Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
HCS |
2023-08-26 10:30 |
Hyogo |
(Primary: On-site, Secondary: Online) |
Verification of matching methods to facilitate mutual goal attainment Yu Osuga, Jiwon Kin, Satoko Fukuda (Nihon Univ.), Yuito Mori, Hidemasa Takahashi (ARI), Masahiko Osawa (Nihon Univ.) HCS2023-49 |
Cooperation between individuals is a way to achieve larger personal goals. In this research, we utilize OKR (Objectives ... [more] |
HCS2023-49 pp.35-40 |
HIP, HCS, HI-SIGCOASTER [detail] |
2023-05-16 15:25 |
Okinawa |
Okinawa Industry Support Center (Primary: On-site, Secondary: Online) |
Evaluating display method of OKRs for encouraging mutual goal achievement Jiwon Kim, Haru Inoue, Satoko Fukuda, Masahiko Osawa (Nihon Univ.) HCS2023-38 HIP2023-38 |
Cooperation between individuals is a way to achieve larger personal goals. In this research, we evaluated an OKR(Objecti... [more] |
HCS2023-38 HIP2023-38 pp.188-193 |
ISEC |
2022-05-18 16:00 |
Online |
Online |
[Invited Talk]
Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles (from PKC 2022) Ren Ishibashi, Kazuki Yoneyama (Ibaraki Univ.) ISEC2022-6 |
Authenticated Key Exchange (AKE) is a cryptographic protocol to share a common session key among multiple parties. Usual... [more] |
ISEC2022-6 p.21 |
NS, NWS (Joint) |
2021-01-22 16:10 |
Online |
Online |
Implementation of Load Reduction and Equalization in Distributed Key-value Store OSS Koki Sugiyama, Taiju Mikoshi, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ.) NS2020-122 |
This paper shows the implementation on OSS for the proposed method to reduce and equalize the load of the distributed ke... [more] |
NS2020-122 pp.70-73 |
HWS, VLD |
2019-03-02 10:50 |
Okinawa |
Okinawa Ken Seinen Kaikan |
A Report on Adoption Rates of Android Devices Implemented Hardware-backed Key Management Kohei Isobe, Takahito Sakamoto (SECOM) VLD2018-139 HWS2018-102 |
Recent smart device OSs provide a hardware-backed key management system which uses TEE or secure elements.
To enable ha... [more] |
VLD2018-139 HWS2018-102 pp.271-276 |
IN, ICTSSL, NWS (Joint) [detail] |
2018-10-19 11:35 |
Kagawa |
Takamatsu Shoko Kaigisyo Kaikan |
VANET (Vehicle Ad-hoc Network) Security and Blockchain Hirofumi Onishi (Alpine America Research) ICTSSL2018-31 IN2018-48 |
Broader connectivity between modern vehicles and the external IT world enlarges the social concern about cyber-risks on ... [more] |
ICTSSL2018-31 IN2018-48 pp.31-36 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 13:45 |
Hokkaido |
Sapporo Convention Center |
Consideration on Crypto Key Management Devices on the Market. Kohei Isobe, Keisuke Hasegawa, Tadahiko Ito (SECOM) ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39 |
Cryptographic key management devices have been widely used to hire crypt-technologies securely. Most of these cryptograp... [more] |
ISEC2018-40 SITE2018-32 HWS2018-37 ICSS2018-43 EMM2018-39 pp.327-332 |
NS, IN (Joint) |
2018-03-02 13:10 |
Miyazaki |
Phoenix Seagaia Resort |
Query Routing Method and its Performance Evaluation in Distributed Key-Value Stores using OpenFlow Switches Yosuke Shimajiri, Taiju Mikoshi, Katunori Oyama, Toshihiro Nishizono (Nihon Univ) NS2017-221 |
We have proposed a scheme to improve data retrieval performance of distributed key value stores by using OpenFlow switch... [more] |
NS2017-221 pp.301-304 |
SANE |
2018-01-26 13:50 |
Nagasaki |
Nagasaki Prefectural Art Museum |
A Survey on ATM Performance Indicators Sakae Nagaoka, Mark Brown (ENRI/MPAT) SANE2017-103 |
The performance based approach in which decision-making is based on data driven performance assessment is used in the gl... [more] |
SANE2017-103 pp.101-104 |
NS |
2018-01-19 14:50 |
Okinawa |
Ishigakishi-Shoko-Kaikan |
Load Balancing Method of Data Management using High Availability Distributed Clusters Shota Furuya, Kiyoshi Ueda (Nihon Univ.) NS2017-161 |
Recently, the number of users for various services has been enlarged with the advancement of functions of terminals and ... [more] |
NS2017-161 pp.99-104 |
EMM, IE, LOIS, IEE-CMN, ITE-ME [detail] |
2017-09-05 10:00 |
Kyoto |
Kyoto Univ. (Clock Tower Centennial Hall) |
Information Disclosing Mechanism Based on the Healthcare PKI for Collaboration of Home Medical Care and Nursing Services Yoichiro Inayoshi (NIT), Yoshiaki Shiraishi (Kobe Univ.), Jun Takeo, Shohei Kato, Takaaki Yaguchi, Akira Iwata (NIT) LOIS2017-19 IE2017-40 EMM2017-48 |
In home medical care and nursing, information sharing using ICT among medical care workers makes team care smooth and im... [more] |
LOIS2017-19 IE2017-40 EMM2017-48 pp.51-56 |
EMM |
2017-03-06 15:40 |
Okinawa |
Miyakojima Marin Terminal Building (Okinawa) |
[Poster Presentation]
A Permutation-Based Image Encryption Scheme with Resistance against Some Attacks and Its Key Management Takeshi Ogasawara, Shoko Imaizumi (Chiba Univ), Hitoshi Kiya (TMU) EMM2016-91 |
This paper proposes a permutation-based image encryption scheme that improves resistance against brute force attacks and... [more] |
EMM2016-91 pp.31-36 |
NS, IN (Joint) |
2017-03-02 11:20 |
Okinawa |
OKINAWA ZANPAMISAKI ROYAL HOTEL |
Load Balancing Method for Data Management using Highly Available Distributed Clusters Shota Furuya, Kiyoshi Ueda (Nihon Univ.) NS2016-186 |
Recently, the number of users for various services has been enlarged with the advancement of functions of terminals and ... [more] |
NS2016-186 pp.163-168 |
ICM |
2016-07-07 16:40 |
Hokkaido |
|
A method to construct redundant distributed KVS designed for geographically dispersed data management Kazuhito Matsuda, Noriyuki Fukuyama (FUJITSU LAB.) ICM2016-17 |
Numerous sensors, actuators, and embedded computers are connecting to information networks as well as cloud systems such... [more] |
ICM2016-17 pp.51-56 |
NS, IN (Joint) |
2016-03-04 11:20 |
Miyazaki |
Phoenix Seagaia Resort |
Reliable Application Data Management Methods using Distributed Processing API Shota Furuya, Yuma Maruyama, Kiyoshi Ueda (Nihon Univ.) NS2015-230 |
In these days, the large-scale distributed processing technology is improvement for effective computing resource utiliza... [more] |
NS2015-230 pp.357-362 |
IN |
2015-10-15 15:20 |
Osaka |
Osaka University |
A Study of an Authentication Method Using a Public Key and a Private Key in Security, Usability and Operation Yusuke Ogata, Yoshihiko Omori, Takao Yamashita, Tetsuya Iwata (NTT) IN2015-55 |
It is difficult to sufficiently protect web accounts using a password-based authentication method against threats of man... [more] |
IN2015-55 pp.13-18 |
CPSY, DC, IPSJ-ARC (Joint) [detail] |
2015-08-05 15:45 |
Oita |
B-Con Plaza (Beppu) |
Distributed Key Value Store for Resource Disaggregated Architecture Masaki Kan, Jun Suzuki, Yuki Hayashi, Takashi Yoshikawa, Shinya Miyakawa (NEC Corp.) CPSY2015-31 |
We present RDStore, a new distributed data storage, designed for a resource-disaggregated architecture and NVMe storage ... [more] |
CPSY2015-31 pp.167-172 |
SIS, IPSJ-AVM |
2014-09-11 10:45 |
Yamagata |
SHONAI INDUSTRIAL PROMOTION CENTER |
A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53 |
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] |
SIS2014-53 pp.13-18 |
ISEC |
2013-12-11 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Storage Encryption Scheme: Unconditionally Secure Encryption of Unlimited Number of Keys using A Fixed Secret (Part 2) Kazuomi Oishi (Shizuoka Inst. of Science and Tech.) ISEC2013-80 |
A storage encryption scheme is studied. In a storage encryption scheme, data encryption and key encryption are executed.... [more] |
ISEC2013-80 pp.47-51 |