IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
CNR, BioX 2024-02-29
14:00
Tokyo NHK Science & Technology Research Laboratories
(Primary: On-site, Secondary: Online)
Personal Authentication by both Palm and Back of the Hand Images without Geometric Features using CNN
Kai Ebato, Kouya Tochikubo (Nihon Univ.) BioX2023-71 CNR2023-38
In recent years, there has been an increasing demand for personal authentication using biological information such as fi... [more] BioX2023-71 CNR2023-38
pp.7-12
CNR, BioX 2023-03-01
13:30
Oita
(Primary: On-site, Secondary: Online)
Person Authentication based on Palm Images Using CNN
Kai Ebato, Kouya Tochikubo, Mitsuhiko Meguro (Nihon Univ.) BioX2022-67 CNR2022-33
While conventional biometric authentication extracts geometric features from images, this paper proposes a personal auth... [more] BioX2022-67 CNR2022-33
pp.30-35
ISEC, IT, WBS 2020-03-10
13:00
Hyogo University of Hyogo
(Cancelled but technical report was issued)
(2,3)-Threshold Extended Visual Secret Sharing Schemes for QR Code
Naoya Okawa, Kouya Tochikubo (Nihon Univ.) IT2019-102 ISEC2019-98 WBS2019-51
 [more] IT2019-102 ISEC2019-98 WBS2019-51
pp.79-86
ICSS, IPSJ-SPT 2020-03-02
10:40
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Information Rates for Multiple Assignment Schemes on Five Participants
Yutaro Shimma, Kouya Tochikubo (Nihon Univ.) ICSS2019-70
In 1988, Ito et al. proposed a multiple assignment secret sharing scheme. Their scheme can realize an arbitrary access s... [more] ICSS2019-70
pp.13-18
ISEC 2007-05-18
11:25
Tokyo Kikai-Shinko-Kaikan Bldg. (k,n) Threshold Secret Sharing Schemes Using XOR Operations
Yoshihiro Fujii (TOSHIBA SOLUTIONS), Kouya Tochikubo (Nihon Univ.), Norikazu Hosaka, Minako Tada, Takehisa Kato (TOSHIBA SOLUTIONS) ISEC2007-5
We propose a fast $(k, n)$-threshold scheme using EXCLUSIVE-OR operations. The proposed scheme is ideal and the size of ... [more] ISEC2007-5
pp.31-38
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan