Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2023-09-22 15:00 |
Hokkaido |
Hokkaido Univeristy (Primary: On-site, Secondary: Online) |
Signing key management in cryptocurrency custodians learned from DNSSEC Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30 |
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] |
IA2023-30 pp.115-122 |
SWIM, KBSE |
2023-05-19 15:10 |
Shizuoka |
(Primary: On-site, Secondary: Online) |
DARPA-Like Organization and Role of Univeristy
-- A Global Perspective Regarding AI R&D -- Haruki Ueno (NII) KBSE2023-3 SWIM2023-3 |
Dual-use technology (DUT) refers to technology that can be used for both peaceful and military purposes, and has its roo... [more] |
KBSE2023-3 SWIM2023-3 pp.13-20 |
NS, NWS (Joint) |
2023-01-26 13:00 |
Yamaguchi |
Hybrid Meeting (Yamaguchi Prefecture) (Primary: On-site, Secondary: Online) |
[Encouragement Talk]
A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153 |
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] |
NS2022-153 pp.19-24 |
NS, ICM, CQ, NV (Joint) |
2022-11-24 11:35 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
Design and Trial of Cyber Security Exercise for Basic CISO Skillset Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104 |
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] |
NS2022-104 pp.23-28 |
NS, ICM, CQ, NV (Joint) |
2022-11-25 16:20 |
Fukuoka |
Humanities and Social Sciences Center, Fukuoka Univ. + Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
Operation and Management of Microservices-based Distributed System using Service Mesh Takaya Ide, Hitoshi Yabusaki (Hitachi) NS2022-127 CQ2022-60 ICM2022-30 |
Distributed systems such as microservice architectures are complex and change rapidly. A network model called a service ... [more] |
NS2022-127 CQ2022-60 ICM2022-30 pp.137-141(NS), pp.58-62(CQ), pp.31-35(ICM) |
R |
2022-10-07 15:15 |
Fukuoka |
(Primary: On-site, Secondary: Online) |
A Note on Pull-Type Security Patch Management Policies for Intrusion Tolerant Systems Junjun Zheng (Osaka Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-37 |
This paper considers the pull-type security patch management policies for intrusion tolerant systems. A composite stocha... [more] |
R2022-37 pp.31-36 |
ICM |
2022-07-07 14:50 |
Hokkaido |
Tokachi Plaza (Primary: On-site, Secondary: Online) |
[Invited Talk]
Zero Trust Architecture and Risk Management Yuki Unno (Fujitsu Research) ICM2022-14 |
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] |
ICM2022-14 pp.21-23 |
SC |
2022-05-27 10:55 |
Online |
Online |
Improving data security by mapping data and storage relations for data management in large environment Avais Ahmad, Shinichi Hayashi, Satoshi Kaneko, Takashi Tameshige (Hitachi) SC2022-4 |
Large-scale organizations are required to manage multitude data assets and identify data flow and lo cation. Relationshi... [more] |
SC2022-4 pp.19-24 |
IA, SITE, IPSJ-IOT [detail] |
2022-03-08 13:30 |
Kyoto |
Kyoto University, Yoshida Campus (Primary: On-site, Secondary: Online) |
IoT Device Security Survey Using Home Automation Apps Mizuki Ohno, Takahiro Endo, Kenichi Kanayama, Kenichi Nagami (INTEC) SITE2021-57 IA2021-70 |
We have released a home automation application called "KADENTECHO". Based on the accumulated data from this app, we cond... [more] |
SITE2021-57 IA2021-70 pp.69-74 |
IA, ICSS |
2021-06-21 16:25 |
Online |
Online |
[Invited Talk]
An Authentication Scheme for WLAN Physical Layer Miyuki Hirose (KIT) IA2021-8 ICSS2021-8 |
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] |
IA2021-8 ICSS2021-8 p.43 |
ISEC |
2021-05-19 11:35 |
Online |
Online |
[Invited Talk]
Efficient blockchain-based IoT firmware update considering distribution incentives (from IDC 2021) Tatsuhiro Fukuda (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2021-4 |
This paper proposes a firmware distribution method that provides incentives for distributors to help with distribu- tion... [more] |
ISEC2021-4 p.18 |
ICSS, IPSJ-SPT |
2021-03-01 11:30 |
Online |
Online |
Method of Similarity Evaluation among Incidents for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31 |
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] |
ICSS2020-31 pp.31-36 |
ICSS |
2020-11-26 15:00 |
Online |
Online |
Initial Study of Incident Response Support System for Multi-Located Network Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22 |
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] |
ICSS2020-22 pp.17-20 |
NS |
2020-04-16 16:40 |
Online |
Online |
[Invited Talk]
Data Life-Cycle Protection for Ubiquitous Data Sharing Ruidong Li (NICT) NS2020-4 |
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] |
NS2020-4 pp.19-41 |
IA |
2019-10-04 16:25 |
Tokyo |
Tokyo Univ., Hongo Campus, Takeda Hall |
Device management method for IoT security by network equipment Yoshifumi Atarashi (Alaxala), Ray Atarashi (IIJ-II), Yutaka Oiwa (AIST) IA2019-21 |
The security of industrial system (i.e. factories, hospitals) are important. So we developed security management systems... [more] |
IA2019-21 pp.7-14 |
MIKA (2nd) |
2019-10-04 10:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Study for an advanced secure PDS service Yuka Miyagi, Hiroki Yanagisawa, Noriharu Miyaho (TDU) |
In recent years, personal information management technology called PDS (Personal Data Store) has been devel... [more] |
|
IA, ICSS |
2019-06-07 11:20 |
Miyagi |
Research Institute for Electrical Communication, Tohoku University |
Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8 |
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] |
IA2019-8 ICSS2019-8 pp.37-41 |
NS |
2019-04-19 14:15 |
Kagoshima |
Tenmonkan Vision Hall |
A Study on Identity Exchange System in Consideration of User's Privacy Motoshi Horii, Dai Suzuki, Kenji Taka, Takeshi Kawasaki, Satoshi Imai (Fujitsu Labs.) NS2019-18 |
Service provider requires service users’ personal data such as their name and address to identify each of the service us... [more] |
NS2019-18 pp.103-106 |
ICSS, IPSJ-SPT |
2019-03-08 14:25 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Traffic analysis to detect abnormal smartphone application behavior Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87 |
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] |
ICSS2018-87 pp.167-172 |
ICSS, IPSJ-SPT |
2019-03-08 14:50 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Performance survey for IoT security function on smartphone Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68 |
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] |
ICSS2018-68 pp.1-6 |