IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Wideband System (WBS)  (Searched in: 2008)

Search Results: Keywords 'from:2009-03-09 to:2009-03-09'

[Go to Official WBS Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 88  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2009-03-09
09:00
Hokkaido Hakodate Mirai Univ. Proposal of Piece Falsification Detection Method on JetJigsaw
Tatsuyuki Matsushita, Kentaro Umesawa, Shinji Yamanaka (Toshiba) IT2008-43 ISEC2008-101 WBS2008-56
In SCIS2009, we proposed JetJigsaw, a content delivery method with content protection mechanism[SCIS2009]. We introduced... [more] IT2008-43 ISEC2008-101 WBS2008-56
pp.1-6
WBS, IT, ISEC 2009-03-09
09:25
Hokkaido Hakodate Mirai Univ. Access control model for distributed systems and its application for service proxies
Yoshiharu Asakura, Atsushi Honda, Naoshi Higuchi, Yoshinori Saida (NEC) IT2008-44 ISEC2008-102 WBS2008-57
Terminals in a distributed system provide their services for other terminals. In this manuscript, we propose Scope-based... [more] IT2008-44 ISEC2008-102 WBS2008-57
pp.7-13
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Network Usage Control Based on Evaluation of User Security
Takuma Hori, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-45 ISEC2008-103 WBS2008-58
The network should be maintained so available that every user could communicate safely. The Internet has been built unde... [more] IT2008-45 ISEC2008-103 WBS2008-58
pp.15-22
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Anomaly detection based on the machine learning of the human behavior on home network
Yuji Shintani, Yasuyoshi Okada, Naoshi Sato (Institute of Information Security) IT2008-46 ISEC2008-104 WBS2008-59
The demand for home security is growing year by year in order to solve on problems at homes, according to surge of robbe... [more] IT2008-46 ISEC2008-104 WBS2008-59
pp.23-28
WBS, IT, ISEC 2009-03-09
10:50
Hokkaido Hakodate Mirai Univ. On the Possibility of Taking off Prime Number Generation in RSA-based Access Control
Jin Tamura (NICT) IT2008-47 ISEC2008-105 WBS2008-60
An Access Control Scheme, which was proposed by Chick et al. in CRYPTO89, has applied into many applications (Broadcast ... [more] IT2008-47 ISEC2008-105 WBS2008-60
pp.29-33
WBS, IT, ISEC 2009-03-09
11:15
Hokkaido Hakodate Mirai Univ. A Note on Security of Knapsack Type PKC with Random Sequence
Yasuyuki Murakami (Osaka Electro-Comm Univ.) IT2008-48 ISEC2008-106 WBS2008-61
Present author proposed a new method for constructing knapsack PKC
by using a random sequence.
In this paper, we propo... [more]
IT2008-48 ISEC2008-106 WBS2008-61
pp.35-40
WBS, IT, ISEC 2009-03-09
11:40
Hokkaido Hakodate Mirai Univ. Security Gap between Double-Sequence Knapsack PKC and Single-Sequence Knapsack PKC against Low-Density Attack
Takeshi Nasako, Yasuyuki Murakami (Osaka Electro-Comm Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2008-49 ISEC2008-107 WBS2008-62
Recently present authors proposed a double-sequence knapsack public key cryptosystem on the basis of MH PKC(KMN PKC). We... [more] IT2008-49 ISEC2008-107 WBS2008-62
pp.41-45
WBS, IT, ISEC 2009-03-09
13:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Advances in Public-Key Cryptography (RSA, ECC, IBE)
Tsuyoshi Takagi (Future Univ. Hakodate.) IT2008-50 ISEC2008-108 WBS2008-63
We give a brief overview on the development of public-key cryptography starting with RSA cryptosystem. The most frequent... [more] IT2008-50 ISEC2008-108 WBS2008-63
pp.47-48
WBS, IT, ISEC 2009-03-09
14:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Performance Evaluation of Error Correcting Codes
Toru Fujiwara (Osaka Univ.) IT2008-51 ISEC2008-109 WBS2008-64
In this talk, performance analysis on error correcting codes used in digtal watermarking and in network coding is discus... [more] IT2008-51 ISEC2008-109 WBS2008-64
p.49
WBS, IT, ISEC 2009-03-09
15:10
Hokkaido Hakodate Mirai Univ. [Invited Talk] Algebraic topology and sensor networks
Yasuaki Hiraoka (Hiroshima Univ./JTS PRESTO), Zin Arai (Hokkaido Univ./JTS PRESTO), Kazunori Hayashi (Kyoto Univ.) IT2008-52 ISEC2008-110 WBS2008-65
 [more] IT2008-52 ISEC2008-110 WBS2008-65
pp.51-56
WBS, IT, ISEC 2009-03-09
16:20
Hokkaido Hakodate Mirai Univ. Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks
Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.) IT2008-53 ISEC2008-111 WBS2008-66
Stream cipher is one of primitive classes in symmetric key ciphers where plaintext symbols are combined with pseudo rand... [more] IT2008-53 ISEC2008-111 WBS2008-66
pp.57-64
WBS, IT, ISEC 2009-03-09
16:45
Hokkaido Hakodate Mirai Univ. Sharing Multilevel Secrets among Groups Using Concatenation of Reed-Solomon Codes
Hachiro Fujita (Tokyo Metropolitan Univ.), Chigusa Kawashima (Univ. of Electro-Comm.), Tomoko K. Matsushima (Polytechnic Univ.) IT2008-54 ISEC2008-112 WBS2008-67
 [more] IT2008-54 ISEC2008-112 WBS2008-67
pp.65-70
WBS, IT, ISEC 2009-03-09
17:10
Hokkaido Hakodate Mirai Univ. Easy Key Management in Multiple Association by Using (2,2)-threshold Secret Sharing For A Group File Sharing System
Mariko Uchida (Nagoya Inst. of Tech.), Youji Fukuta (Aichi Univ. of Edu.), Masami Mohri (Gifu Univ.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.) IT2008-55 ISEC2008-113 WBS2008-68
One of security issue of group file sharing system using file server is file leak by illegal operation by server adminis... [more] IT2008-55 ISEC2008-113 WBS2008-68
pp.71-78
WBS, IT, ISEC 2009-03-09
17:35
Hokkaido Hakodate Mirai Univ. Practical Methodology of Secret Key Agreement System Using Variable Directional Antenna
Takayuki Umaba (ATR), Masahiko Maeda (ATR/Univ. of Hyogo,), Yosuke Harada (ATR/Doshisha Univ.), Masazumi Ueba (ATR), Satoru Aikawa (ATR/Univ. of Hyogo,), Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2008-56 ISEC2008-114 WBS2008-69
This paper describes a practical methodology of secret agreement system with privacy amplification. We defined parameter... [more] IT2008-56 ISEC2008-114 WBS2008-69
pp.79-84
WBS, IT, ISEC 2009-03-09
09:00
Hokkaido Hakodate Mirai Univ. Spectrum spreading sequences generated by chaotic dynamics and its correlational properties
Tohru Kohda, Takao Une, Yuichiro Koura (Kyushu Univ.) IT2008-57 ISEC2008-115 WBS2008-70
The performance of code division multiple access (CDMA) system
largely depends on the SS codes.
Many methods of genera... [more]
IT2008-57 ISEC2008-115 WBS2008-70
pp.85-90
WBS, IT, ISEC 2009-03-09
09:25
Hokkaido Hakodate Mirai Univ. Markovian Coded Gaussian Filter with its application to Filterbanks
Tohru Kohda, Yutaka Jitsumatsu, Tatsuma Kuwazaki, Kenjiro Fujino (Kyushu Univ.) IT2008-58 ISEC2008-116 WBS2008-71
In code division multiple access (CDMA) systems, spreading code is introduced as the third axis in addition to the time ... [more] IT2008-58 ISEC2008-116 WBS2008-71
pp.91-98
WBS, IT, ISEC 2009-03-09
09:50
Hokkaido Hakodate Mirai Univ. Data Dissemination in Mobile Environment Using Collaborative Approach
Mohd Rashid, Atsushi Kinjo, Tomokazu Nagata, Shiro Tamaki (Univ. of the Ryukyus) IT2008-59 ISEC2008-117 WBS2008-72
Data dissemination in mobile environment has attracted the research community for its various applications. The academic... [more] IT2008-59 ISEC2008-117 WBS2008-72
pp.99-104
WBS, IT, ISEC 2009-03-09
10:15
Hokkaido Hakodate Mirai Univ. Modulation Classification Based on Amplitude and Cosine moments
Shinji Ohara, Masato Kita, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2008-60 ISEC2008-118 WBS2008-73
Recently cognitive radios attract much attention, because it leads to flexible and high capacity wireless systems. Modul... [more] IT2008-60 ISEC2008-118 WBS2008-73
pp.105-108
WBS, IT, ISEC 2009-03-09
10:50
Hokkaido Hakodate Mirai Univ. Error-Trellis State Complexity of LDPC Convolutional Codes Based on Circulant Matrices
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama) IT2008-61 ISEC2008-119 WBS2008-74
Let H(D) be the parity-check matrix of an LDPC convolutional code corresponding to the parity-check matrix H of a quasi-... [more] IT2008-61 ISEC2008-119 WBS2008-74
pp.109-116
WBS, IT, ISEC 2009-03-09
11:15
Hokkaido Hakodate Mirai Univ. Accelerated Algorithm for Computing the Weight Distribution of Convolutional Codes, part 2
Yasuo Asakura, Masanori Hirotomo, Masakatu Morii (Kobe Univ.), Hiroshi Sasano (Kinki Univ.) IT2008-62 ISEC2008-120 WBS2008-75
In this paper, we propose an generalized AFAST algorithm.
This algorithm detects minimum distance at precomputation.
... [more]
IT2008-62 ISEC2008-120 WBS2008-75
pp.117-122
 Results 1 - 20 of 88  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan