|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech) IT2010-105 ISEC2010-109 WBS2010-84 |
In the grammar based code proposed by Kieffer and Yang, a context-free grammar which only produces the input sequence is... [more] |
IT2010-105 ISEC2010-109 WBS2010-84 pp.243-248 |
WBS, IT, ISEC |
2009-03-10 13:00 |
Hokkaido |
Hakodate Mirai Univ. |
Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code Shun Watanabe, Tsuki Saitou, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2008-103 ISEC2008-161 WBS2008-116 |
The privacy amplification is a technique to distill
a secret key from a random variable by a function
so that the dist... [more] |
IT2008-103 ISEC2008-161 WBS2008-116 pp.395-400 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|