IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
SS 2013-01-10
13:00
Okinawa   The validity problem of positive XPath queries with sibling axes in the presence of DTDs
Yohei Kusunoki (Osaka Univ.), Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.)
In this paper, we discuss the complexity of the validity for positive XPath queries under the presence of DTDs. A given ... [more] SS2012-46
pp.1-6
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-19
10:55
Hokkaido   Hybrid Additive-Multiplicative Watermarking for General Embedding Domains
Seigo Ikeda, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2
 [more] ISEC2012-10 SITE2012-6 ICSS2012-12 EMM2012-2
pp.9-16
SS 2012-03-14
09:00
Okinawa Tenbusu-Naha Decidability of Query Preservation for Deterministic Linear Top-Down Tree Transducers
Ryuta Sawada (Osaka Univ.), Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2011-75
When updating an XML schema, it is desirable that the new schema preserve the expressive power of the old one. The query... [more] SS2011-75
pp.109-114
SS 2012-03-14
09:25
Okinawa Tenbusu-Naha Combining the tractability of duplicate-free DTDs and disjunction-capsuled DTDs for XPath satisfiability with sibling axes
Yasunori Ishihara (Osaka Univ.), Shogo Shimizu (AIIT), Kenji Hashimoto (NAIST), Toru Fujiwara (Osaka Univ.) SS2011-76
This paper demonstrates a new subclass of DTDs,
called DC/DF-DTDs, under which XPath
satisfiability with child, descen... [more]
SS2011-76
pp.115-120
ISEC, LOIS 2011-11-15
14:15
Osaka Osaka Electro-Communication University Symbolic Criterion of EUC Secure Message Authentication for Multi-Message Protocols
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-57 LOIS2011-51
A protocol is said to be EUC secure if it can be securely
composed with arbitrary protocols which use the same setup. ... [more]
ISEC2011-57 LOIS2011-51
pp.155-162
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-12
13:55
Shizuoka Shizuoka University Recovery of Tampered Pixels for Statistical Fragile Watermarking
Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.) ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9
 [more] ISEC2011-10 SITE2011-7 ICSS2011-15 EMM2011-9
pp.7-12
ISEC 2011-05-13
15:25
Tokyo Kikai-Shinko-Kaikan Bldg. On the Impossibility of $d$-Multiplicative Non-perfect Secret Sharing
Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2011-5
 [more] ISEC2011-5
pp.31-36
ISEC, IT, WBS 2011-03-04
15:45
Osaka Osaka University Symbolic Criterion for EUC Secure Authentication against Static Adversary
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.) IT2010-129 ISEC2010-133 WBS2010-108
EUC secure protocol maintains its security even when it is composed and shares public information with arbitrary protoco... [more] IT2010-129 ISEC2010-133 WBS2010-108
pp.403-410
SS 2010-12-15
09:00
Gunma Ikaho-Onsen Hotel Tenbo The Validity Problem of Positive XPath Queries in the Presence of DTDs
Kenji Hashimoto (NAIST), Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) SS2010-47
We discuss the validity problem for positive XPath queries in the presence of DTDs. A given query $p$ is valid under a D... [more] SS2010-47
pp.49-54
ISEC, LOIS 2010-11-17
16:55
Ibaraki Tsukuba Univ. Attack Derivation for cryptographic assumptions in the generic model with a computer algebra system
Kenta Kumojima, Maki Yoshida (Osaka Univ.), Masayuki Abe (NTT), Miyako Ohkubo (NICT), Toru Fujiwara (Osaka Univ.) ISEC2010-58 LOIS2010-37
The computational hardness of number-theoretic problems used in
cryptography is generally proved in a generic model of ... [more]
ISEC2010-58 LOIS2010-37
pp.57-64
IT 2009-07-23
15:10
Osaka Kwansei Gakuin Univ. (Umeda campus) Performance Evaluation and Analysis on Digital Watermark for Still Images with JPEG Compression Attack
Tetsushi Masuno, Takuya Kusaka (Okayama Univ.), Toru Fujiwara (Osaka Univ.) IT2009-14
Digital watermark is a useful technology for copyright protection.
A number of studies on embedding watermark into spat... [more]
IT2009-14
pp.49-54
WBS, IT, ISEC 2009-03-09
14:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Performance Evaluation of Error Correcting Codes
Toru Fujiwara (Osaka Univ.) IT2008-51 ISEC2008-109 WBS2008-64
In this talk, performance analysis on error correcting codes used in digtal watermarking and in network coding is discus... [more] IT2008-51 ISEC2008-109 WBS2008-64
p.49
IT 2008-07-24
11:20
Chiba University of Tokyo, Kashiwa Campus On Distance Distribution of a Reed-Solomon-like Code for Network Coding
Masafumi Tominaga (Osaka Univ.), Kenji Yasunaga (Kwansei Gakuin Univ.), Toru Fujiwara (Osaka Univ.) IT2008-9
Network coding is a technique for efficient network communication. Middle nodes between a source node and a destination ... [more] IT2008-9
pp.7-10
ISEC, IT, WBS 2008-02-29
11:35
Tokyo   A Lower Bound on the Number of Uncorrectable Errors of Weight Half the Minimum Distance
Kenji Yasunaga, Toru Fujiwara (Osaka Univ.) IT2007-56 ISEC2007-153 WBS2007-87
 [more] IT2007-56 ISEC2007-153 WBS2007-87
pp.51-56
ISEC, LOIS 2007-11-21
14:45
Hyogo Kobe University Anonymous Fingerprinting for Predelivery of Contents
Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara (Osaka Univ.) ISEC2007-92 OIS2007-64
Security requirements for predelivery of digital contents such as movies whose release date is predeterminedare analyzed... [more] ISEC2007-92 OIS2007-64
pp.23-30
DE 2007-07-02
15:45
Miyagi Akiu hot springs (Sendai) Generating XML document transformers according to XML schema evolution based on the tree-embedding relation
Masaki Yoshida, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-39
Given an update operation sequence for schema evolution based on the tree-embedding relation, the method of generating X... [more] DE2007-39
pp.103-108
DE 2007-07-02
16:10
Miyagi Akiu hot springs (Sendai) Translating XPath queries according to XML schema evolution based on the tree-embedding relation
Takuji Morimoto, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.) DE2007-40
A method is proposed for translating queries in a subclass of XPath according to XML schema evolution based on the tree-... [more] DE2007-40
pp.109-114
SITE 2006-12-08
16:20
Osaka   Engineering Ethics Course for Computer Science Graduate Students
Michio Nakanishi (OIT), Toru Fujiwara (Osaka Univ.), Yoshinori Takeuchi, Masanori Akiyoshi, Masanori Hashimoto, Fumio Kishino, Kiyoshi Kiyokawa, Takahiro Hara, Koji Nakamae, Tohru Kikuno, Yuuichi Teranishi (Osaka University)
 [more] SITE2006-49
pp.41-47
DE 2006-07-12
14:45
Niigata HOTEL SENKEI Security Verification against Attacks using Type Inference on XML Databases
Fumikazu Takasuka, Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara (Osaka Univ.)
Inference attacks mean that an attacker tries to infer the execution result of a query unauthorized to the attacker (i.e... [more] DE2006-47
pp.151-156
IT 2006-05-23
15:55
Nara Nara-ken new public hall Structural Analysis of Minimum Weight Codewords of the Extended (32,21,6) and (64,45,8) BCH Codes Using Invariance Property
Jun Asatani (Okayama Univ. of Sci.), Takuya Koumoto (Okayama Univ.), Toru Fujiwara (Osaka Univ.), Tadao Kasami (NAIST)
In this report, two typical examples (32,21,6) and (64,45,8) extended BCH codes are considered, and their structures of ... [more] IT2006-5
pp.25-30
 Results 21 - 40 of 51 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan