IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 47  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2023-09-22
15:00
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Signing key management in cryptocurrency custodians learned from DNSSEC
Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] IA2023-30
pp.115-122
HCS 2023-08-26
10:30
Hyogo
(Primary: On-site, Secondary: Online)
Verification of matching methods to facilitate mutual goal attainment
Yu Osuga, Jiwon Kin, Satoko Fukuda (Nihon Univ.), Yuito Mori, Hidemasa Takahashi (ARI), Masahiko Osawa (Nihon Univ.) HCS2023-49
Cooperation between individuals is a way to achieve larger personal goals. In this research, we utilize OKR (Objectives ... [more] HCS2023-49
pp.35-40
HIP, HCS, HI-SIGCOASTER [detail] 2023-05-16
15:25
Okinawa Okinawa Industry Support Center
(Primary: On-site, Secondary: Online)
Evaluating display method of OKRs for encouraging mutual goal achievement
Jiwon Kim, Haru Inoue, Satoko Fukuda, Masahiko Osawa (Nihon Univ.) HCS2023-38 HIP2023-38
Cooperation between individuals is a way to achieve larger personal goals. In this research, we evaluated an OKR(Objecti... [more] HCS2023-38 HIP2023-38
pp.188-193
ISEC 2022-05-18
16:00
Online Online [Invited Talk] Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles (from PKC 2022)
Ren Ishibashi, Kazuki Yoneyama (Ibaraki Univ.) ISEC2022-6
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usual... [more] ISEC2022-6
p.21
NS, NWS
(Joint)
2021-01-22
16:10
Online Online Implementation of Load Reduction and Equalization in Distributed Key-value Store OSS
Koki Sugiyama, Taiju Mikoshi, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ.) NS2020-122
This paper shows the implementation on OSS for the proposed method to reduce and equalize the load of the distributed ke... [more] NS2020-122
pp.70-73
HWS, VLD 2019-03-02
10:50
Okinawa Okinawa Ken Seinen Kaikan A Report on Adoption Rates of Android Devices Implemented Hardware-backed Key Management
Kohei Isobe, Takahito Sakamoto (SECOM) VLD2018-139 HWS2018-102
Recent smart device OSs provide a hardware-backed key management system which uses TEE or secure elements.
To enable ha... [more]
VLD2018-139 HWS2018-102
pp.271-276
IN, ICTSSL, NWS
(Joint) [detail]
2018-10-19
11:35
Kagawa Takamatsu Shoko Kaigisyo Kaikan VANET (Vehicle Ad-hoc Network) Security and Blockchain
Hirofumi Onishi (Alpine America Research) ICTSSL2018-31 IN2018-48
Broader connectivity between modern vehicles and the external IT world enlarges the social concern about cyber-risks on ... [more] ICTSSL2018-31 IN2018-48
pp.31-36
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
13:45
Hokkaido Sapporo Convention Center Consideration on Crypto Key Management Devices on the Market.
Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM) ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39
Cryptographic key management devices have been widely used to hire crypt-technologies securely. Most of these cryptograp... [more] ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39
pp.327-332
NS, IN
(Joint)
2018-03-02
13:10
Miyazaki Phoenix Seagaia Resort Query Routing Method and its Performance Evaluation in Distributed Key-Value Stores using OpenFlow Switches
Yosuke Shimajiri, Taiju Mikoshi, Katunori Oyama, Toshihiro Nishizono (Nihon Univ) NS2017-221
We have proposed a scheme to improve data retrieval performance of distributed key value stores by using OpenFlow switch... [more] NS2017-221
pp.301-304
SANE 2018-01-26
13:50
Nagasaki Nagasaki Prefectural Art Museum A Survey on ATM Performance Indicators
Sakae Nagaoka, Mark Brown (ENRI/MPAT) SANE2017-103
The performance based approach in which decision-making is based on data driven performance assessment is used in the gl... [more] SANE2017-103
pp.101-104
NS 2018-01-19
14:50
Okinawa Ishigakishi-Shoko-Kaikan Load Balancing Method of Data Management using High Availability Distributed Clusters
Shota Furuya, Kiyoshi Ueda (Nihon Univ.) NS2017-161
Recently, the number of users for various services has been enlarged with the advancement of functions of terminals and ... [more] NS2017-161
pp.99-104
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] 2017-09-05
10:00
Kyoto Kyoto Univ. (Clock Tower Centennial Hall) Information Disclosing Mechanism Based on the Healthcare PKI for Collaboration of Home Medical Care and Nursing Services
Yoichiro Inayoshi (NIT), Yoshiaki Shiraishi (Kobe Univ.), Jun Takeo, Shohei Kato, Takaaki Yaguchi, Akira Iwata (NIT) LOIS2017-19 IE2017-40 EMM2017-48
In home medical care and nursing, information sharing using ICT among medical care workers makes team care smooth and im... [more] LOIS2017-19 IE2017-40 EMM2017-48
pp.51-56
EMM 2017-03-06
15:40
Okinawa Miyakojima Marin Terminal Building (Okinawa) [Poster Presentation] A Permutation-Based Image Encryption Scheme with Resistance against Some Attacks and Its Key Management
Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ), Hitoshi Kiya (TMU) EMM2016-91
This paper proposes a permutation-based image encryption scheme that improves resistance against brute force attacks and... [more] EMM2016-91
pp.31-36
NS, IN
(Joint)
2017-03-02
11:20
Okinawa OKINAWA ZANPAMISAKI ROYAL HOTEL Load Balancing Method for Data Management using Highly Available Distributed Clusters
Shota Furuya, Kiyoshi Ueda (Nihon Univ.) NS2016-186
Recently, the number of users for various services has been enlarged with the advancement of functions of terminals and ... [more] NS2016-186
pp.163-168
ICM 2016-07-07
16:40
Hokkaido   A method to construct redundant distributed KVS designed for geographically dispersed data management
Kazuhito Matsuda, Noriyuki Fukuyama (FUJITSU LAB.) ICM2016-17
Numerous sensors, actuators, and embedded computers are connecting to information networks as well as cloud systems such... [more] ICM2016-17
pp.51-56
NS, IN
(Joint)
2016-03-04
11:20
Miyazaki Phoenix Seagaia Resort Reliable Application Data Management Methods using Distributed Processing API
Shota Furuya, Yuma Maruyama, Kiyoshi Ueda (Nihon Univ.) NS2015-230
In these days, the large-scale distributed processing technology is improvement for effective computing resource utiliza... [more] NS2015-230
pp.357-362
IN 2015-10-15
15:20
Osaka Osaka University A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation
Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] IN2015-55
pp.13-18
CPSY, DC, IPSJ-ARC
(Joint) [detail]
2015-08-05
15:45
Oita B-Con Plaza (Beppu) Distributed Key Value Store for Resource Disaggregated Architecture
Masaki Kan, Jun Suzuki, Yuki Hayashi, Takashi Yoshikawa, Shinya Miyakawa (NEC Corp.) CPSY2015-31
We present RDStore, a new distributed data storage, designed for a resource-disaggregated architecture and NVMe storage ... [more] CPSY2015-31
pp.167-172
SIS, IPSJ-AVM 2014-09-11
10:45
Yamagata SHONAI INDUSTRIAL PROMOTION CENTER A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images
Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] SIS2014-53
pp.13-18
ISEC 2013-12-11
16:25
Tokyo Kikai-Shinko-Kaikan Bldg. A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2)
Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-80
A storage encryption scheme is studied. In a storage encryption scheme, data encryption and key encryption are executed.... [more] ISEC2013-80
pp.47-51
 Results 1 - 20 of 47  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan