|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
USN, IPSJ-UBI |
2008-07-17 09:30 |
Tokyo |
Tokyo Denki University (Tokyo) |
A Scalable Server Data Authentication Scheme for Sensor Networks Jun Noda (NEC), Yuichi Kaji (NAIST), Toshiyasu Nakao (NEC) USN2008-11 |
We propose a new server data authentication scheme for sensor networks. Data authentication is a basic technology to det... [more] |
USN2008-11 pp.1-6 |
IT |
2008-01-17 15:15 |
Tokyo |
Waseda Univ. |
A Scheme to Reduce the Calculation Cost of the Sum-Product Decoding Rumi Aoyama, Yuichi Kaji (NAIST) IT2007-28 |
This paper investigates a modified sum-product decoding algorithm which suspends updating reliable messages obtained dur... [more] |
IT2007-28 pp.19-24 |
IT, ISEC, WBS |
2007-03-15 10:45 |
Gunma |
Gunma Univ. (Kiryu Campus) |
An Algebraic Derivation of the Minimum Weight of Simple Full-length Array-LDPC Code with Certain Parameters Kenji Sugiyama, Yuichi Kaji (NAIST) |
Simple and full-length array LDPC codes (SFA-LDPC codes) is a class of LDPC codes which are algebraically constructed fr... [more] |
IT2006-79 ISEC2006-134 WBS2006-76 pp.105-110 |
ISEC |
2006-09-13 16:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry Ritsuko Matsumoto, Hisashi Mouri, Yuichi Kaji (NAIST) |
This study investigates new schemes for distributing cryptographic keys in sensor networks. Sharing a key is the very fi... [more] |
ISEC2006-85 pp.97-104 |
IN, NS (Joint) |
2006-03-03 10:00 |
Okinawa |
Rizzan Sea-Park Hotel Tancha-Bay (Okinawa) |
On the Burst Transmission Delay of FEC-Based Burst Generation for Optical Burst Switching Networks Takuji Tachibana (NICT), Satoshi Arima (Kyocera), Yuichi Kaji (NAIST), Shoji Kasahara (Kyoto Univ) |
In this paper, we evaluate the burst transmission delay for FEC-based burst generation methods in optical burst switchin... [more] |
NS2005-181 pp.93-96 |
IT |
2005-05-25 11:00 |
Overseas |
Univ. of Hawaii |
Using Loosely Triangular Form in Encoding LDPC codes with the LU-decomposition Yuichi Kaji (NAIST) |
A permutation strategy for an encoding algorithm of LDPC codes is discussed. The encoding algorithm, proposed by the aut... [more] |
IT2005-1 pp.1-6 |
IT |
2005-05-27 13:50 |
Overseas |
Univ. of Hawaii |
A Time-Limited Key Management Scheme Based on a One-Way Permutatin Tree Maki Yoshida (Osaka Univ.), Yuichi Kaji (NAIST), Toru Fujiwara (Osaka Univ.) |
[more] |
IT2005-29 pp.41-46 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|