|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, EMM |
2022-05-17 16:40 |
Gifu |
Gifu University (Primary: On-site, Secondary: Online) |
[Invited Talk]
Secure Codes with List Decoding Yujie Gu (Kyudai) IT2022-8 EMM2022-8 |
In this paper, we consider secure codes for protecting the copyright of multimedia content against collusion attacks. We... [more] |
IT2022-8 EMM2022-8 pp.41-43 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 11:20 |
Hokkaido |
Sapporo Convention Center |
Kenta Watanabe, Miwako Mishima (Gifu Univ.) ISEC2018-37 SITE2018-29 HWS2018-34 ICSS2018-40 EMM2018-36 |
(To be available after the conference date) [more] |
ISEC2018-37 SITE2018-29 HWS2018-34 ICSS2018-40 EMM2018-36 pp.289-295 |
IT |
2014-09-19 10:15 |
Chiba |
|
A (k,n)-Threshold Scheme with Detectability of All the Cheaters Based on a Certain Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2014-44 |
In Shamir's $(k,n)$-threshold scheme, if cheaters are involved in $k$ participants and give illegal shares in the recons... [more] |
IT2014-44 pp.19-24 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77 |
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more] |
IT2012-91 ISEC2012-109 WBS2012-77 pp.181-188 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC |
2006-09-13 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys Jun Furukawa (NEC), Nuttapong Attrapadung (Tokyo Univ.), Satoshi Obana (NEC) |
We propose a black-box traitor revocable broadcast encryption
scheme. This is a variant of a broadcast encryption schem... [more] |
ISEC2006-80 pp.61-68 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 13:00 |
Okayama |
Okayama Univ. |
Hierarchical Key Assignment for Efficient Public-Key Black-Box Tracing against Self-Defensive Pirates Tatsuyuki Matsushita (Toshiba Corp.), Hideki Imai (Chuo Univ., AIST) |
We propose a hierarchical key-assignment method by which the transmission overhead in a public-key black-box tracing sch... [more] |
ISEC2006-52 pp.91-98 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:50 |
Iwate |
Iwate Prefectural University |
Proposal on Sumi coating method which can change the coating parts to protect against insider attacks Takanobu Masubuchi, Hajime Nakamura, Saneyuki Ishii, Noriko Ogawa, Hiroshi Kashimura, Ryoichi Sasaki (Tokyo Denki Univ) |
Digital signatures do not allow any alteration of a document. However, for some signed documents ”appropriate” alteratio... [more] |
ISEC2005-33 SITE2005-31 pp.179-186 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|