IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Theory (IT) [schedule] [select]
Chair Hiroshi Kamabe (Gifu Univ.)
Vice Chair Masayoshi Ohashi (KDDI Labs.)
Secretary Hiroki Koga (Univ. of Tsukuba), Motohiko Isaka (Kwansei Gakuin Univ.)
Assistant Hidenori Kuwakado (Kobe Univ.)

Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Naoya Torii (Fujitsu Labs.)
Vice Chair Tsutomu Matsumoto (Yokohama National Univ.), Toshiaki Tanaka (KDDI Labs.)
Secretary Toru Nakanishi (Okayama Univ.), Junji Shikata (Yokohama National Univ.)
Assistant Tetsuya Izu (Fujitsu Labs.)

Technical Committee on Wideband System (WBS) [schedule] [select]
Chair Makoto Itami (Tokyo Univ. of Science)
Vice Chair Yukitoshi Sanada (Keio Univ.), Shigenobu Sasaki (Niigata Univ.)
Secretary Kenichi Takizawa (NICT), Fumie Ono (Yokohama National Univ.)
Assistant Nobuyoshi Komuro (Chiba Univ.), Isao Matsunami (Nagasaki Univ.)

Conference Date Thu, Mar 1, 2012 10:30 - 17:25
Fri, Mar 2, 2012 09:00 - 17:50
Topics  
Conference Place Hiyoshi Campus, Keio University 
Address 4-1-1 Hiyoshi, Kohoku-ku, Yokohama-shi, Kanagaw, Japan
Transportation Guide Get off at Hiyoshi station; the 1-minute walk
http://www.keio.ac.jp/ja/access/hiyoshi.html
Contact
Person
Prof. Yukitoshi Sanada
Sponsors This conference is co-sponsored by IEEE IT Society Japan Chapter.

Thu, Mar 1  
10:30 - 16:10
(1) 10:30-10:55 A Clone Resistance Evaluation of Visible-Light Paper Artifact-Metrics Yuki Kondo, Yasuhiro Takeuchi, Junji Shikata, Tsutomu Matsumoto (Yokohama National Univ.)
(2) 10:55-11:20 Object Verification System from Artifact-Metrics Based on Printed Ink Spread Takanori Kobayashi, Takuya Nakamura, Hiroki Sato (Chuo Univ.), Nuttapong Attrapadung, Hideki Imai (AIST)
(3) 11:20-11:45 A Method to Divide Application for Deterring Unauthorized Use by Outsourcee Satomi Honda, Katsunari Yoshioka, Tsutomu Matsumoto (YNU)
(4) 11:45-12:10 Analysis of interdependency of information security in Japan Ryouta Hishiki (Chuou Univ.), Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura (Tokyo Univ.), Hideki Imai (Chuou Univ.)
  12:10-13:30 Lunch Break ( 80 min. )
(5) 13:30-13:55 Reducing the Message Size in Oblivious Automata Evaluation Yuji Watanabe, Takaaki Tateishi (IBM)
(6) 13:55-14:20 Extension of Fuzzy Commitment Schemes Naoki Tani, Junji Shikata, Tsutomu Matsumoto (YNU)
(7) 14:20-14:45 Consideration for IT-secure password protected secret sharing Atsushi Waseda, Ryo Nojima (NICT)
  14:45-15:20 Break ( 35 min. )
(8) 15:20-15:45 A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kobe Univ.)
(9) 15:45-16:10 New Saturation Characteristics of HyRAL Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
Thu, Mar 1  
10:30 - 17:25
(10) 10:30-10:55 Wyner-Ziv video coding with a quantizer using correlations between frames Michiaki Ohkawa, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Tech)
(11) 10:55-11:20 Super-resolution using information-theoretic priori information of image histogram Shimpei Tanemori, Hiroyuki Kudo (Tsukuba Univ.)
(12) 11:20-11:45 An Efficient Quadtree-based Image Coder with Predictive Set Partitioning Hidetoshi Imamura, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
  11:45-13:05 Lunch Break ( 80 min. )
  - Break
(13) 15:20-15:45 Error-Trellis Construction for Tailbiting Convolutional Codes Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
(14) 15:45-16:10 Error Probability of Information and Position Estimation of Mobile Optical Transmitter using Viterbi Algorithm Kohei Harada, Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
(15) 16:10-16:35 Construction of multiple error correcting WOM-Code Hidetoshi Utsunomiya, Hiroshi Kamabe (Gifu Univ.)
(16) 16:35-17:00 Estimation of Block Orthogonal Modulation with Cyclostationarity Takafumi Kinugasa, Ikuo Oka, Shingo Ata (Osaka City Univ.)
(17) 17:00-17:25 Error Exponents of Linear Codes for Slepian-Wolf Source Coding Tomohiko Uyematsu (Tokyo Inst. Tech.)
Thu, Mar 1  
10:30 - 12:10
(18) 10:30-10:55 Adjacent Channel Interference Cancellation using Orthogonal Precoding for Fractional Sampling OFDM Receiver Eisuke Sakai, Haruki Nishimura, Mamiko Inamori, Yukitoshi Sanada (Keio Univ.)
(19) 10:55-11:20 A Study on Single-RF Diversity Using Multiple Element ESPAR Antenna for IEEE 802.15.4 Yudai Katsuda, Minoru Okada (NAIST)
(20) 11:20-11:45 Prototype of Ultra Wideband-based Wireless Body Area Networks
-- Consideration of CAP and CFP slots allocation in human walking motion --
Yuichiro Takei, Hiroki Katsuta (Meiji Univ.), Kenichi Takizawa (NICT), Tetsushi Ikegami (Meiji Univ.), Kiyoshi Hamaguchi (NICT)
(21) 11:45-12:10 Proposal of Green Receive Diversity Using White-spaces
-- Receive Diversity with ESPAR Antenna Using Arbitrary Frequency Band --
Masato Saito, Wataru Arita (Ryukyu Univ.)
  12:10-13:30 Lunch Break ( 80 min. )
Fri, Mar 2  
09:00 - 17:50
(22) 09:00-09:25 Searchable Symmetric Encryption with small information leakage in index update Toshinori Araki (NEC)
(23) 09:25-09:50 Software Implementation of Privacy Preserving Statistical Computations based on Homomorphic Encryption Toshiyuki Isshiki, Satoshi Obana, Kengo Mori (NEC)
(24) 09:50-10:15 Improved Left-to-Right Scalar Multiplication Algorithms Atsuko Miyaji, Yiren Mo (JAIST)
  10:15-10:50 Break ( 35 min. )
(25) 10:50-11:15 Construction of the Tsujii-Shamir-Kasahara (TSK) Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryo Fujita (Chuo Univ.)
(26) 11:15-11:40 Properties of Public-Keys for Knapsack Cryptosystems and the Low-density Attack Shogo Takai, Akira Hayashi (KIT)
(27) 11:40-12:05 Computer experiments on Shamir's attack against knapsack cryptosystems Jun Hashimoto, Akira Hayashi (KIT)
  12:05-13:25 Lunch Break ( 80 min. )
(28) 13:25-14:25 [Invited Talk]
Information Theoretically Secure Secret Key Agreement
Shun Watanabe (Univ. Tokushima), Ryutaroh Matsumoto, Tomohiko Uyematsu (TITECH)
(29) 14:25-15:25 [Invited Talk]
Physical Attacks and Countermeasures on Cryptographic Devices
Akashi Satoh (AIST)
(30) 15:25-16:25 [Invited Talk]
Human Activity Sensing Using Radio Waves for Safe and Secure Life
Tomoaki Ohtsuki (Keio Univ.)
  16:25-16:35 Break ( 10 min. )
(31) 16:35-17:00 Secure Tabular Data Analysis Allowing Partial Disclosure of Statistics Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.)
(32) 17:00-17:25 Image Authentication Based on Interleaving and Cyclic Hamming Code Hiroaki Fujimoto, Ryuji Hamabe (FIT)
(33) 17:25-17:50 A New Watermarking Method with Block Diffusion and Biased-Chirp Transformation Kazuo Ohzeki, Yuan-Yu Wei, Mao Kuraki, Yutaka Hirakawa (SIT), Kiyotsugu Sato (CIT)
Fri, Mar 2  
09:00 - 17:50
(34) 09:00-09:25 Healthcare Telemonitoring System by Relay-Assisted Communications in 400MHz band Kenichi Takizawa, Ryu Miura (NICT)
(35) 09:25-09:50 Study on RAKE Reception using Multicarrier Template Waveform in UWB-IR System Junpei Ohno, Kohei Ohno, Makoto Itami (TUS)
(36) 09:50-10:15 Transmission Performance Improvement with Dynamic Channel Allocation in MU-MIMO Systems Toshiro Nakahira, Hidekazu Murata, Susumu Yoshida, Koji Yamamoto (Kyoto Univ.), Daisuke Umehara (Kyoto Tech.), Satoshi Denno (Okayama Univ.), Masahiro Morikura (Kyoto Univ.)
  10:15-10:50 Break ( 35 min. )
(37) 10:50-11:40 [Invited Talk]
Trends, Technical and Regulatory Problems, and Standardization for Commercialization of Wireless Power Transmission Technologies
Hiroki Shoki (Toshiba)
  11:40-13:00 Lunch Break ( 80 min. )
  - Break
(38) 16:35-17:00 A note on separation conditions of source and channel coding for sources with two-output terminal and channels with two-input and one-output terminals Ken-ichi Iwata, Nobu Mori (Univ. of Fukui)
(39) 17:00-17:25 A Note on Cyclic-Equivalent Codewords for Constant-Weight Codes from Cyclic Difference Sets Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.)
(40) 17:25-17:50 Theoretical analysis of bit error probability for punctured convolutional codes Hideki Yoshikawa (Tohoku Gakuin Univ.)

Announcement for Speakers
General TalkEach speech will have 20 minutes for presentation and 5 minutes for discussion.

Contact Address and Latest Schedule Information
IT Technical Committee on Information Theory (IT)   [Latest Schedule]
Contact Address E--mail:it-c(to IT Secretaries)
.
Hiroki Koga (University of Tsukuba)
Motohiko Isaka (Kwansei Gakuin University) 
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Toru Nakanishi (Okayama University)
TEL +81-86-251-8249, FAX +81-86-251-8255
E--mail: ic-c (to ISEC secretaries) 
WBS Technical Committee on Wideband System (WBS)   [Latest Schedule]
Contact Address Nobuyoshi Komuro (Chiba University)
TEL/FAX: +81-43-290-3274
E--mail: kmrfultyba-u 


Last modified: 2012-02-28 14:05:59


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   / [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan