ITE Technical Group Submission System
Conference Schedule |
Online Proceedings
[Sign in]
|
|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ME, IST, IEICE-BioX, IEICE-SIP, IEICE-MI, IEICE-IE [detail] |
2024-06-07 10:30 |
Niigata |
Nigata University (Ekinan-Campus "TOKIMATE") |
Innovations in Security Mechanisms through Decomposition and Reuse of Body Functions: A Preliminary Study on Password Authentication Takumi Takaiwa, Seiya Kajihara, Tsubasa Shibata, Soichi Takigawa, Tetsushi Ohki, Masakatsu Nishigaki (Shizuoka Univ.) |
(To be available after the conference date) [more] |
|
ME, IST, IEICE-BioX [detail] |
2017-05-22 15:10 |
Ishikawa |
|
A study on system security for a smart device-based multifactor authentication system based on usage environment Yuki Nakao, Tomoaki Higashi, Yasushi Yamazaki (Kitakyushu Univ.), Tetsushi Ohki (AIST) |
[more] |
|
IEICE-BioX, ME, IST [detail] |
2015-06-30 10:30 |
Tokyo |
Kanazawa University, Kakuma Campus |
Performance estimation based on artifact species Tetsushi Ohki, Akira Otsuka (AIST) |
[more] |
|
ME, IEICE-BS |
2009-12-04 10:55 |
Nagano |
Nagano Prefecture General Industrial Technology Center |
Trend of Standardizing on Biometric Template Protection Technologies and Guideline for Evaluation Methodology
-- Status of ITU-T SG 17 Q.9: Telebiometrics -- Tetsushi Ohki (Waseda Univ.), Yoshiaki Isobe (Hitachi), Naohisa Komatsu (Waseda Univ.) |
Recently, the biometric template protection technologies have been standardized on ISO/IEC JTC 1/SC 27 and ITU-T SG 17. ... [more] |
ME2009-225 pp.45-48 |
ME, IEICE-BS |
2009-12-04 11:20 |
Nagano |
Nagano Prefecture General Industrial Technology Center |
A Study on the framework of Biometric Cryptosystem using a Common Template Kohei Shukuzawa, Tetsushi Ohki (Waseda Univ.), Yasushi Yamazaki (Kitakyushu Univ.), Naohisa Komatsu (Waseda Univ.) |
In personal authentication that uses biometric cryptosystem, there is a risk of leakage of biometric information by the ... [more] |
ME2009-226 pp.49-52 |
|
|
|
[Return to Top Page]
[Return to ITE Web Page]
|