Convention Center Fundamental Study on Identification of EM Leakage Source of Audio Information from a Smart Device
Izumi Nishina, Daisuke Fujimoto (NAIST), Masahiro Kinugawa (NIT), Yu-ichi Hayashi (NAIST)
A threat of leakage of sound information via electromagnetic field from a smart device having an audio output function h... [more] ISEC2018-21 SITE2018-13 HWS2018-18 ICSS2018-24 EMM2018-20
pp.83-88
IT 2018-07-19
15:55
Nara Yamato Kaigishitsu On the Minimum Cost of Information Erasure for Stationary Memoryless Sources
Naruaki Amada, Hideki Yagi (Univ. of Electro-Comm.)
In order to erase data including confidential information stored in the storage device, overwriting an unrelated and ran... [more] IT2018-17
pp.25-29
EMCJ 2017-11-22
15:40
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on Evaluation Method for EM Information Leakage Utilizing Controlled Image Displaying
Gentaro Tanabe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
Evaluation of electromagnetic information leakage from display devices are generally conducted by actual attacks retriev... [more] EMCJ2017-74
pp.57-62
EMCJ 2017-11-22
16:05
Tokyo Kikai-Shinko-Kaikan Bldg. Efficient Evaluation Method for Information Leakage of Cryptographic Devices Based on Frequency Selection
Airi Sugimoto (Tohoku Univ.), Daisuke Fujimoto, Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
Evaluating electromagnetic information leakage from a cryptographic device takes a considerable amount of time because o... [more] EMCJ2017-75
pp.63-66
NS 2017-05-19
10:50
Tokyo Kikai Shinko Kaikan Per-Packet Throughput of Information-Leakage Through Content Names in NDN Interest Packets
Daishi Kondo (UL), Thomas Silverston (NICT), Hideki Tode (Osaka Prefecture Univ.), Tohru Asami (Univ. of Tokyo), Olivier Perrin (UL)
Information-leakage is one of the most important security issues in the current Internet. In Named-Data Networking (NDN)... [more] NS2017-20
pp.35-40
ICSS, IPSJ-SPT 2017-03-14
12:45
Nagasaki University of Nagasaki A system architecture that prevents fraud issue using third parties to issue authentication information
Masahiro Matsui, Akira Nagai, Tetsutaro Kobayashi, Hironobu Okuyama (NTT)
Nowadays, the leakages of authentication information such as password from web service are happened frequently. MILAGRO-... [more] ICSS2016-72
pp.195-200
ISEC, WBS, IT 2017-03-10
14:10
Tokyo TOKAI University A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC)
(To be available after the conference date) [more] IT2016-128 ISEC2016-118 WBS2016-104
pp.187-193
ISEC, LOIS, SITE 2016-11-08
11:30
Fukui Community Hall & AOSSA Mall, Fukui [Invited Talk] Threat of Electromagnetic Information Leakage and Countermeasures
Yu-ichi Hayashi (Tohoku Gakuin Univ.)
As our information society has further developed, the widespread use of personal electronic devices like smartphones and... [more] ISEC2016-63 SITE2016-53 LOIS2016-41
p.75
EMCJ, IEE-EMC, MW, EST [detail] 2016-10-21
09:00
Miyagi Tohoku Univ. Attempt for Determining Cryptographic Circuit Blocks Leaking Side-Channel Information Based on Internal Current Source -- Examination with FPGA Implementation of AES Circuits --
Kengo Iokibe, Naoki Kawata, Yusuke Yano, Hiroto Kagotani, Yoshitaka Toyota (Okayama Univ.)
For efficient security enhancement of cryptographic ICs against side-channel attacks (SCAs), it is important to identify... [more] EMCJ2016-74 MW2016-106 EST2016-70
pp.79-84
EMCJ, IEE-EMC, IEE-MAG 2016-06-02
13:36
Overseas NTU, Taiwan [Poster Presentation] Investigation of Relationship between Signal-to-Noise Ratio of EM Information Leakage and Side-Channel Attacking Cost.
Yusuke Yano, Kengo Iokibe, Yoshitaka Toyota (Okayama Univ.)
Attacking cost of side-channel attack (SCA) can increase by application of various countermeasures to electromagnetic (E... [more] EMCJ2016-25
pp.23-24
EMCJ, IEE-EMC, IEE-MAG 2016-06-03
10:55
Overseas NTU, Taiwan [Invited Talk] EM Information Security of Tablet PCs in Public Space
Yu-ichi Hayashi (Tohoku Gakuin Univ.)
This presentation shows a threat of EM display stealing from tablet PCs by a portable setup. We first show that a series... [more] EMCJ2016-41
p.79
LOIS, IPSJ-SPT, IPSJ-GN 2016-05-12
16:20
Tokyo   Difference and Equilibrium Point of Will of Information Sharing -- For bullying detection at school --
Yasuhiro Tanaka (Senshu), Akihisa Kodate (Tsuda), Noriaki Koide, Yu Ichifuji, Noboru Sonehara (NII)
While the use of social media prevails among students, some serious cases have been observed where they used it as a too... [more] LOIS2016-6
pp.27-32
EMCJ 2016-03-11
11:05
Tokyo Kikai-Shinko-Kaikan Bldg. A Study on the risk evaluation of countermeasure technique for preventing electromagnetic information leakage
Ryo Ishikawa, Toshinori Mori, Kimihiro Tajima (NTT-AT), Yasunao Suzuki, Kazuhiro Takaya (NTT NT Labs.)
A telecommunication equipment and information technical equipment usually produce unintentional electromagnetic fields. ... [more] EMCJ2015-124
pp.1-4
 69件中 1~20件目  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan