IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 121  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA 2023-09-22
15:00
Hokkaido Hokkaido Univeristy
(Primary: On-site, Secondary: Online)
Signing key management in cryptocurrency custodians learned from DNSSEC
Yuto Takei (Mercari/Tokyo Tech), Kazuyuki Shudo (Kyoto Univ.) IA2023-30
Japanese cryptocurrency exchanges hold over 1 trillion yen worth of cryptocurrency in total as of June 2023. The exchang... [more] IA2023-30
pp.115-122
SWIM, KBSE 2023-05-19
15:10
Shizuoka
(Primary: On-site, Secondary: Online)
DARPA-Like Organization and Role of Univeristy -- A Global Perspective Regarding AI R&D --
Haruki Ueno (NII) KBSE2023-3 SWIM2023-3
Dual-use technology (DUT) refers to technology that can be used for both peaceful and military purposes, and has its roo... [more] KBSE2023-3 SWIM2023-3
pp.13-20
NS, NWS
(Joint)
2023-01-26
13:00
Yamaguchi Hybrid Meeting (Yamaguchi Prefecture)
(Primary: On-site, Secondary: Online)
[Encouragement Talk] A User Authenticity Verification Method Using Behavioral and Cognitive Biometrics for Zero Trust Access Control Mechanisms
Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-153
In recent years, remote access to confidential data necessary for work has been rapidly increasing due to the spread of ... [more] NS2022-153
pp.19-24
NS, ICM, CQ, NV
(Joint)
2022-11-24
11:35
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
Design and Trial of Cyber Security Exercise for Basic CISO Skillset
Tatsumi Seko, Touri Nakagawa, Taisho Sasada, Yuzo Taenaka, Youki Kadobayashi (NAIST) NS2022-104
Conventional security officers lack the authority and responsibility to make decisions related to management and are not... [more] NS2022-104
pp.23-28
NS, ICM, CQ, NV
(Joint)
2022-11-25
16:20
Fukuoka Humanities and Social Sciences Center, Fukuoka Univ. + Online
(Primary: On-site, Secondary: Online)
[Invited Talk] Operation and Management of Microservices-based Distributed System using Service Mesh
Takaya Ide, Hitoshi Yabusaki (Hitachi) NS2022-127 CQ2022-60 ICM2022-30
Distributed systems such as microservice architectures are complex and change rapidly. A network model called a service ... [more] NS2022-127 CQ2022-60 ICM2022-30
pp.137-141(NS), pp.58-62(CQ), pp.31-35(ICM)
R 2022-10-07
15:15
Fukuoka
(Primary: On-site, Secondary: Online)
A Note on Pull-Type Security Patch Management Policies for Intrusion Tolerant Systems
Junjun Zheng (Osaka Univ.), Hiroyuki Okamura, Tadashi Dohi (Hiroshima Univ.) R2022-37
This paper considers the pull-type security patch management policies for intrusion tolerant systems. A composite stocha... [more] R2022-37
pp.31-36
ICM 2022-07-07
14:50
Hokkaido Tokachi Plaza
(Primary: On-site, Secondary: Online)
[Invited Talk] Zero Trust Architecture and Risk Management
Yuki Unno (Fujitsu Research) ICM2022-14
This paper describes what zero-trust architecture is, what are the threats to zero-trust architecture, and the risk mana... [more] ICM2022-14
pp.21-23
SC 2022-05-27
10:55
Online Online Improving data security by mapping data and storage relations for data management in large environment
Avais Ahmad, Shinichi Hayashi, Satoshi Kaneko, Takashi Tameshige (Hitachi) SC2022-4
Large-scale organizations are required to manage multitude data assets and identify data flow and lo cation. Relationshi... [more] SC2022-4
pp.19-24
IA, SITE, IPSJ-IOT [detail] 2022-03-08
13:30
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
IoT Device Security Survey Using Home Automation Apps
Mizuki Ohno, Takahiro Endo, Kenichi Kanayama, Kenichi Nagami (INTEC) SITE2021-57 IA2021-70
We have released a home automation application called "KADENTECHO". Based on the accumulated data from this app, we cond... [more] SITE2021-57 IA2021-70
pp.69-74
IA, ICSS 2021-06-21
16:25
Online Online [Invited Talk] An Authentication Scheme for WLAN Physical Layer
Miyuki Hirose (KIT) IA2021-8 ICSS2021-8
Security has traditionally been implemented at the higher, logical layers of communication networks, rather than at the ... [more] IA2021-8 ICSS2021-8
p.43
ISEC 2021-05-19
11:35
Online Online [Invited Talk] Efficient blockchain-based IoT firmware update considering distribution incentives (from IDC 2021)
Tatsuhiro Fukuda (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) ISEC2021-4
This paper proposes a firmware distribution method that provides incentives for distributors to help with distribu- tion... [more] ISEC2021-4
p.18
ICSS, IPSJ-SPT 2021-03-01
11:30
Online Online Method of Similarity Evaluation among Incidents for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Nagoya Univ.), Hiroki Takakura (NII) ICSS2020-31
In an organization computer network which consists of multiple sites, there are differences in security strength between... [more] ICSS2020-31
pp.31-36
ICSS 2020-11-26
15:00
Online Online Initial Study of Incident Response Support System for Multi-Located Network
Masahito Kumazaki, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada (Naoya Univ.), Hiroki Takakura (NII) ICSS2020-22
In the organization network which are consisted multi-sites, there are differences in security strength between the head... [more] ICSS2020-22
pp.17-20
NS 2020-04-16
16:40
Online Online [Invited Talk] Data Life-Cycle Protection for Ubiquitous Data Sharing
Ruidong Li (NICT) NS2020-4
Huge amount of data raise a strong demand for a network infrastructure with the capability to support data sharing and r... [more] NS2020-4
pp.19-41
IA 2019-10-04
16:25
Tokyo Tokyo Univ., Hongo Campus, Takeda Hall Device management method for IoT security by network equipment
Yoshifumi Atarashi (Alaxala), Ray Atarashi (IIJ-II), Yutaka Oiwa (AIST) IA2019-21
The security of industrial system (i.e. factories, hospitals) are important. So we developed security management systems... [more] IA2019-21
pp.7-14
MIKA
(2nd)
2019-10-04
10:15
Hokkaido Hokkaido Univ. [Poster Presentation] Study for an advanced secure PDS service
Yuka Miyagi, Hiroki Yanagisawa, Noriharu Miyaho (TDU)
In recent years, personal information management technology called PDS (Personal Data Store) has been devel... [more]
IA, ICSS 2019-06-07
11:20
Miyagi Research Institute for Electrical Communication, Tohoku University Development of System to Analyze Aggressive Communication Using Self-Organizing Map and Convolutional Neural Network
Akifumi Iwasa, Hikofumi Suzuki, Takumi Uchiyama (Shinshu Univ.), Tetsuya ui (NEC) IA2019-8 ICSS2019-8
In recent years, the importance of the Internet is increasing. However, DoS / DDoS attacks is increasing. It is difficul... [more] IA2019-8 ICSS2019-8
pp.37-41
NS 2019-04-19
14:15
Kagoshima Tenmonkan Vision Hall A Study on Identity Exchange System in Consideration of User's Privacy
Motoshi Horii, Dai Suzuki, Kenji Taka, Takeshi Kawasaki, Satoshi Imai (Fujitsu Labs.) NS2019-18
Service provider requires service users’ personal data such as their name and address to identify each of the service us... [more] NS2019-18
pp.103-106
ICSS, IPSJ-SPT 2019-03-08
14:25
Okinawa NICT Okinawa Electromagnetic Technology Center Traffic analysis to detect abnormal smartphone application behavior
Iifan Tyou, Takahiro Nukushina, Yukio Nagafuchi, Masaki Tanikawa (NTT) ICSS2018-87
With the spread of smartphones, its security management has become important. For smartphones, it is also necessary to c... [more] ICSS2018-87
pp.167-172
ICSS, IPSJ-SPT 2019-03-08
14:50
Okinawa NICT Okinawa Electromagnetic Technology Center Performance survey for IoT security function on smartphone
Yukio Nagafuchi, Takahiro Nukushina, Iifan Tyou, Masaki Tanikawa (NTT) ICSS2018-68
Recently, IoT devices are wide spreading, and its security management has become more important. There are two kinds of ... [more] ICSS2018-68
pp.1-6
 Results 1 - 20 of 121  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan