|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCS, SR, NS, SeMI, RCC (Joint) |
2021-07-15 10:55 |
Online |
Online |
Mutualized oblivious DNS (μODNS): Hiding a tree in the wild forest Jun Kurihara (Univ. Hyogo), Takeshi Kubo (Zettant) NS2021-44 |
[more] |
NS2021-44 pp.63-68 |
IN, NS (Joint) |
2021-03-04 11:20 |
Online |
Online |
Resource Authorization Patterns on Edge Computing Ryu Watanabe, Ayumu Kubota (KDDIR), Jun Kurihara (UOH) IN2020-68 |
In order to realize a distribution of processing load and a prompt response, the concept of edge computing is drawing an... [more] |
IN2020-68 pp.85-90 |
NS, IN (Joint) |
2015-03-03 09:00 |
Okinawa |
Okinawa Convention Center |
A Study of TCP-like Congestion Control using Interest Aggregation in Content-Centric Networking Kenji Yokota, Jun Kurihara, Atsushi Tagami (KDDI R&D Labs.) NS2014-207 |
(To be available after the conference date) [more] |
NS2014-207 pp.173-178 |
NS, IN (Joint) |
2015-03-03 16:20 |
Okinawa |
Okinawa Convention Center |
Optimization of ICN Potential Based Routing for Disasters Takaaki Sunaga, Tohru Asami, Yoshihiro Kawahara (UT), Kohei Sugiyama, Jun Kurihara, Atsushi Tagami (KDDI), Tomohiko Yagyu (NEC), Toru Hasegawa (OU) IN2014-174 |
In the current Internet, many applications are based on DNS, the centralized name resolution system, assuming hosts are ... [more] |
IN2014-174 pp.313-318 |
NS, IN (Joint) |
2015-03-03 16:40 |
Okinawa |
Okinawa Convention Center |
Identity-Based Aggregate Signatures Applied to NDN for Short Message Transfers Byambajav Namsraijav, Tohru Asami, Yoshihiro Kawahara (UTokyo), Jun Kurihara, Kohei Sugiyama, Atsushi Tagami (KDDI R&D Labs.), Tomohiko Yagyu (NEC), Toru Hasegawa (Osaka Univ.) IN2014-175 |
In Named Data Networking (NDN), security is imposed on contents instead of end-to-end connections; therefore, every cont... [more] |
IN2014-175 pp.319-324 |
ISEC, IT, WBS |
2015-03-03 14:10 |
Fukuoka |
The University of Kitakyushu |
[Invited Talk]
Security of secret sharing schemes expressed in terms of the relative parameters of linear codes Jun Kurihara (KDDI R&D Labs), Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) IT2014-100 ISEC2014-113 WBS2014-92 |
[more] |
IT2014-100 ISEC2014-113 WBS2014-92 pp.239-246 |
IT |
2011-07-22 09:30 |
Okayama |
Okayama University |
Strongly-Secure Secret Sharing based on Linear Codes Can Be Characterized by Generalized Hamming Weight Jun Kurihara (Tokyo Inst. of Tech./KDDI R&D Labs), Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2011-16 |
[more] |
IT2011-16 pp.35-40 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:10 |
Akita |
Akita University |
A Study on Stream-Cipher-Based Hash Functions Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) ISEC2009-29 SITE2009-21 ICSS2009-43 |
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based h... [more] |
ISEC2009-29 SITE2009-21 ICSS2009-43 pp.153-159 |
ISEC |
2007-09-07 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (1) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-74 |
[more] |
ISEC2007-74 pp.1-8 |
ISEC |
2007-09-07 09:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (2) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-75 |
[more] |
ISEC2007-75 pp.9-15 |
ISEC |
2007-05-18 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-4 |
[more] |
ISEC2007-4 pp.23-30 |
IE, CS |
2005-12-12 16:40 |
Aichi |
Nagoya Univ. (Video Conf.) |
Efficient Nonbinary Coding Systems Approaching the Shannon Limit by using Product Accumulate Codes Jun Kurihara, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Tech) |
PA (Product Accumulate) codes achieve perfomance near the Shannon limit for BPSK, have low encoding and decoding complex... [more] |
CS2005-60 IE2005-115 pp.45-50 |
RCS |
2004-08-26 15:20 |
Hokkaido |
Hokkaido University |
Software Radio Receiver Utilizing RF Filter Bank Jun Kurihara, Hiroshi Suzuki (Tokyo Tech.) |
This paper proposes a software radio receiver which utilizes an RF filter bank in the front end and optimally combines t... [more] |
RCS2004-133 pp.79-84 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|