IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS, VLD 2023-03-02
15:45
Okinawa
(Primary: On-site, Secondary: Online)
Hiding Memory Structure for IP Protection
Sun Tanaka, Shinya Takamaeda (UTokyo) VLD2022-96 HWS2022-67
This paper proposes a concept and a method of hiding memory structure for IP protection. [more] VLD2022-96 HWS2022-67
pp.119-124
HWS, VLD 2023-03-03
13:25
Okinawa
(Primary: On-site, Secondary: Online)
High-Performance and Programmer-Friendly Secure Non-Volatile Memory using Temporal Memory-Access Redirection
Ryo Koike, Shinya Takamaeda (UTokyo) VLD2022-106 HWS2022-77
Byte-addressable non-volatile memory (NVM) has two challenges, performance degradation due to high-latency integrity tre... [more] VLD2022-106 HWS2022-77
pp.179-184
HWS, ICD 2022-10-25
15:15
Shiga
(Primary: On-site, Secondary: Online)
A Memory-Saving Software Implementation of Pairing Computation on the GMT8-544 Curve
Hiroto Miyata, Junichi Sakamoto, Naoki Yoshida, Riku Anzai, Tsutomu Matsumoto (YNU) HWS2022-39 ICD2022-31
There has been a lot of research on increasing the security of IoT, and encryption is one of the methods. Pairing crypto... [more] HWS2022-39 ICD2022-31
pp.52-57
EE 2022-01-28
15:10
Online Online Bankruptcy of Elpida Memory, Inc. from the perspective of double-entry bookkeeping
Daisuke Arai, Yu Yonezawa, Atsushi Imaoka, Masayoshi Yamamoto (Nagoya Univ.) EE2021-50
This paper is a sequel to the one presented at the last EE seminar (held on November 18, 2021). The spread of Covid-19 o... [more] EE2021-50
pp.106-111
CPSY, DC, IPSJ-ARC [detail] 2021-07-20
14:00
Online Online Prototype Implementation of Non-Volatile Memory Support for RISC-V Keystone Enclave
Lena Yu, Yu Omori, Keiji Kimura (Waseda Univ.) CPSY2021-2 DC2021-2
Handling confidential information has become an increasingly important concern among many areas of society. However, cur... [more] CPSY2021-2 DC2021-2
pp.7-12
HWS, VLD [detail] 2021-03-04
13:25
Online Online A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design
Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] VLD2020-83 HWS2020-58
pp.85-90
SDM, ICD, ITE-IST [detail] 2019-08-07
16:30
Hokkaido Hokkaido Univ., Graduate School /Faculty of Information Science and [Invited Talk] High-temperature stable Physical Unclonable Functions with error-free readout scheme based on 28nm SGMONOS flash memory for security applications
Takahiro Shimoi, Tomoya Saito, Hirokazu Nagase, Masayuki Izuna, Akihiko Kanda, Takashi Ito, Takashi Kono (Renesas Electronics) SDM2019-39 ICD2019-4
Highly reliable Physical Unclonable Functions (PUF) based on 28nm Split-Gate MONOS (SG-MONOS) embedded flash memory is d... [more] SDM2019-39 ICD2019-4
pp.15-19
LOIS 2018-03-02
15:15
Okinawa Naha-City IT Souzoukan(Okinawa) Confidentiality Assurances of Memory Augmentation System using Biometric Authentication and Secure Chip
Asahi Sakuma, Hiroyuki Suzuki (Tokyo Tech), Koji Osugi, Hiroyasu Murayama (NEC), Takashi Obi, Nagaaki Ohyama (Tokyo Tech) LOIS2017-91
Memory augmentation system, which is expected to help us to solve communication failures because of memory loss, is not ... [more] LOIS2017-91
pp.117-122
SDM 2017-10-26
13:00
Miyagi Niche, Tohoku Univ. [Invited Lecture] High-temperature stable Physical Unclonable Functions with error-free readout scheme based on 28nm SG-MONOS flash memory for security applications
Takahiro Shimoi, Tomoya Saito, Hirokazu Nagase, Masayuki Izuna, Akihiko Kanda, Takashi Ito, Takashi Kono (Renesas Electronics) SDM2017-58
Highly reliable Physical Unclonable Functions (PUF) based on 28nm Split-Gate MONOS (SG-MONOS) embedded flash memory is d... [more] SDM2017-58
pp.45-49
CPSY, IPSJ-ARC 2016-10-06
10:00
Chiba Makuhari-messe [Technology Exhibit] Security technologies for non-volatile memory in IoT devices -- Mechanisms for on-chip MCU and off-chip memory system --
Mikio Hashimoto, Yoshiyuki Amanuma, Kentaro Umesawa, Ryuichi Koike, Jun Kanai, Naoko Yamada (Toshiba) CPSY2016-51
Non-volatile memory content modification is serious issues on IoT appliances, since evil effects continue over power cyc... [more] CPSY2016-51
pp.37-42
RECONF 2016-05-19
17:30
Kanagawa FUJITSU LAB. [Invited Talk] Overviews on key technologies to substantialize 'IoT society'
Toshihiro Matsui, Hisashi Sekine, Hideki Hayashi, Hiroaki Ohkubo, Hirotaka Sunaguchi, Naoyuki Matsuo, Yoshitatsu Sato (NEDO TSC) RECONF2016-16
Regarding non-volatile memories, sensors, embedded software, and cyber security as the key components in the coming IoT ... [more] RECONF2016-16
pp.77-82
ICSS, IPSJ-SPT 2014-03-27
13:05
Okinawa Meio Univiersity The countermeasures against extraction of AES keys from memory dumping.
Michiyoshi Satoh (TSH) ICSS2013-62
The cipher AES extends a 128 bits (or 192 bits, 256 bits) secret key to 1408 bits (or 1664 bits, 1920 bits). Since the e... [more] ICSS2013-62
pp.1-6
DC, CPSY, IPSJ-SLDM, IPSJ-EMB 2008-03-27
16:30
Kagoshima   Development of Protection Mechanism for Embedded Component System
Shimpei Yamada, Yukikazu Nakamoto (UOH), Takuya Azumi, Hiroaki Takada (Nagoya Univ.), Hiroshi Oyama (OKUMA) DC2007-99 CPSY2007-95
Recently, embedded systems connected to network have increased; therefore it is needed to strengthen security. In additi... [more] DC2007-99 CPSY2007-95
pp.91-96
RCS, NS
(Joint)
2006-07-21
14:00
Hokkaido Hokkaido Univ. Optimum Memory Allocation in Identifying Flow Hogs
Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara (NTT) NS2006-68
Hosts infected by worm generate huge amount of flows during a short time, so it is important to identify these flow hogs... [more] NS2006-68
pp.97-100
LOIS 2005-05-13
09:00
Kagawa Sunport Hall Takamatsu Design and implementation of the system for supporting computer virus analysis
Sachihiro Ichikawa (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (Kobe Univ.)
This paper presents a design and implementation of automatic virus analysis support system. Shortening of virus analysis... [more] OIS2005-7
pp.1-6
LOIS 2005-05-13
10:40
Kagawa Sunport Hall Takamatsu Proposal for Memorycard Secure FileSystem SAS
Jun Kawashima, Nobuo Funabiki, Toru Nakanishi (Okayama Univ.), Junichi Takeuchi, Masayuki Ishizaki, Andre Caldas de Souza (Ba-Z Communication)
Memorycard has weakness in assuring the safety of stored data when it is stolen or missing. Therefore, a secure filesyst... [more] OIS2005-10
pp.19-24
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan