IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 115  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICM, NS, CQ, NV
(Joint)
2023-11-22
12:30
Ehime Ehime Prefecture Gender Equality Center
(Primary: On-site, Secondary: Online)
[Invited Talk] Secure Middlebox Communication over TLS against Middlebox Compromise
Toru Hasegawa, Kentaro Kita, Junji Takemasa, Yuki Koizumi (Osaka Univ.) CQ2023-46
A large portion of Internet traffic passes through middleboxes that read or modify messages. However, such middleboxes a... [more] CQ2023-46
pp.50-53
ICSS 2023-11-17
10:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Chameleon Hash Function with Forward-Security
Pengxuan Wei, Atsuko Miyaji (Osaka Univ.), Yangguang Tian (University Of Surrey) ICSS2023-61
Chameleon Hash Function (CH) is a hash function with a public and secret key pair. CH is collision-resistant for users w... [more] ICSS2023-61
pp.70-76
LOIS, SITE, ISEC 2023-11-10
10:45
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
NTP Tunneling Threat Model Verification and Countermeasure
Shinjisangeru Sugasawa, Hisayoshi Kunimune, Shigeaki Tanimoto (CIT) ISEC2023-64 SITE2023-58 LOIS2023-22
Fraudulent covert communication methods are techniques used by attackers to avoid detection of malicious communication b... [more] ISEC2023-64 SITE2023-58 LOIS2023-22
pp.66-71
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:00
Hokkaido Hokkaido Jichiro Kaikan An Implementation and Evaluation of Communication Schemes Using Authenticated Cryptography for MAVLink Communication
Ryuto Kuwada, Nobuya Ishihara, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
MAVLink is a lightweight communication protocol used between drones and ground stations to transmit drone status and con... [more] ISEC2023-39 SITE2023-33 BioX2023-42 HWS2023-39 ICSS2023-36 EMM2023-39
pp.165-170
ICSS, IPSJ-SPT 2023-03-13
16:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Implementation and Evaluation for Remote-Control Security System of IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/JDC), Naoto Yanai (OU/JDC), Akira Takeuchi (JDC), Tatsuya Takehisa (Nisshin), Yukitoshi Sanada (KU/JDC), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2022-67
We have proposed the Remote-Control System for securing IoT devices from malwares. It consists of a control algorithm ba... [more] ICSS2022-67
pp.115-120
CS 2022-10-27
11:30
Hiroshima Hiroshima City University Satellite campus
(Primary: On-site, Secondary: Online)
Implementation of a large-scale evaluation platform in a BACnet/IP environment
Kohei Miyazawa, Tetsuya Yokotani, Hiroaki Mukai, Yuki Hatanaka, Satoru Murakami (KIT) CS2022-45
In deploying BACnet/IP on large buildings, it is necessary to analyze the impact of unauthorized access on the facilitie... [more] CS2022-45
pp.11-14
HWS, ICD 2022-10-25
17:05
Shiga
(Primary: On-site, Secondary: Online)
How to Identify the Physical Direction of CAN Message Transmission
Yosuke Maekawa, Camille Gay (TOYOTA/YNU), Tsutomu Matsumoto (YNU) HWS2022-43 ICD2022-35
The impact of cyber-attacks on automobiles is becoming more serious as vehicles become more connected and multi-function... [more] HWS2022-43 ICD2022-35
pp.76-81
IN, CCS
(Joint)
2022-08-05
15:00
Hokkaido Hokkaido University(Centennial Hall)
(Primary: On-site, Secondary: Online)
Countermeasure of In-vehicle System using Authenticated Encryption against DoS Attacks
Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) IN2022-22
In-vehicle systems adopt Controller Area Network (CAN) which is the standard communication protocol. Many kinds of data ... [more] IN2022-22
pp.39-44
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2022-07-20
13:50
Online Online An overview of the secrecy of patent applications in the Japanese Law
Makoto Koike (MK Microwave) ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
Economic security promotion law enacted on May 11, 2022 includes the provisions to keep patent application secret in Jap... [more] ISEC2022-23 SITE2022-27 BioX2022-48 HWS2022-23 ICSS2022-31 EMM2022-31
pp.88-97
IT, ISEC, RCC, WBS 2022-03-10
09:40
Online Online Construction GKW Transformation for Arithmetic Circuits
Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63
pp.31-37
IA, SITE, IPSJ-IOT [detail] 2022-03-08
13:30
Kyoto Kyoto University, Yoshida Campus
(Primary: On-site, Secondary: Online)
IoT Device Security Survey Using Home Automation Apps
Mizuki Ohno, Takahiro Endo, Kenichi Kanayama, Kenichi Nagami (INTEC) SITE2021-57 IA2021-70
We have released a home automation application called "KADENTECHO". Based on the accumulated data from this app, we cond... [more] SITE2021-57 IA2021-70
pp.69-74
ICSS, IPSJ-SPT 2022-03-08
13:00
Online Online Remote-Control System for Securing IoT Devices
Masaru Takeuchi (JDC), Yohei Watanabe (UEC/ジャパンデータコム), Naoto Yanai (OU/ジャパンデータコム), Tatsuya Takehisa (Nisshin), Junji Shikata (YNU), Koji Nakao (NICT) ICSS2021-73
The number of malwares targeting IoT devices increases, and security issues in many systems such as critical infrastruct... [more] ICSS2021-73
pp.87-92
CAS, CS 2022-03-04
14:10
Online Online Secure In-vehicle System using Authenticated Encryption Midori-OTR and its Implementation Evaluation
Daichi Hirose, Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2021-95 CS2021-97
In recent years, many electronic control units called ECUs have been installed in automobiles to perform various functio... [more] CAS2021-95 CS2021-97
pp.112-117
QIT
(2nd)
2021-11-30
15:30
Online Online [Invited Talk] Recent progress in the security proof of quantum key distribution in the finite-key regime
Toshihiko Sasaki (Univ. of Tokyo)
We show a finite-key analysis method for a broad type of quantum key distribution protocols based on a numerical optimiz... [more]
ICTSSL, IEE-SMF, IN 2021-10-21
09:50
Online Online Proposal and Evaluation of Cryptographic Communication Method that Separates Components Related to Coding and Decoding in IoT Environment
Reita Suzuki (Niigata Univ.), Takafumi Hayashi (Nihon Univ.), Keisuke Nakano (Niigata Univ.) ICTSSL2021-20
MQTT is one of the lightweight messaging protocols currently used in the IoT environment, but there is no clear rule reg... [more] ICTSSL2021-20
pp.12-17
IA 2021-10-15
16:50
Online Online Malware Traffic Detection at Certain Time Using IP Flow Information
Seiya Komatsu, Yusei Katsura, Masatoshi Kakiuchi, Ismail Arai, Kazutoshi Fujikawa (NAIST) IA2021-27
The damage caused by the activities of malware such as botnets and ransomware has become a social problem. In order to d... [more] IA2021-27
pp.6-11
PN 2021-08-30
10:35
Online Online On Information-Theoretic Secure Authentication Key Exchange via Y00 Quantum Cryptography
Takehisa Iwakoshi (Mie Univ.) PN2021-12
We propose an information-theoretically secure (ITS) procedure for a secret key agreement to share a secret key with a n... [more] PN2021-12
pp.1-6
IN, NS
(Joint)
2021-03-05
11:20
Online Online Proposal for LDoS attack using indirect transmission in Zigbee and a countermeasure against it
Satoshi Okada, Daisuke Miyamoto, Yuji Sekiya, Hiroshi Nakamura (The University of Tokyo) NS2020-153
Low-Rate DoS (LDoS) attack degrades the quality of service with less traffic than typical DoS attacks. LDoS attack has a... [more] NS2020-153
pp.179-184
ICSS, IPSJ-SPT 2021-03-01
14:30
Online Online A path authentication framework based on One-way cross networks
Kosuke Ishibashi, Masakazu Soshi (Hiroshima City Univ.) ICSS2020-33
Since MANETs can transmit information between mobile devices, it is critically important to guarantee that the transmitt... [more] ICSS2020-33
pp.43-48
ISEC 2020-05-20
16:05
Online Online Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator
Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more]
ISEC2020-12
pp.55-61
 Results 1 - 20 of 115  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan